Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: S
- S command (sendmail): 10.6.3. The Set Ruleset Command (TCP/IP Network Administration)
- sabotage (see denial of service attacks)
- SAGE (System Administrators Guild): A.6.4. System Administrators Guild (SAGE) (Building Internet Firewalls)
- B.1. Sources of Information (Network Troubleshooting Tools)
- SAINT (automated system monitoring): 12.4.3. Automated Monitoring (TCP/IP Network Administration)
- sales information: 1.3.1. Documentation (Network Troubleshooting Tools)
- Samba: 17.4.1. Samba (Building Internet Firewalls)
- daemon: 9.3. Using Samba to Share Resources with Windows (TCP/IP Network Administration)
- directory sharing: 9.3.1.2. Sharing directories through Samba (TCP/IP Network Administration)
- name servers: 9.3.2. NetBIOS Name Service (TCP/IP Network Administration)
- overview: 9.3. Using Samba to Share Resources with Windows (TCP/IP Network Administration)
- passwords: 9.3.1. Configuring a Samba Server (TCP/IP Network Administration)
- PC/NFS and: 10.2.1. NFS versus SMB (CIFS) (Managing NFS and NIS)
- printer sharing: 3.5.2. Print Services (TCP/IP Network Administration)
- 9.3.1.3. Sharing printers through Samba (TCP/IP Network Administration)
- server, configuring: 9.3.1. Configuring a Samba Server (TCP/IP Network Administration)
- sample programs, obtaining: 0.5. Obtaining the Example Programs (DNS and Bind)
- samspade tool: A.4. Sources for Tools (Network Troubleshooting Tools)
- sandbox security model: 15.4.3. Java (Building Internet Firewalls)
- Sanitize privacy scripts: 5.5.1. sanitize (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
- SANS Institute: Institute (Building Internet Firewalls) A.6.5. System Administration, Networking, and Security (SANS)
- SAns statistic: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
- 8.1.2. Capacity Planning (DNS and Bind)
- SANS (System Administration, Networking and Security) Institute web site: 12.1.2.2. Use the network to distribute information (TCP/IP Network Administration)
- SARA (automated system monitoring): 12.4.3. Automated Monitoring (TCP/IP Network Administration)
- satan scanning tool: 11.4. Security Tools (Network Troubleshooting Tools)
- SATAN (Security Administrator's Tool for Analyzing Networks): 11.6. Running a Security Audit (Building Internet Firewalls)
- B.2.4. SATAN (Building Internet Firewalls)
- diagnostics and: 14.4.5. SATAN (Managing NFS and NIS)
- saturation, network collisions: 17.1.2. Collisions and network saturation (Managing NFS and NIS)
- saturation points: A. Using Input and Output Octets (Essential SNMP)
- saving changes in tkined: 7.2.3.6. Caveats (Network Troubleshooting Tools)
- SAY command (chat): A.3. chat (TCP/IP Network Administration)
- sc command: 12.4.1. How Are Services Managed Under Windows NT? (Building Internet Firewalls)
- scalability
- address translation compared to proxy servers: 4.2.1. Obtaining an IP Address (TCP/IP Network Administration)
- DNS: 3.3. DNS (TCP/IP Network Administration)
- gateway hierarchy: 2.3. Internet Routing Architecture (TCP/IP Network Administration)
- host tables: 3.2. The Host Table (TCP/IP Network Administration)
- scalar objects
- data collection and: 9.2.3.1. Designing collections (Essential SNMP)
- graphing in MRTG: 13.3. Graphing Other Objects (Essential SNMP)
- OIDs: 2.6.1. The get Operation (Essential SNMP)
- 11.2.1. Extensibility for Unix and Windows NT (Essential SNMP)
- scaling
