Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: N

n class : sendmail, 32.5. Alphabetized Reference
-N database switch : sendmail, 33.3.4.6. -N append a null byte to all keys (V8.1 and above)
n flag : sendmail, 30.8. Alphabetized F= Flags
N line (qf file) : sendmail, 23.9. The qf File Internals
$n macro
sendmail, 10.3. Missing Addresses
sendmail, 24.4.2. The MAILER-DAEMON Alias
sendmail, 31.10. Alphabetized Reference
n option : (see CheckAliases (n) option)
-n switch (sendmail)
sendmail, 18.3.2. The makesendmail Script
sendmail, 24.6. Prevent Aliasing with -n
sendmail, 36.7. Alphabetized Reference
-N switch (sendmail) : sendmail, 36.7. Alphabetized Reference
-N switch (makemap) : sendmail, 33.2.1.3. -N append a null byte to all keys
N= equate : sendmail, 30.4. The Equates
name resolution : (see resolution)
name servers
DNS & BIND, 1.3. The Domain Name System, in a Nutshell
DNS & BIND, 2.4. Name Servers and Zones
accessing : (see resolvers)
adding and deleting : DNS & BIND, 8.2. Adding More Name Servers
adding to NOTIFY lists : DNS & BIND, 10.2. DNS NOTIFY (Zone Change Notification)
addresses : (see addresses)
backup name servers
DNS & BIND, 6.1.4. The nameserver Directive
DNS & BIND, 6.2.2. Local Name Server
bogus data : DNS & BIND, 13.6.7. Name Server Is Infected with Bogus Root Server Data
bogus, avoiding : DNS & BIND, 10.10. Avoiding a Bogus Name Server
caching-only
DNS & BIND, 8.2.2. Caching-Only Servers
DNS & BIND, 8.3. Registering Name Servers
capacity of : DNS & BIND, 8.1.2. Capacity Planning
choosing how many : DNS & BIND, 8.1. How Many Name Servers?
closest known name servers : DNS & BIND, 2.6.2. Recursion
delegating : DNS & BIND, 10.11.5. Delegated Name Server Configuration
forwarders : DNS & BIND, 10.7. Building Up a Large Site-wide Cache with Forwarders
initialization of (debugging example) : DNS & BIND, 12.3.1. Name Server Startup (Debug Level 1)
lame : (see lame delegation)
library routines : DNS & BIND, 14.2.6. The Name Server Library Routines
limiting query frequency : DNS & BIND, 10.4.1.1. Limiting transfers initiated per name server
load sharing : DNS & BIND, 10.12. Load Sharing Between Mirrored Servers
local, configuring : DNS & BIND, 6.2.2. Local Name Server
maintaining : DNS & BIND, 7. Maintaining BIND
logging (BIND 8) : DNS & BIND, 7.5. BIND 8 Logging
monitoring name servers : DNS & BIND, 7.6. Keeping Everything Running Smoothly
organizing db files : DNS & BIND, 7.3. Organizing Your Files
updating db files : DNS & BIND, 7.2. Updating db Files
master : (see primary name server)
mimicking queries with nslookup : DNS & BIND, 11.6.2. Querying Like a BIND Name Server
multiple, nslookup and : DNS & BIND, 11.1.1. Multiple Servers
mutual data infection : DNS & BIND, 13.6.8.3. Mutual infection
network preferences for : DNS & BIND, 10.6. Preferring Name Servers on Certain Networks
no response from : DNS & BIND, 11.7.2. No Response from Server
nonrecursive : DNS & BIND, 10.9. A Nonrecursive Name Server
NS records
DNS & BIND, 4.2.4. NS Records
DNS & BIND, 7.6.2. Understanding the BIND Statistics
DNS & BIND, A.1.2.11. NS name server
numbering
(see serial numbers)
(see
partial-slave servers : DNS & BIND, 8.2.3. Partial-Slave Servers
primary : (see primary name server)
recursion : (see recursive resolution)
registering : DNS & BIND, 8.3. Registering Name Servers
resolvers without : DNS & BIND, 6.2.1. Resolver Only
resolving : (see resolvers)
restricted (forward-only) : DNS & BIND, 10.8. A More Restricted Name Server
root
DNS & BIND, 2.6.1. Root Name Servers
DNS & BIND, 10.9. A Nonrecursive Name Server
DNS & BIND, 11.3. Option Settings
DNS & BIND, 15.4.4. Internal Roots
"No root nameservers" message : DNS & BIND, 7.6.1. Common Syslog Messages
security of : (see security)
selecting for resolver
DNS & BIND, 6.1.4. The nameserver Directive
DNS & BIND, F.2.3. nameserver
setting up : DNS & BIND, 4. Setting Up BIND
signals : DNS & BIND, 7.1. BIND Name Server Signals
slave : (see slave/secondary name servers)
starting up/restarting
DNS & BIND, 4.7.1. Starting Up the Name Server
DNS & BIND, 7.1. BIND Name Server Signals
startup failure with disabled UDP checksums : DNS & BIND, 13.5.5. Name Server Startup Fails Because UDP Checksums Disabled
statistics on : DNS & BIND, 7.6.2. Understanding the BIND Statistics
switching with nslookup : DNS & BIND, 11.5.3. Switching Servers
upgrading BIND and : DNS & BIND, 13.4.2. Name Server Behavior
where to run : DNS & BIND, 8.1.1. Where Do I Put My Name Servers?
