I was able to resolve the issue by researching the following commands on
http://www.fedoraproject.org/wiki/selinux/:
First I ran the audit2why function (sending it to the audit log) to find out the exact cause of the failure:
audit2why < /var/log/audit/audit.log
The the reason for the failure was:
Missing type enforcement (TE) allow rule.
You can use audit2allow to generate a loadable module to allow this access.
next I ran the Audit2allow command, which I had to research a little and read up on the man page.
cat /var/log/audit/audit.log | audit2allow -M local
and got the following output:
******************** IMPORTANT ***********************
To make this policy package active, execute:
semodule -i local.pp
Finally I ran this command to add the new policy package.
semodule -i local.pp
At any rate, issue resolved.