- graphs: 8.4.1.1. mrtg configuration file (Network Troubleshooting Tools)
- scalability vs. raw capacity: 1.3.2.4. Economic considerations (Network Troubleshooting Tools)
- test networks: 9.2. Network Emulators and Simulators (Network Troubleshooting Tools)
- scaninterval (gated): B.6. Interface Statements (TCP/IP Network Administration)
- scanners, security: 11.4. Security Tools (Network Troubleshooting Tools)
- scanning ports: 4.8.1. Port Scanning (Building Internet Firewalls)
- scanning tools
- security and politics: 6.6. Politics and Security (Network Troubleshooting Tools)
- uses: 2.1.7. Scanning Tools (Network Troubleshooting Tools)
- Windows tools: 2.3. Microsoft Windows (Network Troubleshooting Tools)
- SCCS
- map files: 4.2.5. Source code control for map files (Managing NFS and NIS)
- maps, disadvantages: 4.2.5. Source code control for map files (Managing NFS and NIS)
- scheduler in initialization: 2.2.4. Startup Files and Scripts (Network Troubleshooting Tools)
- schema, X.500 and: 2.2.4. X.500 (Managing NFS and NIS)
- scion statistics tool: 8.4. Network-Monitoring Tools (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
- SCM (Service Control Manager): 12.4.1. How Are Services Managed Under Windows NT? (Building Internet Firewalls)
- ScoreBoardFile directives (httpd.conf file): 11.3.4. Defining Where Things Are Stored (TCP/IP Network Administration)
- scorekeepers: 1.2.2.3. Scorekeepers (Building Internet Firewalls)
- scotty management tool
- Microsoft Windows: 6.7.2. Other Tools for Windows (Network Troubleshooting Tools)
- SNMP usage: 7.2.2. scotty (Network Troubleshooting Tools)
- source web site: A.4. Sources for Tools (Network Troubleshooting Tools)
- tkined requirements: 6.5.1.2. Autodiscovery with tkined (Network Troubleshooting Tools)
- scp2: 3.8.2. scp2/sftp Details (SSH, The Secure Shell)
- compatibility with scp1: 7.4.14. SSH1/SSH2 Compatibility (SSH, The Secure Shell)
- debugging: 7.4.15. Logging and Debugging (SSH, The Secure Shell)
- regular expressions: A. SSH2 Manpage for sshregex (SSH, The Secure Shell)
- 12.2.6. Secure Shell (TCP/IP Network Administration)
- scp (Secure Copy Program): 1.4.2. Secure File Transfer (SSH, The Secure Shell)
- 2.2.1. File Transfer with scp (SSH, The Secure Shell)
- 2.2.1. File Transfer with scp (SSH, The Secure Shell)
- 7.5. Secure Copy with scp (SSH, The Secure Shell)
- authentication through local agents: 2.5.3. Agent Forwarding (SSH, The Secure Shell)
- broken features, unexpected behaviors: 12.2.5.1. General client problems (SSH, The Secure Shell)
- command line
- failure of wildcards or shell variables: 12.2.5.4. scp (SSH, The Secure Shell)
- options: 4.1.5.11. scp behavior (SSH, The Secure Shell)
- compile-time configuration: 4.1.5.11. scp behavior (SSH, The Secure Shell)
- copy access to your account, allowing others: 12.2.5.4. scp (SSH, The Secure Shell)
- display of statistics: 4.1.5.11. scp behavior (SSH, The Secure Shell)
- double-remote copying: 2.5.2. A More Complex Passphrase Problem (SSH, The Secure Shell)
- environment variables: 4.1.5.11. scp behavior (SSH, The Secure Shell)
- 7.5.7.1. scp1 statistics (SSH, The Secure Shell)
- error messages
- "Not a regular file": 12.2.5.4. scp (SSH, The Secure Shell)
- "packet too long": 12.2.5.4. scp (SSH, The Secure Shell)
- "Write failed after flushing stdout buffer. write stdout. Broken pipe.": 12.2.5.4. scp (SSH, The Secure Shell)
- failure of copy to remote machine: 12.2.5.4. scp (SSH, The Secure Shell)
