Tải bản đầy đủ (.pdf) (50 trang)

TCP/IP Network Administration- P2

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (732.41 KB, 50 trang )

Index
documentation : 6.4.4. Troubleshooting Serial Connections
high-speed dial-up :
6.2. TCP/IP Over a Serial Line
synchronous :
5.3.1.2. Pseudo-device
modules, loadable :
5.2. Linux Kernel Configuration
monitoring software :
11.9. Simple Network Management Protocol
automated :
12.4.3. Automated Monitoring
monitoring system usage :
5.2. Linux Kernel Configuration
more command :
8.4. Using nslookup
Mosaic browser :
13.1. The World Wide Web
mount
command :
9.1.3.1. The mount command
daemon (mountd) :
9.1.1. NFS Daemons
point :
9.1.3.1. The mount command
mounting
directory :
9.1. The Network File System
remote filesystems :
9.1.3. Mounting Remote Filesystems
common reasons for :


9.1.3. Mounting Remote Filesystems
mpeg video subtype :
3.4.3. Multipurpose Internet Mail Extensions
mqueue temporary files :
10.5.4. The Set Option Command
MRU (maximum receive unit) :
A.2. The PPP Daemon
MTU (maximum transmission unit)
1.5.1.3. Fragmenting datagrams
6.1.1. Determining the Interface Name
6.1.2. Checking the Interface with ifconfig
6.1.5.4. Maximum transmission unit
A.1. Dial-Up IP
determining smallest :
5.2. Linux Kernel Configuration
multi-homed
host
5.3.1.1. Options
8.2.1. The Resolver Configuration File
architecture of :
12.7. Firewalls
site :
4.3.1. Obtaining an autonomous system number
multicasting
6.1.2. Checking the Interface with ifconfig
6.1.5.5. Point-to-point
addresses
2.2.1. Address Classes
2.2.2.1. Final notes on IP addresses
2.6. Address Resolution

7.4.2. RIP Version 2
routing, support for
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_m.htm (4 of 5) [2001-10-15 09:17:25]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
5.2. Linux Kernel Configuration
5.3.1.1. Options
Multichannel Memorandum Distribution Facility (MMDF) :
10. sendmail
multihomed hosts : (see
hosts)
multipart content type :
3.4.3. Multipurpose Internet Mail Extensions
multipart encryption : (see
encryption)
multipart messages : (see
messages)
multiplexing
2.1. Addressing, Routing, and Multiplexing
2.7. Protocols, Ports, and Sockets
Multipurpose Internet Mail Extensions : (see
MIME)
MX records
8.3.2. Standard Resource Records
8.3.6. The named.hosts File
8.4. Using nslookup
10.7.1. Modifying Local Information
C.3.1.4. Mail exchanger record
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z


Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_m.htm (5 of 5) [2001-10-15 09:17:25]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: N
name : 3.1. Names and Addresses
name service
1.7. Application Layer
8. Configuring DNS Name Service
(see also
DNS)
(see also
Domain Name Service)
addresses : (see
addresses)
process :
3.3.4. BIND, resolver, and named
troubleshooting
11.3. Testing Basic Connectivity
11.6. Checking Name Service
Name Service Switch file (nsswitch.conf) :
9.3.1. The nsswitch.conf file
named server daemon
5.4. The Internet Daemon
8.1. BIND: UNIX Name Service
booting :

8.3.3. The Cache Initialization File
command :
C.1. The named Command
configuring :
8.3. Configuring named
process :
3.3.4. BIND, resolver, and named
starting at startup :
8.3.6.1. Starting named
tools reference :
C. A named Reference
named.boot file
8.3.1. The named.boot File
11.6.3. Cache corruption
C.1. The named Command
configuration commands :
C.2. named.boot Configuration Commands
listed :
8.3.1. The named.boot File
named.ca file :
11.6.3. Cache corruption
named.hosts file :
8.3.6. The named.hosts File
named.local file :
8.3.4. The named.local File
named.pid file :
11.6.3. Cache corruption
named.rev file :
8.3.5. The Reverse Domain File
nameserver entry, in resolv.conf :