zone change notification
DNS & BIND, 3.1. Getting BIND
DNS & BIND, 10.2. DNS NOTIFY (Zone Change Notification)
name service
Practical UNIX & Internet Security, 16.2.6. Name Service
Practical UNIX & Internet Security, 16.2.6.2. Other naming services
sendmail, 21.1. Overview
sendmail, 21.5.2. Offsite Servers
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 8. Configuring DNS Name Service
(see also DNS)
addresses : (see addresses)
name server lookups : sendmail, 33.4.3. $[ and $]: A Special Case
process : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
security and : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
troubleshooting
TCP/IP Network Administration, 11.3. Testing Basic Connectivity
TCP/IP Network Administration, 11.6. Checking Name Service
Name Service Switch file (nsswitch.conf) : TCP/IP Network Administration, 9.3.1. The nsswitch.conf file
name-value pairs in BNU UUCP : Practical UNIX & Internet Security, 15.5.1.2. Name-value pairs
named daemon
DNS & BIND, 4.7.1. Starting Up the Name Server
Building Internet Firewalls, 8.10.5.2. Set up a real DNS
Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
TCP/IP Network Administration, 5.4. The Internet Daemon
TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
booting : TCP/IP Network Administration, 8.3.3. The Cache Initialization File
command : TCP/IP Network Administration, C.1. The named Command
configuring : TCP/IP Network Administration, 8.3. Configuring named
process : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
signals : DNS & BIND, 7.1. BIND Name Server Signals
starting at startup : TCP/IP Network Administration, 8.3.6.1. Starting named
syslog messages : DNS & BIND, 7.6.1. Common Syslog Messages
tools reference : TCP/IP Network Administration, C. A named Reference
NAMED_BIND macro : sendmail, 18.8. Alphabetized Reference
named.boot file
(see also boot file)
Practical UNIX & Internet Security, 17.3.6.1. DNS zone transfers
Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
TCP/IP Network Administration, 8.3.1. The named.boot File
TCP/IP Network Administration, 11.6.3. Cache corruption
TCP/IP Network Administration, C.1. The named Command
configuration commands
TCP/IP Network Administration, 8.3.1. The named.boot File
TCP/IP Network Administration, C.2. named.boot Configuration Commands
named.ca file : TCP/IP Network Administration, 11.6.3. Cache corruption
named_dump.db file
DNS & BIND, 7.4. Changing BIND 8 System File Locations
DNS & BIND, 13.2.2. How to Read a Database Dump
named.hosts file : TCP/IP Network Administration, 8.3.6. The named.hosts File
named.local file : TCP/IP Network Administration, 8.3.4. The named.local File
named.pid file
DNS & BIND, 7.1. BIND Name Server Signals
TCP/IP Network Administration, 11.6.3. Cache corruption
moving : DNS & BIND, 7.4. Changing BIND 8 System File Locations
named.rev file : TCP/IP Network Administration, 8.3.5. The Reverse Domain File
named.root file : DNS & BIND, 4.2.9. The Root Cache Data
named.run file
DNS & BIND, 7.5. BIND 8 Logging
DNS & BIND, 12.2. Turning On Debugging
named.stats file : DNS & BIND, 7.6.2. Understanding the BIND Statistics
moving : DNS & BIND, 7.4. Changing BIND 8 System File Locations
named-xfer program
DNS & BIND, 7.1. BIND Name Server Signals
DNS & BIND, 13.2.1. How to Use named-xfer
Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
moving : DNS & BIND, 7.4. Changing BIND 8 System File Locations
unnecessary glue data : DNS & BIND, 13.6.8.2. Unnecessary glue data
namedroppers mailing list
DNS & BIND, 3.1.1. Handy Mailing Lists and Usenet Newsgroups
DNS & BIND, 4.2.9. The Root Cache Data
names : TCP/IP Network Administration, 3.1. Names and Addresses
alternative for sendmail : sendmail, 36.1. Alternative argv[0] Names
application form : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
canonical
sendmail, 7.3.1. The hostname
sendmail, 31.10. Alphabetized Reference
canonicalizing : (see canonicalization)
changing from host to hub : sendmail, 11.6. Handling user@thishost
choosing UUCP : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
classes
sendmail, 12.1. The Class Command
sendmail, 32.2.4. Class Name Hashing Algorithm
computer
Practical UNIX & Internet Security, 16.2.3. Hostnames
Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
controlling terminal : sendmail, 31.10. Alphabetized Reference
DNS : (see DNS)
domains
(see also domain names)
Practical UNIX & Internet Security, 16.2.3. Hostnames
sendmail, 8.1. A Fictional Network
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 31.10. Alphabetized Reference
TCP/IP Network Administration, 3.3.3. Domain Names
TCP/IP Network Administration, 4. Getting Started
full sender : (see $x macro)
fully qualified
sendmail, 4.2. Verbose (-v)
sendmail, 7.3.1. The hostname
sendmail, 8.1. A Fictional Network
sendmail, 21.1. Overview
TCP/IP Network Administration, 3.3.3. Domain Names
(see also $j macro)
headers : sendmail, 35.2. Header Names
hostnames : (see hostnames)
hub, internal : sendmail, 11.4.2. A Word About ${HUB}
in NIS : TCP/IP Network Administration, 9.3. Network Information Service
local canonical
sendmail, 21.2.1. Determine the Local Canonical Name
sendmail, 31.10. Alphabetized Reference
macros
sendmail, 5.3.2. Macros
sendmail, 7.2. Defining Macros
sendmail, 20.3. Alphabetized V8.8 Subroutines
sendmail, 31.4. Macro Names
networks : DNS & BIND, 15.6. Network Names and Numbers
obtaining : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
options : sendmail, 13.1. Options: An Overview
owner : DNS & BIND, 7.6.1. Common Syslog Messages
parameter : TCP/IP Network Administration, 9.4. A BOOTP Server
RealHostName variable : sendmail, 20.1.2. Global Variables
rule set : sendmail, 29.1.2. Rule-Set Names
symbol, delivery agent : sendmail, 30.2. The Symbolic Name
trailing dot for
sendmail, 15.3. MX Records
sendmail, 17.4. Rule Set 4
sendmail, 29.5.1. Stripping Trailing Dots
unqualified
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 31.10. Alphabetized Reference
user : (see usernames)
nameser.h file : sendmail, B.1. Status file lines
nameserver attacks, DNS : Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
nameserver cache loading : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
nameserver directive
DNS & BIND, 6.1.4. The nameserver Directive
DNS & BIND, F.2.3. nameserver
NIS and : DNS & BIND, 6.4.1.2. Using DNS with NIS
nameserver entry, in resolv.conf : TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
NAPs (Network Access Points)
TCP/IP Network Administration, 1.1. TCP/IP and the Internet
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
NASA (National Aeronautics and Space Agency) : Practical UNIX & Internet Security, F.3.4.23. NASA
National Center for Supercomputer Applications (NCSA)
Practical UNIX & Internet Security, F.2.1. National Computer Security Center
TCP/IP Network Administration, 13.1. The World Wide Web
NCSA HTTPD server
Practical UNIX & Internet Security, 10.3.5. access_log Log File
(see also web servers)
NCSA Mosaic : Building Internet Firewalls, 2.5. The World Wide Web
National Computer Security Center (NCSC) : Practical UNIX & Internet Security, F.2.1. National Computer Security Center
National Institute of Standards and Technology (NIST)
Practical UNIX & Internet Security, F.3.4.26. National Institute of Standards and Technology
TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
TCP/IP Network Administration, 13.1. The World Wide Web
NIST CSRC (Computer Security Resource Clearinghouse) : Building Internet Firewalls, A.5.3. NIST CSRC
National Science Foundation (NSF)
TCP/IP Network Administration, 1.1. TCP/IP and the Internet
TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
NSFNET
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 7.4. Interior Routing Protocols
national security : Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
natural disasters
Practical UNIX & Internet Security, 1.1. What Is Computer Security?
Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
Practical UNIX & Internet Security, 7.1.6.1. Physical security for backups
Practical UNIX & Internet Security, 12.2.1.1. Fire
(see also physical security)
accidents : Practical UNIX & Internet Security, 12.2.2. Preventing Accidents
earthquakes : Practical UNIX & Internet Security, 12.2.1.4. Earthquake
fires
Practical UNIX & Internet Security, 12.2.1.1. Fire
Practical UNIX & Internet Security, 12.2.1.2. Smoke
lightning
Practical UNIX & Internet Security, 12.2. Protecting Computer Hardware
Practical UNIX & Internet Security, 12.2.1.9. Lightning
natural gas : Practical UNIX & Internet Security, 12.2.1.5. Explosion
natural mask : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
NAVCIRT (Naval Computer Incident Response Team) : Practical UNIX & Internet Security, F.3.4.44. U.S. Department of the Navy
NBMA interfaces
TCP/IP Network Administration, B.6. Interface Statements
TCP/IP Network Administration, B.8.1. The ospf Statement
ncache data category (logging) : DNS & BIND, 7.5.3. Category Details
ncheck command
Practical UNIX & Internet Security, 5.5.4.1. The ncheck command
Practical UNIX & Internet Security, 5.6. Device Files
NCSA (National Center for Supercomputer Applications)
Practical UNIX & Internet Security, F.2.1. National Computer Security Center
TCP/IP Network Administration, 13.1. The World Wide Web
NCSA HTTPD server
Practical UNIX & Internet Security, 10.3.5. access_log Log File
(see also web servers)
NCSA Mosaic : Building Internet Firewalls, 2.5. The World Wide Web
NCSC (National Computer Security Center) : Practical UNIX & Internet Security, F.2.1. National Computer Security Center
ndbm database : sendmail, 33.8. Alphabetized Reference
NDBM macro : sendmail, 18.8. Alphabetized Reference
ndc utility
DNS & BIND, 7.1. BIND Name Server Signals
DNS & BIND, 12.5. Tools
ndots substatement
DNS & BIND, 6.1.6. The options Directive
DNS & BIND, F.2.6. options ndots (4.9.3 and later versions)
NEED... macros : sendmail, 18.8. Alphabetized Reference
needexpnhelo (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
needmailhelo (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
needvrfyhelo (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
negative caching
DNS & BIND, 2.7. Caching
DNS & BIND, 2.7.1. Time to Live
DNS & BIND, 12.4. The Resolver Search Algorithm and Negative Caching
DNS & BIND, 13.5.7. Other Name Servers Don't Cache Your Negative Answers
negative precedence values : sendmail, 14.4. Precedence
neighbors
acquiring : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
allowing
TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
TCP/IP Network Administration, B.8.6. The egp Statement
nested
angle brackets
sendmail, 10.4. Nested Angle Brackets
sendmail, 17.1.1.2. Strip to left of <
directories : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
IP over IP : Building Internet Firewalls, 6.3.3.5. IP over IP
macro conditionals : sendmail, 31.6.1. Conditionals May Nest
net domain
DNS & BIND, 2.2.1. Top-Level Domains
TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
NET... macros : sendmail, 18.8. Alphabetized Reference
Net/Dest value
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
TCP/IP Network Administration, 6.1.5.5. Point-to-point
Net::DNS module : DNS & BIND, 14.3. Perl Programming with Net::DNS
netacl program : Building Internet Firewalls, 5.8.3.2. Using netacl to protect services
netconfig : TCP/IP Network Administration, 4.7. netconfig
NETDB_INTERNAL error : DNS & BIND, 14.2.4. The Resolver Library Routines
Netgroup table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
netgroups file : DNS & BIND, 6.3.1. Differences in Service Behavior
netgroups, NIS
Practical UNIX & Internet Security, 19.4.4. NIS Netgroups
Practical UNIX & Internet Security, 19.4.4.6. NIS is confused about "+"
limiting imported accounts : Practical UNIX & Internet Security, 19.4.4.2. Using netgroups to limit the importing of accounts
NetInfo
Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
Practical UNIX & Internet Security, 16.2.6.2. Other naming services
sendmail, 33.8. Alphabetized Reference
NETINFO macro : sendmail, 18.8. Alphabetized Reference
Netmasks table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
netnews~firewalls : Practical UNIX & Internet Security, 21.4.3. Netnews
.netrc file : Practical UNIX & Internet Security, 10.4.3. Network Setup
Netscape Navigator
Building Internet Firewalls, 2.5. The World Wide Web
TCP/IP Network Administration, 13.1. The World Wide Web
encryption system of : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
random number generator : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
netstat command
Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
-a option : Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
-in command : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
-n option : Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
-ni command : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
-nr command
TCP/IP Network Administration, 2.5. The Routing Table
TCP/IP Network Administration, 7.3.1. Adding Static Routes
TCP/IP Network Administration, 11.5. Checking Routing
to display routing table : TCP/IP Network Administration, 12.7.2. Routing control
troubleshooting with
TCP/IP Network Administration, 11.2. Diagnostic Tools
TCP/IP Network Administration, 11.3. Testing Basic Connectivity
TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
netsvc.conf file : DNS & BIND, 6.4.4. IBM's AIX
Network Access Layer
TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
protocols : TCP/IP Network Administration, 3.6. Bootstrap Protocol
Network Access Points (NAPs)
TCP/IP Network Administration, 1.1. TCP/IP and the Internet
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
Network Control protocols : TCP/IP Network Administration, 6.2.1. The Serial Protocols
Network File System : (see NFS)
Network Information Center : (see NIC)
Network Information Service : (see NIS)
network interface interval : DNS & BIND, 10.4.3.2. Interface interval
Network Layer
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
Network Management Station (NMS) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
network masks : DNS & BIND, 10.11.3. Preventing Unauthorized Zone Transfers
Network News Transfer Protocol (NNTP)
Building Internet Firewalls, 2.4. Usenet News
Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP) (TCP Port
TCP/IP Network Administration, 13.5.1. Newsgroups
(see also Usenet news)
configuring
Building Internet Firewalls, 8.5. Network News Transfer Protocol
Building Internet Firewalls, 9.1.1.4. NNTP
Building Internet Firewalls, 9.2.1.4. NNTP
network services
Building Internet Firewalls, 2. Internet Services
Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
Practical UNIX & Internet Security, 17. TCP/IP Services
Practical UNIX & Internet Security, 17.7. Summary
Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
Practical UNIX & Internet Security, G. Table of IP Services
administration : (see system administration)
booting : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
configuring : Building Internet Firewalls, 8. Configuring Internet Services
contacting providers about incidents : Building Internet Firewalls, 13.1.4.3. Vendors and service providers
default deny stance : Building Internet Firewalls, 3.5.1. Default Deny Stance: That Which Is Not
default permit stance : Building Internet Firewalls, 3.5.2. Default Permit Stance: That Which Is
direct access to : Building Internet Firewalls, 7.1.1.1. Proxy services allow users to access Internet services
disabling those not required : Building Internet Firewalls, 5.8.2. Disabling Nonrequired Services
DNS : (see DNS)
encryption with : (see encryption)
filtering by : Building Internet Firewalls, 6.7. Filtering by Service
finger : (see finger service)
FTP : (see FTP)
inbound : (see inbound, services)
information lookup services : Building Internet Firewalls, 8.8. Information Lookup Services
installing and modifying : Building Internet Firewalls, 5.8.3. Installing and Modifying Services
LAN-oriented : Building Internet Firewalls, 5.6. Selecting Services Provided by the
NFS (Network File System) : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
NNTP : (see NNTP)
NTP : (see NTP)
overloading : Practical UNIX & Internet Security, 25.3.1. Service Overloading
passwords for : (see passwords)
POP : (see POP)
protecting with TCP Wrapper : Building Internet Firewalls, 5.8.3.1. Using the TCP Wrapper package to protect services
proxy : (see proxy servers/services)
r commands : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
real-time conferencing : Building Internet Firewalls, 8.9. Real-Time Conferencing Services
root account with : (see root account/user)
RPC (Remote Procedure Call) : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
securing
Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
Practical UNIX & Internet Security, 19.1. Securing Network Services
(see also security)
selecting for bastion host : Building Internet Firewalls, 5.6. Selecting Services Provided by the
SMTP : (see SMTP)
SNMP : (see SNMP)
spoofing
Practical UNIX & Internet Security, 8.5.3.1. Trusted path
Practical UNIX & Internet Security, 16.3. IP Security
Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
Practical UNIX & Internet Security, 19.4.4.4. Spoofing RPC
Practical UNIX & Internet Security, 19.4.4.5. Spoofing NIS
started by /etc/rc : Building Internet Firewalls, 5.8.2.1. How are services managed?