- file ownership, preserving in copied files: 12.2.5.4. scp (SSH, The Secure Shell)
- gateway hosts and: 11.5.2. Using SCP Through a Gateway (SSH, The Secure Shell)
- keywords: B.4. ssh and scp Keywords (SSH, The Secure Shell)
- options: B.6. scp Options (SSH, The Secure Shell)
- protocols: 3.8. SSH and File Transfers (scp and sftp) (SSH, The Secure Shell)
- statistics display: 7.5.7. Statistics Display (SSH, The Secure Shell)
- syntax: 2.2.1. File Transfer with scp (SSH, The Secure Shell)
- 7.5.1. Full Syntax (SSH, The Secure Shell)
- troubleshooting wildcards and shell variables: 12.1.2. Server Debugging (SSH, The Secure Shell)
scrambling addresses in data: 5.5.2. tcpdpriv (Network Troubleshooting Tools)
screen captures: 11.1.1. Automating Documentation (Network Troubleshooting Tools)
- 11.5. Microsoft Windows (Network Troubleshooting Tools)
screened hosts
- screened subnets and: 6.5.7. It's Dangerous to Use Both Screened Subnets and Screened Hosts (Building Internet Firewalls)
- architecture of: 6.2. Screened Host Architectures (Building Internet Firewalls)
screened subnets:
6.3. Screened Subnet Architectures (Building Internet Firewalls)
- 12.7. Firewalls (TCP/IP Network Administration)
- screened hosts and: 6.5.7. It's Dangerous to Use Both Screened Subnets and Screened Hosts (Building Internet Firewalls)
- architecture of: 6.3. Screened Subnet Architectures (Building Internet Firewalls)
- 24.1. Screened Subnet Architecture (Building Internet Firewalls)
screening routers: 4.1. What Does a Packet Look Like? (Building Internet Firewalls)
- 4.1. What Does a Packet Look Like? (Building Internet Firewalls)
- 5.2. Packet Filtering (Building Internet Firewalls)
- 6.1.1. Screening Router (Building Internet Firewalls)
- acceptable addresses for: 8.5. Conventions for Packet Filtering Rules (Building Internet Firewalls)
- choosing: 8.8. Choosing a Packet Filtering Router (Building Internet Firewalls)
- configuring: 8.2. Configuring a Packet Filtering Router (Building Internet Firewalls)
- proxy systems: 9. Proxy Systems (Building Internet Firewalls)
- rules for: 8.5. Conventions for Packet Filtering Rules (Building Internet Firewalls)
- where to use: 8.10. Where to Do Packet Filtering (Building Internet Firewalls)
script command file output: 5.4.1. Using tcpdump (Network Troubleshooting Tools)
- 11.1.1. Automating Documentation (Network Troubleshooting Tools)
ScriptAlias directive (httpd.conf file): 11.3.4. Defining Where Things Are Stored (TCP/IP Network Administration)
scripts
- adding to OpenView menus: B.2. Adding a Menu to NNM (Essential SNMP)
- books and resources: B.2.8. Scripting (Network Troubleshooting Tools)
- disk-space checker: 12.5. Disk-Space Checker (Essential SNMP)
- extensible SNMP agents: 7.2.1.8. Agents and traps (Network Troubleshooting Tools)
- languages for device discovery: 6.1.2. Discovery and Mapping Tools (Network Troubleshooting Tools)
- MGEN and: 9.1.2.2. MGEN (Network Troubleshooting Tools)
- port monitoring: 12.6. Port Monitor (Essential SNMP)
- recording logins: 12.2. Who's Logging into My Machine? (I-Am-in) (Essential SNMP)
- 12.2. Who's Logging into My Machine? (I-Am-in)
(Essential SNMP)
- scripting tools
- network management: 6.4. Scripts (Network Troubleshooting Tools)
- network maps and: 6.5. Mapping or Diagramming (Network Troubleshooting Tools)
- startup: 2.2.4. Startup Files and Scripts (Network Troubleshooting Tools)
