start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: N
- name : 3.1. Names and Addresses
- name service
- 1.7. Application Layer
- 8. Configuring DNS Name Service
- (see also DNS)
- (see also Domain Name Service)
- addresses : (see addresses)
- process : 3.3.4. BIND, resolver, and named
- troubleshooting
- 11.3. Testing Basic Connectivity
- 11.6. Checking Name Service
- Name Service Switch file (nsswitch.conf) : 9.3.1. The nsswitch.conf file
- named server daemon
- 5.4. The Internet Daemon
- 8.1. BIND: UNIX Name Service
- booting : 8.3.3. The Cache Initialization File
- command : C.1. The named Command
- configuring : 8.3. Configuring named
- process : 3.3.4. BIND, resolver, and named
- starting at startup : 8.3.6.1. Starting named
- tools reference : C. A named Reference
- named.boot file
- 8.3.1. The named.boot File
- 11.6.3. Cache corruption
- C.1. The named Command
- configuration commands : C.2. named.boot Configuration Commands
- listed : 8.3.1. The named.boot File
- named.ca file : 11.6.3. Cache corruption
- named.hosts file : 8.3.6. The named.hosts File
- named.local file : 8.3.4. The named.local File
- named.pid file : 11.6.3. Cache corruption
- named.rev file : 8.3.5. The Reverse Domain File
- nameserver entry, in resolv.conf : 8.2.1. The Resolver Configuration File
- National Center for Supercomputer Applications (NCSA) : 13.1. The World Wide Web
- National Institute of Standards and Technology (NIST)
- 12.1.2.2. Use mailing lists to distribute information
- 13.1. The World Wide Web
- National Science Foundation (NSF) : 1.1. TCP/IP and the Internet
- natural mask : 2.2.2. Classless IP Addresses
- NBMA interfaces
- B.6. Interface Statements
- B.8.1. The ospf Statement
- NCSA (National Center for Supercomputer Applications) : 13.1. The World Wide Web
- neighbors
- acquiring : 7.5.1. Exterior Gateway Protocol
- allowing
- 7.7.1.3. Exterior gateway configuration
- B.8.6. The egp Statement
- net domain : 3.3.1. The Domain Hierarchy
- Net/Dest : (see Net/Dest value)
- Net/Dest value
- 6.1.1. Determining the Interface Name
- 6.1.5.5. Point-to-point
- netconfig : 4.7. netconfig
- Netscape browser : 13.1. The World Wide Web
- netstat
- -in command : 6.1.1. Determining the Interface Name
- -ni command : 6.4.4. Troubleshooting Serial Connections
- -nr command
- 2.5. The Routing Table
- 7.3.1. Adding Static Routes
- 11.5. Checking Routing
- to display routing table : 12.7.2. Routing control
- troubleshooting with
- 11.2. Diagnostic Tools
- 11.3. Testing Basic Connectivity
- 11.4.3. Checking the Interface with netstat
- network : (see enterprise)
- access
- balancing against computer security : 12. Network Security
- troubleshooting : 11.4. Troubleshooting Network Access
- address translation (NAT) : 4.2.1. Obtaining an IP Address
- advantages of : 4.2.1. Obtaining an IP Address
- disadvantages of : 4.2.1. Obtaining an IP Address
- administration
- 1.7. Application Layer
- 3.1. Names and Addresses
- avoiding problems
- 11.4.2.1. ARP problem case study
- 11.9. Simple Network Management Protocol
- decentralized : 2.3. Subnets
- defined
- 1. Overview of TCP/IP
- 11. Troubleshooting TCP/IP
- developing feel for : 12.4.1. Know Your System
- need for information about : Preface
- security responsibilites of : 12.1.3. Writing a Security Policy
- simplifying : 4.2.2. Defining the Subnet Mask
- break-ins, increasing : 12. Network Security
- building : Foreword from the First Edition
- connected or not connected to Internet : 4.1. Connected and Non-Connected Networks
- diameter : 1.7. Application Layer
- limited : 7.4.1.1. Running RIP with routed
- hardware
- 1.7. Application Layer
- (see also physical, network)
- with built-in diagnostic software : 11.3.1. The ping Command
- problems with
- 11.3.1. The ping Command
- 11.4.3. Checking the Interface with netstat
- 11.4.4.1. Network hardware problems
- heterogeneous : 1.1.2. Protocol Standards
- interfaces : 3.1. Names and Addresses
- enabling or disabling : 6.1.5.1. Enabling and disabling the interface
- information need for : 6.1. The ifconfig Command
- maps drawn by monitors : 11.9. Simple Network Management Protocol
- mask : 2.5. The Routing Table
- in RIP-2 : 7.4.2. RIP Version 2
- monitoring traffic on : 11.7. Analyzing Protocol Problems
- news : 13.5.1. Newsgroups
- numbers
- 2.2.1. Address Classes
- 4.2.1.1. Assigning host addresses
- problems, how to approach : 11. Troubleshooting TCP/IP
- processes : 8.2. Configuring the Resolver
- resources, controlling : 12.1.3. Writing a Security Policy
- saturated : 11.4.3. Checking the Interface with netstat
- servers : 2.7.2. Port Numbers