8.2.1. The Resolver Configuration File
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_n.htm (1 of 6) [2001-10-15 09:17:27]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
National Center for Supercomputer Applications (NCSA) : 13.1. The World Wide Web
National Institute of Standards and Technology (NIST)
12.1.2.2. Use mailing lists to distribute information
13.1. The World Wide Web
National Science Foundation (NSF) :
1.1. TCP/IP and the Internet
natural mask :
2.2.2. Classless IP Addresses
NBMA interfaces
B.6. Interface Statements
B.8.1. The ospf Statement
NCSA (National Center for Supercomputer Applications) :
13.1. The World Wide Web
neighbors
acquiring :
7.5.1. Exterior Gateway Protocol
allowing
7.7.1.3. Exterior gateway configuration
B.8.6. The egp Statement
net domain :
3.3.1. The Domain Hierarchy
Net/Dest : (see
Net/Dest value)
Net/Dest value
6.1.1. Determining the Interface Name
6.1.5.5. Point-to-point

netconfig :
4.7. netconfig
Netscape browser :
13.1. The World Wide Web
netstat
-in command :
6.1.1. Determining the Interface Name
-ni command :
6.4.4. Troubleshooting Serial Connections
-nr command
2.5. The Routing Table
7.3.1. Adding Static Routes
11.5. Checking Routing
to display routing table :
12.7.2. Routing control
troubleshooting with
11.2. Diagnostic Tools
11.3. Testing Basic Connectivity
11.4.3. Checking the Interface with netstat
network : (see
enterprise)
access
balancing against computer security :
12. Network Security
troubleshooting :
11.4. Troubleshooting Network Access
address translation (NAT) :
4.2.1. Obtaining an IP Address
advantages of :
4.2.1. Obtaining an IP Address

disadvantages of :
4.2.1. Obtaining an IP Address
administration
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_n.htm (2 of 6) [2001-10-15 09:17:27]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
1.7. Application Layer
3.1. Names and Addresses
avoiding problems
11.4.2.1. ARP problem case study
11.9. Simple Network Management Protocol
decentralized :
2.3. Subnets
defined
1. Overview of TCP/IP
11. Troubleshooting TCP/IP
developing feel for :
12.4.1. Know Your System
need for information about :
Preface
security responsibilites of :
12.1.3. Writing a Security Policy
simplifying :
4.2.2. Defining the Subnet Mask
break-ins, increasing :
12. Network Security
building :
Foreword from the First Edition
connected or not connected to Internet :
4.1. Connected and Non-Connected Networks

diameter :
1.7. Application Layer
limited :
7.4.1.1. Running RIP with routed
hardware
1.7. Application Layer
(see also
physical, network)
with built-in diagnostic software :
11.3.1. The ping Command
problems with
11.3.1. The ping Command
11.4.3. Checking the Interface with netstat
11.4.4.1. Network hardware problems
heterogeneous :
1.1.2. Protocol Standards
interfaces :
3.1. Names and Addresses
enabling or disabling :
6.1.5.1. Enabling and disabling the interface
information need for :
6.1. The ifconfig Command
maps drawn by monitors :
11.9. Simple Network Management Protocol
mask :
2.5. The Routing Table
in RIP-2 :
7.4.2. RIP Version 2
monitoring traffic on :
11.7. Analyzing Protocol Problems

news :
13.5.1. Newsgroups
numbers
2.2.1. Address Classes
4.2.1.1. Assigning host addresses
problems, how to approach :
11. Troubleshooting TCP/IP
processes :
8.2. Configuring the Resolver
resources, controlling :
12.1.3. Writing a Security Policy
saturated :
11.4.3. Checking the Interface with netstat
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_n.htm (3 of 6) [2001-10-15 09:17:27]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
servers : 2.7.2. Port Numbers
configuring :
9. Configuring Network Servers
shared media :
11.4.4. Subdividing an Ethernet
subdividing :
11.4.3. Checking the Interface with netstat
subnetted :
4.2.1.1. Assigning host addresses
topology of :
2.2.2. Classless IP Addresses
underlying :
1.4. Network Access Layer
unreliable :