- system initialization: 5.2.1.1. Understanding /etc/inittab (TCP/IP Network Administration)
- throw core: 12.3. Throw Core (Essential SNMP)
- trap generation: 12.1. General Trap-Generation Program (Essential SNMP)
- Veritas disk check script: 12.4. Veritas Disk Check (Essential SNMP)
SDupQ statistic: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
SEAM (Sun Enterprise Authentication Mechanism): 12.5.5.2. SEAM: Kerberos V5 for Solaris (Managing NFS and NIS)
search algorithm: 13.4. The Resolver Search Algorithm and Negative Caching (BIND 8) (DNS and Bind)
search directive: 6.1. The Resolver (DNS and Bind)
- 6.1.3. The search Directive (DNS and Bind)
- E.5.2. search (DNS and Bind)
search entry (resolv.conf file): 8.2.1. The Resolver Configuration File (TCP/IP Network Administration)
search list: 6.1.2. The Search List (DNS and Bind)
- nslookup and: 12.1.3. The Search List (DNS and Bind)
- avoiding with: 12.4. Avoiding the Search List (DNS and Bind)
search option (nslookup): 12.3. Option Settings (DNS and Bind)
search paths, automounter and: 9.6.1. Long search paths (Managing NFS and NIS)
searching
- exhaustive database (see inverse queries)
- for IP addresses: 3.1.2. Finding IP Addresses (DNS and Bind)
- us domain name space: 3.2.3.1. The us domain (DNS and Bind)
SEAS (Solaris Easy Access Server): 8.2. Setting up a diskless client (Managing NFS and NIS)
sec= option (vfstab file): 9.1.3.2. The vfstab and fstab files (TCP/IP Network Administration)
second-level domains: 2.1.2. Domains (DNS and Bind)
- 2.1.2. Domains (DNS and Bind)
- names of: 3.2.2. Where in the World Do I Fit? (DNS and Bind)
secondary directive: E.2.3. secondary (DNS and Bind)
secondary master name servers (see slave name servers)
secondary servers: 3.3.4. BIND, Resolvers, and named (TCP/IP Network Administration)
secondary statements, adding: 4.9. Adding More Zones (DNS and Bind)
SecPanel: 13.4. Other SSH-Related Products (SSH, The Secure Shell)
secrecy in organizations: 1.3.2.1. Professionalism (Network Troubleshooting Tools)
secrecy, keys and passphrases: 2.4.2. Generating Key Pairs with ssh-keygen (SSH, The Secure Shell)
secret field (chap-secrets file): 6.3.4. PPP Daemon Security (TCP/IP Network Administration)
secret-key ciphers: 3.2.2. Public- and Secret-Key Cryptography (SSH, The Secure Shell)
secret key, symmetric key encryption: 12.5.2.1. Symmetric key encryption (Managing NFS and NIS)
secring.gpg file: 12.6.2. Public-Key Encryption Tools (TCP/IP Network Administration)
SECSH (Secure Shell) working group: 1.5. History of SSH (SSH, The Secure Shell)
sec=type option (share command): 9.1.2.1. The share command (TCP/IP Network Administration)
secure channel: 2.2. Remote Terminal Sessions with ssh (SSH, The Secure Shell)
Secure Copy Program (see SCP)
secure HTTP: 8.3.1.2. Web mode (Network Troubleshooting Tools)
secure mode in syslog: 11.2.1.2. Remote logging (Network Troubleshooting Tools)
secure NFS: 12.5.4.1. Old terms: AUTH_DES, secure RPC, and, secure NFS (Managing NFS and NIS)
secure RPC: 12.5.4.1. Old terms: AUTH_DES, secure RPC, and, secure NFS (Managing NFS and NIS)
secure servers, bastion hosts: 12.7. Firewalls (TCP/IP Network Administration)
secure shell (see SSH)
Secure Socket Layer (see SSL)
Secure Socket Layers (SSL): Protocol (SSH, The Secure Shell) 1.6.6. Secure Socket Layer (SSL)
secure syslog tool: 11.2.1.2. Remote logging (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
SecureCRT: 13.3. Table of Products (SSH, The Secure Shell)