store-and-forward
Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
systat service : Practical UNIX & Internet Security, 17.3.1. systat (TCP Port 11)
Telnet : (see Telnet service)
TFTP : (see TFTP)
UUCP : (see UUCP)
Network Solutions, Inc. (NSI) : DNS & BIND, 3.2.4. Registering with Your Parent
Network Terminal Protocol (TELNET) : TCP/IP Network Administration, 1.7. Application Layer
Network Time Protocol
Building Internet Firewalls, 2.11. Time Service
Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
configuring : Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
Secure RPC and : Practical UNIX & Internet Security, 19.3.1.3. Setting the window
"network unreachable" message
DNS & BIND, 6.1.4.1. One name server configured
DNS & BIND, 8.5.1. Outages
TCP/IP Network Administration, 11.3. Testing Basic Connectivity
TCP/IP Network Administration, 11.5. Checking Routing
(see also ICMP)
Network/Destination value
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
TCP/IP Network Administration, 6.1.5.5. Point-to-point
networks and networking
DNS & BIND, 13.3.8. 8. Loss of Network Connectivity
Practical UNIX & Internet Security, 16. TCP/IP Networks
Practical UNIX & Internet Security, 16.5. Summary
sendmail, 3.3. Role in Network Transport
(see also connections/connectivity)
10Base-T : Practical UNIX & Internet Security, 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
access
access layer, TCP/IP : Building Internet Firewalls, C.4. Network Access Layer
balancing against computer security : TCP/IP Network Administration, 12. Network Security
troubleshooting : TCP/IP Network Administration, 11.4. Troubleshooting Network Access
address translation (NAT) : TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
avoiding problems
TCP/IP Network Administration, 11.4.2.1. ARP problem case study
TCP/IP Network Administration, 11.9. Simple Network Management Protocol
decentralized : TCP/IP Network Administration, 2.3. Subnets
defined
TCP/IP Network Administration, 1. Overview of TCP/IP
TCP/IP Network Administration, 11. Troubleshooting TCP/IP
developing feel for : TCP/IP Network Administration, 12.4.1. Know Your System
need for information about : TCP/IP Network Administration, Preface
security responsibilites of : TCP/IP Network Administration, 12.1.3. Writing a Security Policy
simplifying : TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
allowing threats from : Practical UNIX & Internet Security, 11.4. Entry
AppleTalk : sendmail, 3.3.3. Other Protocols
architecture : (see firewalls, architecture of)
ARPANET
Practical UNIX & Internet Security, 16.1.1. The InternetWe recommend that readers
TCP/IP Network Administration, 1.1. TCP/IP and the Internet
TCP/IP Network Administration, 1.5.1.1. The datagram
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 6.2. TCP/IP Over a Serial Line
backing up
Practical UNIX & Internet Security, 7.2.2. Small Network of Workstations and a Server
Practical UNIX & Internet Security, 7.2.4. Large Service-Based Networks with Large Budgets
Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
break-ins, increasing : TCP/IP Network Administration, 12. Network Security
building : TCP/IP Network Administration, Foreword from the First Edition
cables for : (see cables)
checking connectivity of : (see ping command)
checklist for
Practical UNIX & Internet Security, A.1.1.15. Chapter 16: TCP/IP Networks
Practical UNIX & Internet Security, A.1.1.16. Chapter 17: TCP/IP Services
computer networks : Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
configuration files : Practical UNIX & Internet Security, 10.4.3. Network Setup
connected or not connected to Internet : TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
connections : Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
connectors for : Practical UNIX & Internet Security, 12.2.4.3. Network connectors
databases, network : Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
DECnet
Practical UNIX & Internet Security, 16.4.3. DECnet
sendmail, 3.3.3. Other Protocols
$C macro : sendmail, 31.10. Alphabetized Reference
denial of service on : (see denial of service)
diameter
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
disabling physically : Practical UNIX & Internet Security, 25.3.3. Signal Grounding
disconnecting, after incident
Building Internet Firewalls, 13.1.2. Disconnect or Shut Down, as
Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
encryption : Building Internet Firewalls, 10.5. Network-Level Encryption
File System : (see NFS)
forwarding over
sendmail, 29.6.6. Forwarding over the Network
TCP/IP Network Administration, 1.5.1.4. Passing datagrams to the transport layer
loops : sendmail, 25.7.2. Forwarding Loops
Resent- headers : sendmail, 35.7. Forwarding with Resent-Headers
hardware
TCP/IP Network Administration, 1.7. Application Layer
(see also physical network)
problems with
TCP/IP Network Administration, 11.3.1. The ping Command
TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
TCP/IP Network Administration, 11.4.4.1. Network hardware problems
with built-in diagnostic software : TCP/IP Network Administration, 11.3.1. The ping Command
heterogeneous : TCP/IP Network Administration, 1.1.2. Protocol Standards
insecure : Building Internet Firewalls, 4.4.2. Insecure Networks
interfaces : TCP/IP Network Administration, 3.1. Names and Addresses
enabling or disabling : TCP/IP Network Administration, 6.1.5.1. Enabling and disabling the interface
information need for : TCP/IP Network Administration, 6.1. The ifconfig Command
Internet : (see Internet)
ISDN
DNS & BIND, 15.7.3. X25, ISDN, and RT
DNS & BIND, A.1.3.2. ISDN Integrated Services Digital Network address - experimental
joint : Building Internet Firewalls, 4.4.4. Joint Venture Firewalls
lab/test : Building Internet Firewalls, 4.4.1. Laboratory Networks
LANs : (see LANs)
location of bastion host on : Building Internet Firewalls, 5.5. Locating the Bastion Host on the Network
logging
Practical UNIX & Internet Security, 10.3.6. Logging Network Services
Practical UNIX & Internet Security, 10.5.2.2. Logging across the network