11.3.1. The ping Command
unusual activity on :
12.4.1. Know Your System
usage, monitoring :
5.2. Linux Kernel Configuration
X.25 :
1.5.1.3. Fragmenting datagrams
Network Access Layer
1.3. TCP/IP Protocol Architecture
6.1.1. Determining the Interface Name
protocols :
3.6. Bootstrap Protocol
Network Access Points
1.1. TCP/IP and the Internet
2.4. Internet Routing Architecture
7.5.2. Border Gateway Protocol
Network Control protocols :
6.2.1. The Serial Protocols
Network File System : (see
NFS)
Network Information Center : (see
NIC)
Network Information Service : (see
NIS)
Network Layer
1.2. A Data Communications Model
6.1.1. Determining the Interface Name
Network Management Station (NMS) :
11.9. Simple Network Management Protocol
Network News Transfer Protocol (NNTP) :

13.5.1. Newsgroups
Network Terminal Protocol (TELNET) :
1.7. Application Layer
network unreachable error message
11.3. Testing Basic Connectivity
11.5. Checking Routing
Network/Destination value
6.1.1. Determining the Interface Name
6.1.5.5. Point-to-point
networks file
3.2. The Host Table
6.1.3. Assigning a Subnet Mask
7.3. Building a Static Routing Table
9.3. Network Information Service
as maps :
3.3.5. Network Information Service
newly registered hosts :
3.2. The Host Table
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_n.htm (4 of 6) [2001-10-15 09:17:27]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
news message subtype : 3.4.3. Multipurpose Internet Mail Extensions
newsgroups :
13.5.1. Newsgroups
for security information :
12.1.2.2. Use mailing lists to distribute information
using :
4.1.1. Network Contacts
newsreader, using :
13.5.1. Newsgroups

next-hop route :
7.4.3. Open Shortest Path First
specifying :
7.3. Building a Static Routing Table
in RIP-2 :
7.4.2. RIP Version 2
NFS (Network File System)
1.7. Application Layer
3.7.1. File Sharing
9.1. The Network File System
9.6. Managing Distributed Servers
benefits of :
9.1. The Network File System
NFS daemon (nfsd) :
9.1.1. NFS Daemons
NFS-based print services :
9.1.5.1. NFS print services
nfs.client script :
9.1.1. NFS Daemons
nfs.server script :
9.1.1. NFS Daemons
NFSNET backbone :
1.1. TCP/IP and the Internet
NIC (Network Information Center) :
3.3.2. Creating Domains and Subdomains
handle :
4.4.1. Obtaining a Domain Name
NIS (Network Information Service)
3.3.5. Network Information Service
9.3. Network Information Service

maps of
3.3.5. Network Information Service
6.1.3. Assigning a Subnet Mask
10.6.1. Pattern Matching
NIS+ :
9.3.2. NIS+
NIST (National Institute of Standards and Technology)
12.1.2.2. Use mailing lists to distribute information
13.1. The World Wide Web
NMS (Network Management Station) :
11.9. Simple Network Management Protocol
NNTP (Network News Transfer Protocol) :
13.5.1. Newsgroups
no answer error message :
11.3. Testing Basic Connectivity
no more data from sender (FIN) bit :
1.6.2. Transmission Control Protocol
nobody uid
5.4. The Internet Daemon
9.1.2.1. The share command
non-authoritative servers :
3.3.4. BIND, resolver, and named
non-broadcast multi-access (NBMA) interfaces
B.6. Interface Statements
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_n.htm (5 of 6) [2001-10-15 09:17:27]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
B.8.1. The ospf Statement
non-connected network :
4.1. Connected and Non-Connected Networks

