start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: P
- packet : 1.3. TCP/IP Protocol Architecture
- authentication : 7.4.2. RIP Version 2
- bogus, interjecting : 5.3.1.1. Options
- capturing : 5.3.1.2. Pseudo-device
- damaged : 6.1.1. Determining the Interface Name
- filters : 11.7.1. Packet Filters
- constructing : 11.7.1. Packet Filters
- in firewalls : 12.7. Firewalls
- primitives used, listed : 11.7.1. Packet Filters
- options in DHCP : 3.6.1. Dynamic Host Configuration Protocol
- queued : 6.1.1. Determining the Interface Name
- routing : 1.5.1.1. The datagram
- switching : 1.5.1.1. The datagram
- update : 7.4.1. Routing Information Protocol
- packetsize : 11.3.1. The ping Command
- PAP (Password Authentication Protocol)
- 6.3.4. PPP Daemon Security
- A.2. The PPP Daemon
- pap-secrets file : 6.3.4. PPP Daemon Security
- Parallel Line IP (PLIP) : 5.2. Linux Kernel Configuration
- parallel multipart subtype : 3.4.3. Multipurpose Internet Mail Extensions
- parentheses (), for continuation characters : C.3.1. Standard Resource Records
- partial message subtype : 3.4.3. Multipurpose Internet Mail Extensions
- passing data : (see data communications model)
- passive option
- in pppd : 6.3.5. PPP Server Configuration
- in RIP
- 7.4.1.1. Running RIP with routed
- 7.7.1.2. Interior gateway configurations
- passwd command line : 12.2.1. The Shadow Password File
- passwd file
- 6.3.5. PPP Server Configuration
- 6.4.3. SLIP Server Configuration
- 9.1.5. NFS Authentication Server
- 9.3. Network Information Service
- 10.4.1.1. Building a sendmail.cf with m4 macros
- 12.2.1. The Shadow Password File
- 13.2.1. Creating an FTP Server
- protecting : 12.2. User Authentication
- in security checks : 12.4.2. Looking for Trouble
- password
- 1.7. Application Layer
- (see also shadow password file)
- aging : 12.2.1. The Shadow Password File
- changing frequently : 12.2. User Authentication
- tricks used to avoid : 12.2.1. The Shadow Password File
- choosing : 12.2.2. Choosing a Password
- guidelines for : 12.2.2. Choosing a Password
- command : 6.3.2. Dial-Up PPP
- guessing or stealing : 12.2. User Authentication
- one-time
- Preface
- 12.2.3. One-Time Passwords
- systems for : 12.2.3. One-Time Passwords
- seemingly random, constructing : 12.2.2. Choosing a Password
- writing down : 12.2.4. OPIE
- Password Authentication Protocol (PAP) : A.2. The PPP Daemon
- password-based authentication
- 7.4.3. Open Shortest Path First
- 7.7.1.2. Interior gateway configurations
- 9.1.5. NFS Authentication Server
- path MTU discovery code : 5.2. Linux Kernel Configuration
- path vector protocols : 7.5.2. Border Gateway Protocol
- pattern matching : 10.6.1. Pattern Matching
- symbols for : 10.5.3. The Define Class Command
- PC NFS Authentication and Print Server (pcnfsd) : 9.1.5. NFS Authentication Server
- PCI bus : 5.3.1.3. Devices
- PCM audio subtype : 3.4.3. Multipurpose Internet Mail Extensions
- pcnfsd.conf file : 9.1.5.1. NFS print services
- PDUs (Protocol Data Units) : 11.9. Simple Network Management Protocol
- peer
- 3. Network Services
- 7.5.2. Border Gateway Protocol
- B.5. Options Statements
- clauses : 7.7.1.3. Exterior gateway configuration
- level communications : 1.2. A Data Communications Model
- subclauses : B.8.5. The bgp Statement
- Perimeter Network : 12.7. Firewalls
- periods (..) for domain name : C.3.1. Standard Resource Records
- personal mail forwarding : 10.3.1. Personal mail forwarding
- PGP (Pretty Good Privacy) : 12.6.1. When is symmetric encryption useful?