(see also logs/logging)
loopback
DNS & BIND, 4.2.8. The Loopback Address
DNS & BIND, 6.1.4. The nameserver Directive
management services : Building Internet Firewalls, 2.10. Network Management Services
configuring : Building Internet Firewalls, 8.12. Network Management Services
MANs : Practical UNIX & Internet Security, 16.1. Networking
maps drawn by monitors : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
mask
TCP/IP Network Administration, 2.5. The Routing Table
TCP/IP Network Administration, 7.4.2. RIP Version 2
mobile computing : Practical UNIX & Internet Security, 8.7. One-Time Passwords
monitoring
Building Internet Firewalls, 5.9.2. Consider Writing Software to Automate Monitoring
TCP/IP Network Administration, 11.7. Analyzing Protocol Problems
netstat : Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
names and numbers : DNS & BIND, 15.6. Network Names and Numbers
news : (see Usenet news)
NFSNET
Practical UNIX & Internet Security, 16.1.1. The InternetWe recommend that readers
TCP/IP Network Administration, 1.1. TCP/IP and the Internet
numbers
TCP/IP Network Administration, 2.2.1. Address Classes
TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
packet switching
Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
Practical UNIX & Internet Security, 16.3. IP Security
TCP/IP Network Administration, 1.5.1.1. The datagram
TCP/IP Network Administration, 1.7. Application Layer
perimeter
Building Internet Firewalls, 4.1. Some Firewall Definitions
Building Internet Firewalls, 4.2.3.1. Perimeter network
problems, how to approach : TCP/IP Network Administration, 11. Troubleshooting TCP/IP
processes : TCP/IP Network Administration, 8.2. Configuring the Resolver
protecting internally : Building Internet Firewalls, 4.4. Internal Firewalls
providers : (see ISPs)
registering : DNS & BIND, 3.2.3. Checking That Your Network Is Registered
resources, controlling : TCP/IP Network Administration, 12.1.3. Writing a Security Policy
saturated : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
scanning : Practical UNIX & Internet Security, 17.6. Network Scanning
security : (see security)
servers
TCP/IP Network Administration, 2.7.2. Port Numbers
TCP/IP Network Administration, 9. Configuring Network Servers
services : (see network services)
shared media : TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
SOCKS for : (see SOCKS package)
spoofing
Practical UNIX & Internet Security, 8.5.3.1. Trusted path
Practical UNIX & Internet Security, 16.3. IP Security
Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
Practical UNIX & Internet Security, 19.4.4.4. Spoofing RPC
Practical UNIX & Internet Security, 19.4.4.5. Spoofing NIS
subdividing : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
subnetting
DNS & BIND, 6.1.5. The sortlist Directive
DNS & BIND, 6.3.1. Differences in Service Behavior
DNS & BIND, 10.5.2. Remote Multihomed Hosts
DNS & BIND, 10.5.3. Address Sorting on Subnetted Networks
DNS & BIND, F.1.6. sortlist
DNS & BIND, F.2.5. sortlist (4.9.3 and later versions)
TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
on/off octet boundaries : DNS & BIND, 9.5.1. Subnetting on an Octet Boundary
support : sendmail, 18.8. Alphabetized Reference
taps : Building Internet Firewalls, 1.2.1.3. Information Theft
TCP/IP : (see TCP/IP protocol and services)
Time Protocol : (see NTP)
topology of : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
transferring information across : (see packet filtering)
underlying : TCP/IP Network Administration, 1.4. Network Access Layer
UNIX and : Practical UNIX & Internet Security, 16.1.2. Networking and UNIX
unreliable : TCP/IP Network Administration, 11.3.1. The ping Command
unusual activity on : TCP/IP Network Administration, 12.4.1. Know Your System
usage, monitoring : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
UUCP over
Practical UNIX & Internet Security, 15.8. UUCP Over Networks
(see also UUCP)
WANs : Practical UNIX & Internet Security, 16.1. Networking
weaving : Practical UNIX & Internet Security, 16.1.1.1. Who is on the Internet?
X.25 : TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
networks file
TCP/IP Network Administration, 3.2. The Host Table
TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
TCP/IP Network Administration, 7.3. Building a Static Routing Table
TCP/IP Network Administration, 9.3. Network Information Service
as maps : TCP/IP Network Administration, 3.3.5. Network Information Service
Networks table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
Neumann, Peter : Practical UNIX & Internet Security, 1.3. History of UNIX
newaliases command
sendmail, 4.1.3. Rebuild Aliases Mode (-bi)
sendmail, 24.5.3. Prevent Simultaneous Rebuilds
sendmail, 36.1.3. newaliases
NEWDB macro : sendmail, 18.8. Alphabetized Reference
newgrp command : Practical UNIX & Internet Security, 4.1.3.2. Groups and older AT&T UNIX
newkey -u command
Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
Practical UNIX & Internet Security, 19.5.4.2. When a user's passwords don't match
newlines : (see whitespace)
newly registered hosts : TCP/IP Network Administration, 3.2. The Host Table
news (Usenet)
Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP) (TCP Port
Practical UNIX & Internet Security, E.2. Usenet Groups
TCP/IP Network Administration, 13.5.1. Newsgroups
TCP/IP Network Administration, E.3.5. MAILER
(see also NNTP)
cleanup scripts : Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms
encryption for : (see ROT13 algorithm)
mailing list gateways to : sendmail, 25.5.2. Gateway Lists to News
message subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
news user : Practical UNIX & Internet Security, 4.1. Users and Groups
newsgroups
Building Internet Firewalls, 2.4. Usenet News
TCP/IP Network Administration, 13.5.1. Newsgroups
BIND-related : DNS & BIND, 3.1.1. Handy Mailing Lists and Usenet Newsgroups
defamation/harassment via : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
for security information : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
keeping current : Building Internet Firewalls, 12.3.1.2. Newsgroups