non-encoded binary data :
3.4.3. Multipurpose Internet Mail Extensions
non-Internet sites, delivering mail to :
C.3.1.4. Mail exchanger record
non-recursive queries :
3.3.2. Creating Domains and Subdomains
notation, dotted decimal :
2.3. Subnets
NP keyword :
12.2.1. The Shadow Password File
NS query :
11.6. Checking Name Service
NS records
8.3.5. The Reverse Domain File
8.3.6. The named.hosts File
NS resource records :
C.3.1.2. Name server record
nservers option :
9.1.1. NFS Daemons
NSF (National Science Foundation)
1.1. TCP/IP and the Internet
7.5.2. Border Gateway Protocol
NSFNET :
2.4. Internet Routing Architecture
backbone :
7.4. Interior Routing Protocols
nslookup
4.4.1. Obtaining a Domain Name
8.4. Using nslookup
in troubleshooting

11.2. Diagnostic Tools
11.3. Testing Basic Connectivity
11.6. Checking Name Service
nsswitch.conf file
9.3.1. The nsswitch.conf file
E.4.2. sendmail Options
numeric addresses : (see
addresses)
numeric values, in printcap parameters :
9.2.1. The printcap File
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_n.htm (6 of 6) [2001-10-15 09:17:27]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: O
object identifier : 11.9. Simple Network Management Protocol
octet data :
3.4.3. Multipurpose Internet Mail Extensions
octet-stream application subtype :
3.4.3. Multipurpose Internet Mail Extensions
Oerrs (output errors) :
11.4.3. Checking the Interface with netstat
One-time Passwords In Everything (OPIE) :
12.2.4. OPIE

ONEX command, in ESMTP :
3.4.3. Multipurpose Internet Mail Extensions
open protocol suite :
3.7.1. File Sharing
Open Shortest Path First : (see
OSPF protocol)
Open Systems Interconnect : (see
OSI Reference Model)
opiekey software :
12.2.4. OPIE
opiepassword :
12.2.4. OPIE
option set, invoking dialup IP (dip) :
A.1. Dial-Up IP
options
entry, in resolv.conf :
8.2.1. The Resolver Configuration File
field, in DHCP :
3.6.1. Dynamic Host Configuration Protocol
statement :
5.3.1.1. Options
in gated :
B.5. Options Statements
INET :
5.3.1.1. Options
options file
6.3.1. The PPP Daemon
6.3.2. Dial-Up PPP
A.2. The PPP Daemon
options.device file :

A.2. The PPP Daemon
org domain :
3.3.1. The Domain Hierarchy
OSI Reference Model
1.2. A Data Communications Model
6.1.1. Determining the Interface Name
OSPF protocol
Preface
1.7. Application Layer
7.4.3. Open Shortest Path First
authenticating packets :
B.8.1. The ospf Statement
enabling (in gated)
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_o.htm (1 of 2) [2001-10-15 09:17:27]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
7.7.1.2. Interior gateway configurations
7.7.1.3. Exterior gateway configuration
B.8.1. The ospf Statement
ospf statement (in gated) :
B.8.1. The ospf Statement
ospfase protocol :
7.7.1.3. Exterior gateway configuration
OSTYPE macro :
10.4.1.1. Building a sendmail.cf with m4 macros
defines, listed :
E.3.3. OSTYPE
in sendmail
E.3. m4 sendmail Macros
E.3.3. OSTYPE

out-of-date files defined :
9.6.1. rdist
outdated software : (see
software)
output errors (Oerrs) :
11.4.3. Checking the Interface with netstat
overruns : (see
buffer overruns)
overwhelming the server :
9.4. A BOOTP Server
owner-admin alias :
10.3. sendmail Aliases
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_o.htm (2 of 2) [2001-10-15 09:17:27]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: P
packet : 1.3. TCP/IP Protocol Architecture
authentication :
7.4.2. RIP Version 2
bogus, interjecting :
5.3.1.1. Options
capturing :
5.3.1.2. Pseudo-device