- configuring : 9. Configuring Network Servers
- shared media : 11.4.4. Subdividing an Ethernet
- subdividing : 11.4.3. Checking the Interface with netstat
- subnetted : 4.2.1.1. Assigning host addresses
- topology of : 2.2.2. Classless IP Addresses
- underlying : 1.4. Network Access Layer
- unreliable : 11.3.1. The ping Command
- unusual activity on : 12.4.1. Know Your System
- usage, monitoring : 5.2. Linux Kernel Configuration
- X.25 : 1.5.1.3. Fragmenting datagrams
- Network Access Layer
- 1.3. TCP/IP Protocol Architecture
- 6.1.1. Determining the Interface Name
- protocols : 3.6. Bootstrap Protocol
- Network Access Points
- 1.1. TCP/IP and the Internet
- 2.4. Internet Routing Architecture
- 7.5.2. Border Gateway Protocol
- Network Control protocols : 6.2.1. The Serial Protocols
- Network File System : (see NFS)
- Network Information Center : (see NIC)
- Network Information Service : (see NIS)
- Network Layer
- 1.2. A Data Communications Model
- 6.1.1. Determining the Interface Name
- Network Management Station (NMS) : 11.9. Simple Network Management Protocol
- Network News Transfer Protocol (NNTP) : 13.5.1. Newsgroups
- Network Terminal Protocol (TELNET) : 1.7. Application Layer
- network unreachable error message
- 11.3. Testing Basic Connectivity
- 11.5. Checking Routing
- Network/Destination value
- 6.1.1. Determining the Interface Name
- 6.1.5.5. Point-to-point
- networks file
- 3.2. The Host Table
- 6.1.3. Assigning a Subnet Mask
- 7.3. Building a Static Routing Table
- 9.3. Network Information Service
- as maps : 3.3.5. Network Information Service
- newly registered hosts : 3.2. The Host Table
- news message subtype : 3.4.3. Multipurpose Internet Mail Extensions
- newsgroups : 13.5.1. Newsgroups
- for security information : 12.1.2.2. Use mailing lists to distribute information
- using : 4.1.1. Network Contacts
- newsreader, using : 13.5.1. Newsgroups
- next-hop route : 7.4.3. Open Shortest Path First
- specifying : 7.3. Building a Static Routing Table
- in RIP-2 : 7.4.2. RIP Version 2
- NFS (Network File System)
- 1.7. Application Layer
- 3.7.1. File Sharing
- 9.1. The Network File System
- 9.6. Managing Distributed Servers
- benefits of : 9.1. The Network File System
- NFS daemon (nfsd) : 9.1.1. NFS Daemons
- NFS-based print services : 9.1.5.1. NFS print services
- nfs.client script : 9.1.1. NFS Daemons
- nfs.server script : 9.1.1. NFS Daemons
- NFSNET backbone : 1.1. TCP/IP and the Internet
- NIC (Network Information Center) : 3.3.2. Creating Domains and Subdomains
- handle : 4.4.1. Obtaining a Domain Name
- NIS (Network Information Service)
- 3.3.5. Network Information Service
- 9.3. Network Information Service
- maps of
- 3.3.5. Network Information Service
- 6.1.3. Assigning a Subnet Mask
- 10.6.1. Pattern Matching
- NIS+ : 9.3.2. NIS+
- NIST (National Institute of Standards and Technology)
- 12.1.2.2. Use mailing lists to distribute information
- 13.1. The World Wide Web
- NMS (Network Management Station) : 11.9. Simple Network Management Protocol
- NNTP (Network News Transfer Protocol) : 13.5.1. Newsgroups
- no answer error message : 11.3. Testing Basic Connectivity
- no more data from sender (FIN) bit : 1.6.2. Transmission Control Protocol
- nobody uid
- 5.4. The Internet Daemon
- 9.1.2.1. The share command
- non-authoritative servers : 3.3.4. BIND, resolver, and named
- non-broadcast multi-access (NBMA) interfaces
- B.6. Interface Statements
- B.8.1. The ospf Statement
- non-connected network : 4.1. Connected and Non-Connected Networks
- non-encoded binary data : 3.4.3. Multipurpose Internet Mail Extensions
- non-Internet sites, delivering mail to : C.3.1.4. Mail exchanger record
- non-recursive queries : 3.3.2. Creating Domains and Subdomains
- notation, dotted decimal : 2.3. Subnets
- NP keyword : 12.2.1. The Shadow Password File
- NS query : 11.6. Checking Name Service
- NS records
- 8.3.5. The Reverse Domain File
- 8.3.6. The named.hosts File
- NS resource records : C.3.1.2. Name server record
- nservers option : 9.1.1. NFS Daemons
- NSF (National Science Foundation)
- 1.1. TCP/IP and the Internet
- 7.5.2. Border Gateway Protocol
- NSFNET : 2.4. Internet Routing Architecture
- backbone : 7.4. Interior Routing Protocols
- nslookup
- 4.4.1. Obtaining a Domain Name
- 8.4. Using nslookup
- in troubleshooting
- 11.2. Diagnostic Tools
- 11.3. Testing Basic Connectivity
- 11.6. Checking Name Service
- nsswitch.conf file
- 9.3.1. The nsswitch.conf file
- E.4.2. sendmail Options
- numeric addresses : (see addresses)
- numeric values, in printcap parameters : 9.2.1. The printcap File
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.