posting breakins to : Practical UNIX & Internet Security, 24.6. Resuming Operation
reporting security holes on : Practical UNIX & Internet Security, 2.5.1. Going Public
security resources via : Building Internet Firewalls, A.4. Newsgroups
using
TCP/IP Network Administration, 4.1.1. Network Contacts
TCP/IP Network Administration, 13.5.1. Newsgroups
next hop
Building Internet Firewalls, C.11. The Routing Table
TCP/IP Network Administration, 7.4.3. Open Shortest Path First
specifying : TCP/IP Network Administration, 7.3. Building a Static Routing Table
in RIP-2 : TCP/IP Network Administration, 7.4.2. RIP Version 2
NEXTSTEP Window Server (NSWS) : Practical UNIX & Internet Security, 17.3.16. NEXTSTEP Window Server
nf files : sendmail, 23.2.4. The ID Creation File (obsolete as of V5.62): nf
NFS (Network File System)
DNS & BIND, 6.3.1. Differences in Service Behavior
Building Internet Firewalls, 2.12. Network File Systems
Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
Practical UNIX & Internet Security, 19. RPC, NIS, NIS+, and Kerberos
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 3.7.1. File Sharing
TCP/IP Network Administration, 9.1. The Network File System
TCP/IP Network Administration, 9.6. Managing Distributed Servers
authentication and
Practical UNIX & Internet Security, 19.2.2. RPC Authentication
Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
benefits of : TCP/IP Network Administration, 9.1. The Network File System
checklist for : Practical UNIX & Internet Security, A.1.1.19. Chapter 20: NFS
configuring : Building Internet Firewalls, 8.14. Network File System
exporting news via : Building Internet Firewalls, 8.5.3.3. Exporting news to clients via
file permissions : Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
find command on : Practical UNIX & Internet Security, 5.5.4. Finding All of the SUID and SGID Files
-local option : Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
MOUNT : Practical UNIX & Internet Security, 20.1.1. NFS History
Secure NFS : (see Secure NFS)
server, and UUCP : Practical UNIX & Internet Security, 15.3. UUCP and Security
services of : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
technical description of : Practical UNIX & Internet Security, 20.1.1. NFS History
trusted hosts and : Practical UNIX & Internet Security, 17.3.18.2. The problem with trusted hosts
-xdev option : Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
NFS-based print services : TCP/IP Network Administration, 9.1.5.1. NFS print services
nfs.client script : TCP/IP Network Administration, 9.1.1. NFS Daemons
nfs.server script : TCP/IP Network Administration, 9.1.1. NFS Daemons
nfsd (NFS daemon) : TCP/IP Network Administration, 9.1.1. NFS Daemons
NFSNET backbone : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
NIC (Network Information Center)
DNS & BIND, 1.2.1. The History of the Domain Name System
DNS & BIND, 13.3.9. 9. Missing Subdomain Delegation
Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
handle : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
whois service
DNS & BIND, 3.2.1.1. whois
DNS & BIND, 3.2.4. Registering with Your Parent
nice command : Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
nice numbers : Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
niceness, delivery agent : sendmail, 30.4. The Equates
NIS (Network Information Service)
DNS & BIND, 2.1.2. Domains
DNS & BIND, 6.4.1. Sun's SunOS 4.x
DNS & BIND, 6.4.1.3. Ignoring NIS
Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
Practical UNIX & Internet Security, 3.4. Changing Your Password
Practical UNIX & Internet Security, 19. RPC, NIS, NIS+, and Kerberos
Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
TCP/IP Network Administration, 3.3.5. Network Information Service
TCP/IP Network Administration, 9.3. Network Information Service
+ in
Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
Practical UNIX & Internet Security, 19.4.4.6. NIS is confused about "+"
clients : Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
domains : Practical UNIX & Internet Security, 19.4.3. NIS Domains
maps
Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
TCP/IP Network Administration, 3.3.5. Network Information Service
TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
TCP/IP Network Administration, 10.6.1. Pattern Matching
netgroups
Practical UNIX & Internet Security, 19.4.4. NIS Netgroups
Practical UNIX & Internet Security, 19.4.4.6. NIS is confused about "+"
limiting imported accounts : Practical UNIX & Internet Security, 19.4.4.2. Using netgroups to limit the importing of accounts
nslookup and : DNS & BIND, 11.1.5. Using NIS and /etc/hosts
Secure RPC with
Practical UNIX & Internet Security, 19.3.2. Setting Up Secure RPC with NIS
Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
spoofing : Practical UNIX & Internet Security, 19.4.4.5. Spoofing NIS
troubleshooting : DNS & BIND, 13.1. Is NIS Really Your Problem?
UDP : Practical UNIX & Internet Security, 16.2.4.3. UDP
Yellow Pages : Practical UNIX & Internet Security, 16.2.6.2. Other naming services
nis database class : sendmail, 33.8. Alphabetized Reference
NIS macro : sendmail, 18.8. Alphabetized Reference
NIS+
Building Internet Firewalls, 8.15. Network Information Service/Yellow
Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
Practical UNIX & Internet Security, 3.4. Changing Your Password
Practical UNIX & Internet Security, 16.2.6.2. Other naming services
Practical UNIX & Internet Security, 19.5. Sun's NIS+
Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
TCP/IP Network Administration, 9.3.2. NIS+
integrity-checking software for : Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
principals : Practical UNIX & Internet Security, 19.5.1. What NIS+ Does
Secure RPC with
Practical UNIX & Internet Security, 19.3.2. Setting Up Secure RPC with NIS
Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
NIS/YP (Network Information Service)
Building Internet Firewalls, 2.9. Name Service
Building Internet Firewalls, 5.8.2.4. Which services should you disable?