damaged :
6.1.1. Determining the Interface Name
filters :
11.7.1. Packet Filters
constructing :
11.7.1. Packet Filters
in firewalls :
12.7. Firewalls
primitives used, listed :
11.7.1. Packet Filters
options in DHCP :
3.6.1. Dynamic Host Configuration Protocol
queued :
6.1.1. Determining the Interface Name
routing :
1.5.1.1. The datagram
switching :
1.5.1.1. The datagram
update :
7.4.1. Routing Information Protocol
packetsize :
11.3.1. The ping Command
PAP (Password Authentication Protocol)
6.3.4. PPP Daemon Security
A.2. The PPP Daemon
pap-secrets file :
6.3.4. PPP Daemon Security
Parallel Line IP (PLIP) :
5.2. Linux Kernel Configuration
parallel multipart subtype :

3.4.3. Multipurpose Internet Mail Extensions
parentheses (), for continuation characters :
C.3.1. Standard Resource Records
partial message subtype :
3.4.3. Multipurpose Internet Mail Extensions
passing data : (see
data communications model)
passive option
in pppd :
6.3.5. PPP Server Configuration
in RIP
7.4.1.1. Running RIP with routed
7.7.1.2. Interior gateway configurations
passwd command line :
12.2.1. The Shadow Password File
passwd file
6.3.5. PPP Server Configuration
6.4.3. SLIP Server Configuration
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_p.htm (1 of 7) [2001-10-15 09:17:29]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
9.1.5. NFS Authentication Server
9.3. Network Information Service
10.4.1.1. Building a sendmail.cf with m4 macros
12.2.1. The Shadow Password File
13.2.1. Creating an FTP Server
protecting :
12.2. User Authentication
in security checks :
12.4.2. Looking for Trouble

password
1.7. Application Layer
(see also
shadow password file)
aging :
12.2.1. The Shadow Password File
changing frequently :
12.2. User Authentication
tricks used to avoid :
12.2.1. The Shadow Password File
choosing :
12.2.2. Choosing a Password
guidelines for :
12.2.2. Choosing a Password
command :
6.3.2. Dial-Up PPP
guessing or stealing :
12.2. User Authentication
one-time
Preface
12.2.3. One-Time Passwords
systems for :
12.2.3. One-Time Passwords
seemingly random, constructing :
12.2.2. Choosing a Password
writing down :
12.2.4. OPIE
Password Authentication Protocol (PAP) :
A.2. The PPP Daemon
password-based authentication

7.4.3. Open Shortest Path First
7.7.1.2. Interior gateway configurations
9.1.5. NFS Authentication Server
path MTU discovery code :
5.2. Linux Kernel Configuration
path vector protocols :
7.5.2. Border Gateway Protocol
pattern matching :
10.6.1. Pattern Matching
symbols for :
10.5.3. The Define Class Command
PC NFS Authentication and Print Server (pcnfsd) :
9.1.5. NFS Authentication Server
PCI bus :
5.3.1.3. Devices
PCM audio subtype :
3.4.3. Multipurpose Internet Mail Extensions
pcnfsd.conf file :
9.1.5.1. NFS print services
PDUs (Protocol Data Units) :
11.9. Simple Network Management Protocol
peer
3. Network Services
7.5.2. Border Gateway Protocol
B.5. Options Statements
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_p.htm (2 of 7) [2001-10-15 09:17:29]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
clauses : 7.7.1.3. Exterior gateway configuration
level communications :

1.2. A Data Communications Model
subclauses :
B.8.5. The bgp Statement
Perimeter Network :
12.7. Firewalls
periods (..) for domain name :
C.3.1. Standard Resource Records
personal mail forwarding :
10.3.1. Personal mail forwarding
PGP (Pretty Good Privacy) :
12.6.1. When is symmetric encryption useful?
physical
network
1.5.1.2. Routing datagrams
2.3. Subnets
2.6. Address Resolution
3.5.1. Reverse Address Resolution Protocol
address, embedded in response :
3.6. Bootstrap Protocol
independence from
1.1.1. TCP/IP Features
6. Configuring the Interface
security :
12.1.1. Assessing the Threat
serial ports :
6.4.4. Troubleshooting Serial Connections
Physical Layer
1.2. A Data Communications Model
6.1.1. Determining the Interface Name
ping command