- 15. SecureCRT (Windows)
(SSH, The Secure Shell)
- authentication methods: 15.4.1. Mandatory Fields (SSH, The Secure Shell)
- client configuration: 15.2. Basic Client Use (SSH, The Secure Shell)
- data compression: 15.4.2. Data Compression (SSH, The Secure Shell)
- encryption algorithms, specification: 15.4.1. Mandatory Fields (SSH, The Secure Shell)
- forwarding: 15.5. Forwarding (SSH, The Secure Shell)
- identities: 15.3.2. Using Multiple Identities (SSH, The Secure Shell)
- installing: 15.1. Obtaining and Installing (SSH, The Secure Shell)
- key management: 15.3. Key Management (SSH, The Secure Shell)
- keys, generating: 15.3.1. RSA Key Generation Wizard (SSH, The Secure Shell)
- keys, installing: 15.3.1. RSA Key Generation Wizard (SSH, The Secure Shell)
- port forwarding: 15.5.1. Port Forwarding (SSH, The Secure Shell)
- ports: 15.4.1. Mandatory Fields (SSH, The Secure Shell)
- protocols: 15.4.1. Mandatory Fields (SSH, The Secure Shell)
- secure file copy with ZModem: 15. SecureCRT (Windows) (SSH, The Secure Shell)
- session and global options: 15.4. Advanced Client Use (SSH, The Secure Shell)
- Session Options window, mandatory fields: 15.4.1. Mandatory Fields (SSH, The Secure Shell)
- sessions: 15.2. Basic Client Use (SSH, The Secure Shell)
- SOCKS: 15.4.4. Firewall Use (SSH, The Secure Shell)
- TIS authentication: 15.4.3. TIS Authentication (SSH, The Secure Shell)
- troubleshooting: 15.6. Troubleshooting (SSH, The Secure Shell)
- X forwarding: 15.5.2. X Forwarding (SSH, The Secure Shell)
SecureFX: 11.2. FTP Forwarding (SSH, The Secure Shell)
- 13.3. Table of Products (SSH, The Secure Shell)
SecureKoalaTerm: 13.3. Table of Products (SSH, The Secure Shell)
securenets file: 12.3.2.1. The secure nets file (Managing NFS and NIS)
secure_zone records: 11.2.2.2. Restricting queries in a particular zone (DNS and Bind)
SecurID
- authentication using: 3.4.2.5. One-time passwords (SSH, The Secure Shell)
- 5.5.1.9. SecurID authentication (SSH, The Secure Shell)
- compile-time configuration: 4.1.5.7. Authentication (SSH, The Secure Shell)
security (see also security issues):
- 11. Security (DNS and Bind)
- 1.5. What Is an Internet Firewall? (Building Internet Firewalls)
- 7.2. Security Concerns (Essential SNMP)
- A.3. chat (TCP/IP Network Administration)
- of BSD r commands: 18.2.1. BSD "r" Commands (Building Internet Firewalls)
- on Unix/Linux: 18.2.1. BSD "r" Commands (Building Internet Firewalls)
- on Windows: 18.2.1.1. BSD "r" commands under Windows NT (Building Internet Firewalls)
- of computer games: 23.2. Games (Building Internet Firewalls)
- of database protocols: 23.1.1. Locating Database Servers (Building Internet Firewalls)
- of email: 16.1.1. Keeping Mail Secret (Building Internet Firewalls)
- of FTP: 17.1.4. Providing Anonymous FTP Service (Building Internet Firewalls)
- of ICMP: 22.4. ICMP and Network Diagnostics (Building Internet Firewalls)
- of Java: 15.4.3. Java (Building Internet Firewalls)
- of JavaScript: 15.4.1. JavaScript (Building Internet Firewalls)
- of lpr and lp printing systems: 17.6.1. lpr and lp (Building Internet Firewalls)
- of Net8: 23.1.3.1. Security implications of SQL*Net and Net8 (Building Internet Firewalls)
- of NetBT name service: 20.3.6. Security Implications of NetBT Name Service and WINS (Building Internet Firewalls)
- of NIS: 20.2. Network Information Service (NIS) (Building Internet Firewalls)
- of NNTP: 16.9. Network News Transfer Protocol (NNTP) (Building Internet Firewalls)