Building Internet Firewalls, 8.10. Domain Name System
configuring : Building Internet Firewalls, 8.15. Network Information Service/Yellow
nisaddcred command : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
niscat command : Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
nischown command : Practical UNIX & Internet Security, 19.5.4. Using NIS+
nispasswd command
Practical UNIX & Internet Security, 3.4. Changing Your Password
Practical UNIX & Internet Security, 19.5.4. Using NIS+
Practical UNIX & Internet Security, 19.5.4.2. When a user's passwords don't match
nisplus database class : sendmail, 33.8. Alphabetized Reference
NISPLUS macro : sendmail, 18.8. Alphabetized Reference
NIST (National Institute of Standards and Technology)
Practical UNIX & Internet Security, F.2.1. National Computer Security Center
Practical UNIX & Internet Security, F.3.4.26. National Institute of Standards and Technology
TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
TCP/IP Network Administration, 13.1. The World Wide Web
NIST CSRC (Computer Security Resource Clearinghouse) : Building Internet Firewalls, A.5.3. NIST CSRC
nmed-xfer file : DNS & BIND, 10.11.4. Running BIND as a Non-Root User
NMS (Network Management Station) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
NNTP (Network News Transfer Protocol)
Building Internet Firewalls, 2.4. Usenet News
Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP) (TCP Port
TCP/IP Network Administration, 13.5.1. Newsgroups
(see also Usenet news)
configuring
Building Internet Firewalls, 8.5. Network News Transfer Protocol
Building Internet Firewalls, 9.1.1.4. NNTP
Building Internet Firewalls, 9.2.1.4. NNTP
NNTPSERVER variable : sendmail, 31.2.1. Syntax of the Command-Line Macro's Text
no answer error message : TCP/IP Network Administration, 11.3. Testing Basic Connectivity
NO_DATA error : DNS & BIND, 14.2.4. The Resolver Library Routines
no-fetch-glue substatement
DNS & BIND, 10.9. A Nonrecursive Name Server
DNS & BIND, 10.11.5. Delegated Name Server Configuration
DNS & BIND, F.1.10.3. options no-fetch-glue
NO_GROUP_SET macro : sendmail, 18.8. Alphabetized Reference
"No local mailer defined" message : sendmail, 6.2.1. Testing the client.cf File
"no mailer in parsed address" error : sendmail, 29.6. Rule Set 0
"no more data from sender" (FIN) bit : TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
"No NS Record for SOA MNAME" message : DNS & BIND, 13.5.2. Name Server Reports No NS Record for SOA MNAME
NO_RECOVERY error : DNS & BIND, 14.2.4. The Resolver Library Routines
no-recursion substatement
DNS & BIND, 10.9. A Nonrecursive Name Server
DNS & BIND, 10.11.5. Delegated Name Server Configuration
DNS & BIND, F.1.10.2. options no-recursion
"no response from server" message : DNS & BIND, 11.7.2. No Response from Server
"No root nameservers for class #" message : DNS & BIND, 7.6.1. Common Syslog Messages
"No such file or directory" error : sendmail, 12.2. The File Form of Class
nobody user
Practical UNIX & Internet Security, 4.1. Users and Groups
Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
sendmail, 22.8.3.1. The DefaultUser option
TCP/IP Network Administration, 5.4. The Internet Daemon
TCP/IP Network Administration, 9.1.2.1. The share command
nocanonify feature : sendmail, 19.6. Alphabetized m4 Macros
nod2 option (nslookup)
DNS & BIND, 11.3. Option Settings
DNS & BIND, 11.6.1. Seeing the Query and Response Packets
nodebug option (nslookup)
DNS & BIND, 11.3. Option Settings
DNS & BIND, 11.6.1. Seeing the Query and Response Packets
nodefname option (nslookup) : DNS & BIND, 11.3. Option Settings
nodes : DNS & BIND, 2.1. The Domain Name Space
nodns feature
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 21.1.2. Make sendmail DNS Aware
noexpn (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
noforward patch : DNS & BIND, 15.4.5. Views
noignoretc option (nslookup) : DNS & BIND, 11.3. Option Settings
noise, electrical : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
non-connected network : TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
non-encoded binary data : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
non-Internet sites, delivering mail to : TCP/IP Network Administration, C.3.1.4. Mail exchanger record
non-octet boundaries, subnetting on : DNS & BIND, 9.5.2. Subnetting on a Non-Octet Boundary
nonadaptive modems : (see modems)
nonauthoritative nslookup answers : DNS & BIND, 11.5.2. Authoritative Versus Nonauthoritative Answers
nonauthoritative servers : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
nonblocking systems : Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
nonbroadcast multi-access (NBMA) interfaces
TCP/IP Network Administration, B.6. Interface Statements
TCP/IP Network Administration, B.8.1. The ospf Statement
nonce : Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
"nonexistent domain" message : DNS & BIND, 11.7.3. No PTR Data for Name Server's Address
noninteractive nslookup : DNS & BIND, 11.2. Interactive Versus Noninteractive
nonrecursive (iterative) resolution : DNS & BIND, 2.6.2. Recursion
nonrecursive name servers : DNS & BIND, 10.9. A Nonrecursive Name Server
nonrecursive queries
DNS & BIND, 2.6.2. Recursion
DNS & BIND, 10.7. Building Up a Large Site-wide Cache with Forwarders
DNS & BIND, 14.1.1. A Typical Problem
TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
nonrepudiation : Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
nonrouting dual-homed hosts
Building Internet Firewalls, 5.2.1. Nonrouting Dual-homed Hosts
Building Internet Firewalls, 5.8.2.5. Turning off routing
NORDUNET : Practical UNIX & Internet Security, F.3.4.27. NORDUNET
NOREAD= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
NoRecipientAction option : sendmail, 34.8. Alphabetized Reference
norecurse option (nslookup)
DNS & BIND, 11.3. Option Settings
DNS & BIND, 11.6.2. Querying Like a BIND Name Server
normalizing addresses : sendmail, 17.1.2. Normalize the Address
Northwestern University : Practical UNIX & Internet Security, F.3.4.28. Northwestern University
nosearch option (nslookup)
DNS & BIND, 11.3. Option Settings
DNS & BIND, 11.4. Avoiding the Search List
DNS & BIND, 11.6.2. Querying Like a BIND Name Server
nospoof keyword : DNS & BIND, 6.4.8. Linux
nosuid : Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
notation, dotted decimal : TCP/IP Network Administration, 2.3. Subnets
notification of changed zones
DNS & BIND, 3.1. Getting BIND
DNS & BIND, 10.2. DNS NOTIFY (Zone Change Notification)
NOTIFY command (SMTP) : sendmail, 36.7. Alphabetized Reference
notify data category (logging) : DNS & BIND, 7.5.3. Category Details
NOTIFY extension, DSN : sendmail, 23.9. The qf File Internals
NOTIFY request : DNS & BIND, 10.2. DNS NOTIFY (Zone Change Notification)
notifying people about problems
Building Internet Firewalls, 13.1.4. Make `Incident in Progress'
Building Internet Firewalls, 13.4.4. Planning for Notification of People