6.4.4. Troubleshooting Serial Connections
7.2. The Minimal Routing Table
statistics displayed by
11.3.1. The ping Command
11.4.3. Checking the Interface with netstat
in troubleshooting :
11.3. Testing Basic Connectivity
pipe character (|) separating multiple printer names :
9.2.1. The printcap File
plain text subtype :
3.4.3. Multipurpose Internet Mail Extensions
planning sheets :
4.6.1. Sample Planning Sheets
PLIP (Parallel Line IP) :
5.2. Linux Kernel Configuration
plumb/unplumb parameters :
6.1.5.5. Point-to-point
plus sign (+) indicating a trusted host :
12.2.5. Secure the r Commands
point-to-point interfaces
6.1.5.5. Point-to-point
B.6. Interface Statements
defined :
6.1.1. Determining the Interface Name
Point-to-Point Protocol : (see
PPP)
pointers :
3.3.2. Creating Domains and Subdomains
poison reverse feature :
7.4.1.1. Running RIP with routed

file:///C|/mynapster/Downloads/warez/tcpip/index/idx_p.htm (3 of 7) [2001-10-15 09:17:29]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
policy-based routing : 7.5.2. Border Gateway Protocol
database :
2.4. Internet Routing Architecture
polling
7.5.1. Exterior Gateway Protocol
11.9. Simple Network Management Protocol
trap-directed :
11.9. Simple Network Management Protocol
POP (Post Office Protocol)
3.4.2. Post Office Protocol
4.5.3. Planning Your Mail System
commands, listed :
3.4.2. Post Office Protocol
mail server :
9.7.1. POP Server
pop3d.tar :
9.7.1. POP Server
popper17.tar :
9.7.1. POP Server
port
1.2. A Data Communications Model
2.7.3. Sockets
numbers
1.6.2. Transmission Control Protocol
2.7. Protocols, Ports, and Sockets
2.7.2. Port Numbers
passing :

2.7.3. Sockets
randomly generated :
3.6. Bootstrap Protocol
portmapper :
2.7.2. Port Numbers
Positive Acknowledgment :
1.6.2. Transmission Control Protocol
with Re-transmission (PAR) :
1.6.2. Transmission Control Protocol
Post Office Protocol : (see
POP)
post office servers : (see
mailbox servers)
PostScript application subtype :
3.4.3. Multipurpose Internet Mail Extensions
pound sign (#) for comments
3.2. The Host Table
5.4. The Internet Daemon
7.7.1.1. A host configuration
9.1.4. NFS Automounter
9.2.1. The printcap File
9.4. A BOOTP Server
A.1.1. The dip Script File
D.3. The dhcpd.conf Configuration File
power outage, possible effects of
9.4. A BOOTP Server
9.5.1. dhcpd.conf
PPP (Point-to-Point Protocol)
5.2. Linux Kernel Configuration
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_p.htm (4 of 7) [2001-10-15 09:17:29]

Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
5.3.1.2. Pseudo-device
6.2.1. The Serial Protocols
daemon (pppd) :
6.3.1. The PPP Daemon
command-line options :
6.3.1. The PPP Daemon
overriding address exchanges :
6.3.1. The PPP Daemon
security in :
6.3.4. PPP Daemon Security
tools reference :
A.2. The PPP Daemon
as default :
A.1.1. The dip Script File
installing
6.1.5.5. Point-to-point
6.3. Installing PPP
interoperability and :
6.2.2. Choosing a Serial Protocol
server configuration :
6.3.5. PPP Server Configuration
in Solaris :
6.3.6. Solaris PPP
tools reference :
A. PPP Tools
ppp directory, protecting :
A.2. The PPP Daemon
ppplogin :