- of passwords: 21.2. Passwords (Building Internet Firewalls)
- of PostScript printers: 17.6. Printing Protocols (Building Internet Firewalls)
- of programs
- indicators of: 13.5.3. Real Indicators of Security (Building Internet Firewalls)
- evaluating: 13.5. Choosing Security-Critical Programs (Building Internet Firewalls)
- of protocols: C.4. What Makes a Protocol Secure? (Building Internet Firewalls)
- proxying and: 13.4.5. Protocol Security (Building Internet Firewalls)
- of push technologies: 15.6. Push Technologies (Building Internet Firewalls)
- of rdist: 22.6.1. rdist (Building Internet Firewalls)
- of remote graphical interfaces
on Windows operating systems: 18.3.2. Remote Graphic Interfaces for Microsoft Operating Systems (Building Internet Firewalls)
- of routing protocols: 22.2. Routing Protocols (Building Internet Firewalls)
- of Sendmail: 16.2.7. Sendmail (Building Internet Firewalls)
- of SQL*Net: 23.1.3.1. Security implications of SQL*Net and Net8 (Building Internet Firewalls)
- of SSH: 18.2.5.1. What makes SSH secure? (Building Internet Firewalls)
- of VBScript: 15.4.2. VBScript (Building Internet Firewalls)
- of Windows Browser: 20.4.4. Security Implications of the Windows Browser (Building Internet Firewalls)
- of WINS: 20.3.6. Security Implications of NetBT Name Service and WINS (Building Internet Firewalls)
- of X Window System: 18.3.1. X11 Window System (Building Internet Firewalls)
- access control
- language extensions: 12.5.1.3. Optional access control language extensions (TCP/IP Network Administration)
- overview: 12.5. Access Control (TCP/IP Network Administration)
- shell command: 12.5.1.2. Defining an optional shell command (TCP/IP Network Administration)
- tcpd: 12.5.1.1. tcpd access control files (TCP/IP Network Administration)
- account permissions: 2.4.3. Installing a Public Key on an SSH ServerMachine (SSH, The Secure Shell)
- aclok option (share command): 9.1.2.1. The share command (TCP/IP Network Administration)
- ACLs: 12.4.8. Access control lists (Managing NFS and NIS)
- ActiveX and: 15.4.4. ActiveX (Building Internet Firewalls)
- address spoofing: 4.2.1. Obtaining an IP Address (TCP/IP Network Administration)
- address translation: 4.2.1. Obtaining an IP Address (TCP/IP Network Administration)
- against system failure: 3.5. Fail-Safe Stance (Building Internet Firewalls)
- anonymous users, mapping: 12.4.3. Unknown user mapping (Managing NFS and NIS)
- applications
- removing unnecessary: 12.3.1. Remove Unnecessary Software (TCP/IP Network Administration)
- updating: 12.3.2. Keep Software Updated (TCP/IP Network Administration)
- asymmetric key encryption: 12.5.2.2. Asymmetric key encryption (Managing NFS and NIS)
- audit: 10.10.7. Running a Security Audit (Building Internet Firewalls)
- on Unix: 11.6. Running a Security Audit (Building Internet Firewalls)
- AUTH_DH: 12.5.4. AUTH_DH: Diffie-Hellman authentication (Managing NFS and NIS)
- authentication: 12.2. How secure are NIS and NFS? (Managing NFS and NIS)
- shadow password files: 12.2.1. The Shadow Password File (TCP/IP Network Administration)
- ssh: 12.2.6. Secure Shell (TCP/IP Network Administration)
- authentication-failure traps: 7.1. Parameter Settings (Essential SNMP)
- AUTH_SYS security flavor: 12.2. How secure are NIS and NFS? (Managing NFS and NIS)
- of backups: 10.12. Protecting the Machine and Backups (Building Internet Firewalls)
- bastion host speed and: 10.3.2. How Fast a Machine? (Building Internet Firewalls)