TCP/IP Network Administration, 12.4.2. Looking for Trouble
TCP/IP Network Administration, 12.4.2.2. Checking login activity
notsticky feature : sendmail, 19.6. Alphabetized m4 Macros
NOTUNIX macro : sendmail, 18.8. Alphabetized Reference
nouucp feature : sendmail, 19.6. Alphabetized m4 Macros
novc option (nslookup) : DNS & BIND, 11.3. Option Settings
Novell : Practical UNIX & Internet Security, 1.3. History of UNIX
novrfy (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
Nowitz, David : Practical UNIX & Internet Security, 15.2. Versions of UUCP
NOWRITE= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
NP keyword : TCP/IP Network Administration, 12.2.1. The Shadow Password File
npasswd package : Practical UNIX & Internet Security, 8.8.2. Constraining Passwords
NPROC variable : Practical UNIX & Internet Security, 25.2.1.1. Too many processes
nrcpts= equate (syslog output) : sendmail, 26.1.3.6. nrcpts= the number of recipients
NS query : TCP/IP Network Administration, 11.6. Checking Name Service
NS records
DNS & BIND, 4.2.1. The db Files
DNS & BIND, 4.2.4. NS Records
DNS & BIND, 4.8. Running a Slave Name Server
DNS & BIND, A.1.2.11. NS name server
delegated name servers : DNS & BIND, 10.11.5. Delegated Name Server Configuration
no NS records for SOA MNAME : DNS & BIND, 13.5.2. Name Server Reports No NS Record for SOA MNAME
queries statistic : DNS & BIND, 7.6.2. Understanding the BIND Statistics
NS resource records
TCP/IP Network Administration, 8.3.5. The Reverse Domain File
TCP/IP Network Administration, 8.3.6. The named.hosts File
TCP/IP Network Administration, C.3.1.2. Name server record
ns_get32 routine : DNS & BIND, 14.2.6. The Name Server Library Routines
ns_init_parse routine : DNS & BIND, 14.2.6. The Name Server Library Routines
ns_msg_count routine : DNS & BIND, 14.2.6. The Name Server Library Routines
ns_msg_get_flag routine : DNS & BIND, 14.2.6. The Name Server Library Routines
ns_msg_id routine : DNS & BIND, 14.2.6. The Name Server Library Routines
ns_name_compress routine : DNS & BIND, 14.2.6. The Name Server Library Routines
ns_name_skip routine : DNS & BIND, 14.2.6. The Name Server Library Routines
ns_name_uncompress routine : DNS & BIND, 14.2.6. The Name Server Library Routines
ns_parserr routine : DNS & BIND, 14.2.6. The Name Server Library Routines
ns_put32 routine : DNS & BIND, 14.2.6. The Name Server Library Routines
NSA (National Security Agency) : Practical UNIX & Internet Security, F.2.2. National Security Agency (NSA)
NSAP queries statistic : DNS & BIND, 7.6.2. Understanding the BIND Statistics
nscd daemon : DNS & BIND, 6.4.2.1. nscd
nservers option : TCP/IP Network Administration, 9.1.1. NFS Daemons
NSF (National Science Foundation)
TCP/IP Network Administration, 1.1. TCP/IP and the Internet
TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
NSFNET
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 7.4. Interior Routing Protocols
NSFNET network : DNS & BIND, 1.1. A (Very) Brief History of the Internet
NSFNET traffic reports : DNS & BIND, 8.1.2. Capacity Planning
NSI (Network Solutions, Inc.) : DNS & BIND, 3.2.4. Registering with Your Parent
nslookup
sendmail, 21.4. How to Use nslookup
TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
TCP/IP Network Administration, 8.4. Using nslookup
in troubleshooting
TCP/IP Network Administration, 11.2. Diagnostic Tools
TCP/IP Network Administration, 11.3. Testing Basic Connectivity
TCP/IP Network Administration, 11.6. Checking Name Service
nslookup program
DNS & BIND, Versions
DNS & BIND, 3.1.2. Finding IP Addresses
DNS & BIND, 3.2.2.1. The us domain
DNS & BIND, 11. nslookup
common tasks : DNS & BIND, 11.5. Common Tasks
finding out what is looked up : DNS & BIND, 11.7.6. Finding Out What Is Being Looked Up
interactive vs. noninteractive : DNS & BIND, 11.2. Interactive Versus Noninteractive
looking up CNAMEs : DNS & BIND, 15.1.5. Looking Up CNAMEs
mimicking name servers : DNS & BIND, 11.6.2. Querying Like a BIND Name Server
option settings : DNS & BIND, 11.3. Option Settings
shell script programming : DNS & BIND, 14.1. Shell Script Programming with nslookup
switching name servers : DNS & BIND, 11.5.3. Switching Servers
testing domain setup : DNS & BIND, 4.7.3. Testing Your Setup with nslookup
troubleshooting : DNS & BIND, 11.7. Troubleshooting nslookup Problems
zone transfers with : DNS & BIND, 11.6.3. Zone Transfers
.nslookuprc file : DNS & BIND, 11.3.1. The .nslookuprc File
nsswitch.conf file
DNS & BIND, 6.4.2. Sun's Solaris 2.x
DNS & BIND, 6.4.3. HP's HP-UX
DNS & BIND, 13.1. Is NIS Really Your Problem?
sendmail, 7.3.1. The hostname
sendmail, D.4. L and G Configuration Commands
TCP/IP Network Administration, 9.3.1. The nsswitch.conf file
TCP/IP Network Administration, E.4.2. sendmail Options
NSTATS messages : DNS & BIND, 7.6.1. Common Syslog Messages
nsupdate program : DNS & BIND, 10.3. DNS Dynamic Update
NSWS (NextStep Window Server) : Practical UNIX & Internet Security, 17.3.16. NEXTSTEP Window Server
NTP (Network Time Protocol)
Building Internet Firewalls, 2.11. Time Service
Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
configuring : Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
Secure RPC and : Practical UNIX & Internet Security, 19.3.1.3. Setting the window
NU-CERT : Practical UNIX & Internet Security, F.3.4.28. Northwestern University
null
addresses
sendmail, 10.3. Missing Addresses
sendmail, 17.1.1.3. Handle null address
sendmail, 30.8. Alphabetized F= Flags
database class : sendmail, 33.8. Alphabetized Reference
device : Practical UNIX & Internet Security, 5.6. Device Files
sendmail.cf file : sendmail, 5.2. The Minimal File
null channel (logging) : DNS & BIND, 7.5.2.3. Null channel
null file : DNS & BIND, 10.11.4. Running BIND as a Non-Root User
NULL records : DNS & BIND, A.1.2.12. NULL null - experimental
null.mc file : sendmail, 16.2. The null.mc File
nullclient feature : sendmail, 19.6. Alphabetized m4 Macros
numbers
sendmail, 29.1.1. Rule-Set Numbers
(see also identifiers)
ARIN registry
DNS & BIND, 3.2.3. Checking That Your Network Is Registered
DNS & BIND, E. in-addr.arpa Registration Form
delivery failure count : sendmail, 23.9. The qf File Internals
DNS errors : sendmail, B.1. Status file lines
inode and device : sendmail, 23.9. The qf File Internals
network numbers : DNS & BIND, 15.6. Network Names and Numbers
port : Building Internet Firewalls, C.12.2. Port Numbers
protocol : Building Internet Firewalls, C.12.1. Protocol Numbers
rule sets
sendmail, 8.3. Rule Sets
sendmail, 29.1.1. Rule-Set Numbers
serial numbers : (see serial numbers)
SMTP status codes : sendmail, B.1. Status file lines
UNIX errors : sendmail, B.1. Status file lines
numeric addresses : (see addresses)
numeric values, in printcap parameters : TCP/IP Network Administration, 9.2.1. The printcap File
numeric-type arguments : sendmail, 34.5. Option Argument Types
nuucp account
Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.