6.3.5. PPP Server Configuration
.ppprc file :
A.2. The PPP Daemon
precedence :
10.5.6. Defining Mail Precedence
Predictor-1 compression :
A.2. The PPP Daemon
preference values
7.6.1. gated's Preference Value
B.6. Interface Statements
B.8.5. The bgp Statement
B.9. static Statements
B.10. Control Statements
high-cost :
7.7.1.2. Interior gateway configurations
negative :
B.10.1. The import Statement
prefix-length :
2.2.2. Classless IP Addresses
Presentation Layer :
1.2. A Data Communications Model
Pretty Good Privacy (PGP) :
12.6.1. When is symmetric encryption useful?
primary nameservers
3.3.4. BIND, resolver, and named
4.4.1. Obtaining a Domain Name
8.1.1. BIND Configurations
C.2. named.boot Configuration Commands
configuring :
8.3.1.2. Primary and secondary server configurations

print servers :
3.7.2. Print Services
configuring
4.5.2. Print servers
9.2.1. The printcap File
print spool directory, making
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_p.htm (5 of 7) [2001-10-15 09:17:29]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
9.1.5.1. NFS print services
9.2.1. The printcap File
printcap file :
9.2.1. The printcap File
printers
multiple :
9.2.1. The printcap File
queue display :
9.2.1.2. Using LPD
security :
9.2.1.1. LPD security
priority of messages, assigning
10.5.6. Defining Mail Precedence
B.8.4. The isis Statement
private argument :
6.1.5.3. Metric
procmail :
E.3.5. MAILER
prog pattern :
13.3.1. archie
promiscuous mode

6.1.5.5. Point-to-point
11.7.1. Packet Filters
interface :
5.3.1.2. Pseudo-device
proto clauses
7.7.1.3. Exterior gateway configuration
A.1. Dial-Up IP
B.10.2. The export Statement
protocol
analyzers
5.3.1.2. Pseudo-device
11.7. Analyzing Protocol Problems
12.2.3. One-Time Passwords
client server :
11.9. Simple Network Management Protocol
manager/agent :
11.9. Simple Network Management Protocol
minor :
2.7.1. Protocol Numbers
name, alias for :
2.7.1. Protocol Numbers
number
1.5.1.4. Passing datagrams to the transport layer
2.7.1. Protocol Numbers
problems, troubleshooting :
11.7. Analyzing Protocol Problems
stack
1.2. A Data Communications Model
11.1. Approaching a Problem
standards

1.1.2. Protocol Standards
1.7. Application Layer
statements (in gated) :
B.8. Protocol Statements
suite :
1.2. A Data Communications Model
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_p.htm (6 of 7) [2001-10-15 09:17:29]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
tracing : B.1. The gated Command
Protocol Data Units (PDUs) :
11.9. Simple Network Management Protocol
protocols file
2.7.1. Protocol Numbers
5.4. The Internet Daemon
9.3. Network Information Service
proxy servers
4.2.1. Obtaining an IP Address
5.3.1.1. Options
12.7. Firewalls
providing on a firewall :
12.7.1. Functions of the firewall
proxyarp option :
A.2. The PPP Daemon
ps command :
12.4.1. Know Your System
pseudo-device statement :
5.3.1.2. Pseudo-device
pseudo-domains :
10.7.1. Modifying Local Information

pseudo-terminals :
5.3.1.2. Pseudo-device
PTR resource records
8.3.5. The Reverse Domain File
C.3.1.6. Domain Name Pointer record
ptys :
5.3.1.2. Pseudo-device
public-key encryption :
12.6. Encryption
pulse code modulation (PCM) audio subtype :
3.4.3. Multipurpose Internet Mail Extensions
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_p.htm (7 of 7) [2001-10-15 09:17:29]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: Q
query-response model : 1.6.1. User Datagram Protocol
queuing :
3.4.1. Simple Mail Transfer Protocol
quicktime video subtype :
3.4.3. Multipurpose Internet Mail Extensions
QUIT command
in POP :
3.4.2. Post Office Protocol