- physical
- network
- 1.5.1.2. Routing datagrams
- 2.3. Subnets
- 2.6. Address Resolution
- 3.5.1. Reverse Address Resolution Protocol
- address, embedded in response : 3.6. Bootstrap Protocol
- independence from
- 1.1.1. TCP/IP Features
- 6. Configuring the Interface
- security : 12.1.1. Assessing the Threat
- serial ports : 6.4.4. Troubleshooting Serial Connections
- Physical Layer
- 1.2. A Data Communications Model
- 6.1.1. Determining the Interface Name
- ping command
- 6.4.4. Troubleshooting Serial Connections
- 7.2. The Minimal Routing Table
- statistics displayed by
- 11.3.1. The ping Command
- 11.4.3. Checking the Interface with netstat
- in troubleshooting : 11.3. Testing Basic Connectivity
- pipe character (|) separating multiple printer names : 9.2.1. The printcap File
- plain text subtype : 3.4.3. Multipurpose Internet Mail Extensions
- planning sheets : 4.6.1. Sample Planning Sheets
- PLIP (Parallel Line IP) : 5.2. Linux Kernel Configuration
- plumb/unplumb parameters : 6.1.5.5. Point-to-point
- plus sign (+) indicating a trusted host : 12.2.5. Secure the r Commands
- point-to-point interfaces
- 6.1.5.5. Point-to-point
- B.6. Interface Statements
- defined : 6.1.1. Determining the Interface Name
- Point-to-Point Protocol : (see PPP)
- pointers : 3.3.2. Creating Domains and Subdomains
- poison reverse feature : 7.4.1.1. Running RIP with routed
- policy-based routing : 7.5.2. Border Gateway Protocol
- database : 2.4. Internet Routing Architecture
- polling
- 7.5.1. Exterior Gateway Protocol
- 11.9. Simple Network Management Protocol
- trap-directed : 11.9. Simple Network Management Protocol
- POP (Post Office Protocol)
- 3.4.2. Post Office Protocol
- 4.5.3. Planning Your Mail System
- commands, listed : 3.4.2. Post Office Protocol
- mail server : 9.7.1. POP Server
- pop3d.tar : 9.7.1. POP Server
- popper17.tar : 9.7.1. POP Server
- port
- 1.2. A Data Communications Model
- 2.7.3. Sockets
- numbers
- 1.6.2. Transmission Control Protocol
- 2.7. Protocols, Ports, and Sockets
- 2.7.2. Port Numbers
- passing : 2.7.3. Sockets
- randomly generated : 3.6. Bootstrap Protocol
- portmapper : 2.7.2. Port Numbers
- Positive Acknowledgment : 1.6.2. Transmission Control Protocol
- with Re-transmission (PAR) : 1.6.2. Transmission Control Protocol
- Post Office Protocol : (see POP)
- post office servers : (see mailbox servers)
- PostScript application subtype : 3.4.3. Multipurpose Internet Mail Extensions
- pound sign (#) for comments
- 3.2. The Host Table
- 5.4. The Internet Daemon
- 7.7.1.1. A host configuration
- 9.1.4. NFS Automounter
- 9.2.1. The printcap File
- 9.4. A BOOTP Server
- A.1.1. The dip Script File
- D.3. The dhcpd.conf Configuration File
- power outage, possible effects of
- 9.4. A BOOTP Server
- 9.5.1. dhcpd.conf
- PPP (Point-to-Point Protocol)
- 5.2. Linux Kernel Configuration
- 5.3.1.2. Pseudo-device
- 6.2.1. The Serial Protocols
- daemon (pppd) : 6.3.1. The PPP Daemon
- command-line options : 6.3.1. The PPP Daemon
- overriding address exchanges : 6.3.1. The PPP Daemon
- security in : 6.3.4. PPP Daemon Security
- tools reference : A.2. The PPP Daemon
- as default : A.1.1. The dip Script File
- installing
- 6.1.5.5. Point-to-point
- 6.3. Installing PPP
- interoperability and : 6.2.2. Choosing a Serial Protocol
- server configuration : 6.3.5. PPP Server Configuration
- in Solaris : 6.3.6. Solaris PPP
- tools reference : A. PPP Tools
- ppp directory, protecting : A.2. The PPP Daemon
- ppplogin : 6.3.5. PPP Server Configuration
- .ppprc file : A.2. The PPP Daemon
- precedence : 10.5.6. Defining Mail Precedence
- Predictor-1 compression : A.2. The PPP Daemon
- preference values
- 7.6.1. gated's Preference Value
- B.6. Interface Statements
- B.8.5. The bgp Statement
- B.9. static Statements
- B.10. Control Statements
- high-cost : 7.7.1.2. Interior gateway configurations
- negative : B.10.1. The import Statement
- prefix-length : 2.2.2. Classless IP Addresses
- Presentation Layer : 1.2. A Data Communications Model
- Pretty Good Privacy (PGP) : 12.6.1. When is symmetric encryption useful?