in SMTP :
3.4.1. Simple Mail Transfer Protocol
quote pair ("") (expect nothing)
6.3.3. chat
A.3. chat
quoted-printable encoding type :
3.4.3. Multipurpose Internet Mail Extensions
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.
[ Library Home | DNS & BIND | TCP/IP | sendmail | sendmail Reference | Firewalls | Practical Security ]
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_q.htm [2001-10-15 09:17:29]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: R
RADB (Routing Arbiter Database) : 2.4. Internet Routing Architecture
range parameter
9.5.1. dhcpd.conf
D.3.2. Configuration Parameters
RARP (Reverse Address Resolution Protocol)
3.5.1. Reverse Address Resolution Protocol
5.2. Linux Kernel Configuration
adding to Linux kernel :
6.1.5.5. Point-to-point
/etc/ethers file in :
9.3. Network Information Service
raw sockets :

5.4. The Internet Daemon
rc.inet1 script :
7.3.1.1. Installing static routes at startup
rc.M startup script :
10.2. Running sendmail as a Daemon
RCS (Release Control System) format :
10.4.1.1. Building a sendmail.cf with m4 macros
rdist command :
9.6.1. rdist
reachability information
2.4. Internet Routing Architecture
7.5. Exterior Routing Protocols
7.6. Gateway Routing Daemon
READ command, in POP :
3.4.2. Post Office Protocol
recipient addresses : (see
addresses)
records : (see
documentation)
recursive searches :
3.3.2. Creating Domains and Subdomains
Redirect Message
1.5.2. Internet Control Message Protocol
2.5. The Routing Table
7.3.1. Adding Static Routes
redirect statement (in gated) :
B.8.8. The redirect Statement
redirecting routes :
1.5.2. Internet Control Message Protocol
refresh values :

C.3.1.1. Start of Authority record
registered hosts :
3.2. The Host Table
registration fee :
4.4.1. Obtaining a Domain Name
reject route :
B.9. static Statements
reject routes :
B.10.1. The import Statement
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_r.htm (1 of 6) [2001-10-15 09:17:31]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
Index
reliability : 1.6.2. Transmission Control Protocol
remembering passwords :
12.2.2. Choosing a Password
remote
hosts, checking :
1.5.2. Internet Control Message Protocol
servers :
6.3.2. Dial-Up PPP
accessing files on :
9.1. The Network File System
contacting administrators of
11.1.1. Troubleshooting Hints
11.3. Testing Basic Connectivity
never extending trust to :
12.2.3. One-Time Passwords
problem for firewalls :
12.7.1. Functions of the firewall
remote copy (rcp) command :

9.6. Managing Distributed Servers
Remote File System (RFS) :
3.7.1. File Sharing
Remote Procedure Call (RPC) services :
2.7.2. Port Numbers
remounting filesystems after system reboot :
9.1.3.2. The vfstab and fstab files
REPORT keyword :
A.3. chat
reportfile :
A.3. chat
Requests for Comments : (see
RFCs)
reset command :
6.3.2. Dial-Up PPP
resolv.conf file
8.1.1. BIND Configurations
8.2. Configuring the Resolver
8.2.1. The Resolver Configuration File
11.6.4. dig: An Alternative to nslookup
resolver
code :
3.3.4. BIND, resolver, and named
configuring :
8.2. Configuring the Resolver
defined :
8.1. BIND: UNIX Name Service
options :
E.4.2. sendmail Options
resolver-only configurations

3.3.4. BIND, resolver, and named
8.1.1. BIND Configurations
8.2.1.1. A resolver-only configuration
responsibilities of administrators
1.7. Application Layer
4. Getting Started
4.3. Planning Routing
4.6. Informing the Users
5.1. Kernel Configuration
RETR command, in POP :
3.4.2. Post Office Protocol
Reverse Address Resolution Protocol : (see
RARP)
reverse domain :
4.4.1.1. Obtaining an IN-ADDR.ARPA domain
file:///C|/mynapster/Downloads/warez/tcpip/index/idx_r.htm (2 of 6) [2001-10-15 09:17:31]
Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.

×