- primary nameservers
- 3.3.4. BIND, resolver, and named
- 4.4.1. Obtaining a Domain Name
- 8.1.1. BIND Configurations
- C.2. named.boot Configuration Commands
- configuring : 8.3.1.2. Primary and secondary server configurations
- print servers : 3.7.2. Print Services
- configuring
- 4.5.2. Print servers
- 9.2.1. The printcap File
- print spool directory, making
- 9.1.5.1. NFS print services
- 9.2.1. The printcap File
- printcap file : 9.2.1. The printcap File
- printers
- multiple : 9.2.1. The printcap File
- queue display : 9.2.1.2. Using LPD
- security : 9.2.1.1. LPD security
- priority of messages, assigning
- 10.5.6. Defining Mail Precedence
- B.8.4. The isis Statement
- private argument : 6.1.5.3. Metric
- procmail : E.3.5. MAILER
- prog pattern : 13.3.1. archie
- promiscuous mode
- 6.1.5.5. Point-to-point
- 11.7.1. Packet Filters
- interface : 5.3.1.2. Pseudo-device
- proto clauses
- 7.7.1.3. Exterior gateway configuration
- A.1. Dial-Up IP
- B.10.2. The export Statement
- protocol
- analyzers
- 5.3.1.2. Pseudo-device
- 11.7. Analyzing Protocol Problems
- 12.2.3. One-Time Passwords
- client server : 11.9. Simple Network Management Protocol
- manager/agent : 11.9. Simple Network Management Protocol
- minor : 2.7.1. Protocol Numbers
- name, alias for : 2.7.1. Protocol Numbers
- number
- 1.5.1.4. Passing datagrams to the transport layer
- 2.7.1. Protocol Numbers
- problems, troubleshooting : 11.7. Analyzing Protocol Problems
- stack
- 1.2. A Data Communications Model
- 11.1. Approaching a Problem
- standards
- 1.1.2. Protocol Standards
- 1.7. Application Layer
- statements (in gated) : B.8. Protocol Statements
- suite : 1.2. A Data Communications Model
- tracing : B.1. The gated Command
- Protocol Data Units (PDUs) : 11.9. Simple Network Management Protocol
- protocols file
- 2.7.1. Protocol Numbers
- 5.4. The Internet Daemon
- 9.3. Network Information Service
- proxy servers
- 4.2.1. Obtaining an IP Address
- 5.3.1.1. Options
- 12.7. Firewalls
- providing on a firewall : 12.7.1. Functions of the firewall
- proxyarp option : A.2. The PPP Daemon
- ps command : 12.4.1. Know Your System
- pseudo-device statement : 5.3.1.2. Pseudo-device
- pseudo-domains : 10.7.1. Modifying Local Information
- pseudo-terminals : 5.3.1.2. Pseudo-device
- PTR resource records
- 8.3.5. The Reverse Domain File
- C.3.1.6. Domain Name Pointer record
- ptys : 5.3.1.2. Pseudo-device
- public-key encryption : 12.6. Encryption
- pulse code modulation (PCM) audio subtype : 3.4.3. Multipurpose Internet Mail Extensions
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.