- BIND and
- features of: 3.1. Getting BIND (DNS and Bind)
- patches for: 3.1. Getting BIND (DNS and Bind)
- books on: A.9. Books (Building Internet Firewalls)
- chat: A.3. chat (TCP/IP Network Administration)
- of checksums: 27.5.3. Keeping Secured Checksums (Building Internet Firewalls)
- choke points: 24.1.4.3. Choke point (Building Internet Firewalls)
- 24.2.4.3. Choke point (Building Internet Firewalls)
- choosing hosts and: 8.1.1. Where Do I Put My Name Servers? (DNS and Bind)
- community strings: 2.2. SNMP Communities (Essential SNMP)
- 7.2. Security Concerns (Essential SNMP)
- cryptography: 12.5.2. Brief introduction to cryptography (Managing NFS and NIS)
- DCE/DFS: 12.2. How secure are NIS and NFS? (Managing NFS and NIS)
- dedicated connections and: 6.3.1. The PPP Daemon (TCP/IP Network Administration)
- default deny stance: 8.2.3. Default Permit Versus Default Deny (Building Internet Firewalls)
- default permit stance: 8.2.3. Default Permit Versus Default Deny (Building Internet Firewalls)
- defense in depth: 24.1.4.2. Defense in depth (Building Internet Firewalls)
- 24.2.4.2. Defense in depth (Building Internet Firewalls)
- designing for network: 1.6.1. Buying Versus Building (Building Internet Firewalls)
- distributing responsibility: 12.1.2. Distributed Control (TCP/IP Network Administration)
- subnets: 12.1.2.1. Use subnets to distribute control (TCP/IP Network Administration)
- diversity of defense: 3.7. Diversity of Defense (Building Internet Firewalls)
- 24.1.4.7. Diversity of defense (Building Internet Firewalls)
- 24.2.4.7. Diversity of defense (Building Internet Firewalls)
- of DNS: 20.1.4. DNS Security Problems (Building Internet Firewalls)
- drills for, practicing: 27.5.7. Doing Drills (Building Internet Firewalls)
- encryption: 12.6. Encryption (TCP/IP Network Administration)
- public key: 12.6. Encryption (TCP/IP Network Administration)
- public key tools: 12.6.2. Public-Key Encryption Tools (TCP/IP Network Administration)
- stunnel: 12.6.2.1. stunnel (TCP/IP Network Administration)
- symmetric: 12.6.1. When Is Symmetric Encryption Useful? (TCP/IP Network Administration)
- extension scripts and: 11.2.1. Extensibility for Unix and Windows NT (Essential SNMP)
- fail-safe stance: 24.1.4.5. Fail-safe stance (Building Internet Firewalls)
- 24.2.4.5. Fail-safe stance (Building Internet Firewalls)
- filesystem access: 12.4.4. Access to filesystems (Managing NFS and NIS)
- firewalls: 12.4.7. Using NFS through firewalls (Managing NFS and NIS)
- 11.3. DNS and Internet Firewalls (DNS and Bind)
- 7.2. Security Concerns (Essential SNMP)
- filtering routers: 12.7.2. Filtering Traffic with iptables (TCP/IP Network Administration)
- functions of: 12.7.1. Functions of the Firewall (TCP/IP Network Administration)
- iptables command: 12.7.2.1. Defining iptables filter rules (TCP/IP Network Administration)
- overview: 12.7. Firewalls (TCP/IP Network Administration)
- future of: 7.6.2. Security (Managing NFS and NIS)
- host: 1.4.3. Host Security (Building Internet Firewalls)
- of HTTP: 15.1. HTTP Server Security (Building Internet Firewalls)
- incident response teams (see incident response teams)
- incidents (see incidents)
- information resources: 12.1.2.2. Use the network to distribute information (TCP/IP Network Administration)
- Internet connection considerations: 4.1. Connected and Non-Connected Networks (TCP/IP Network Administration)
- IPsec: 12.5.3. NFS and IPSec (Managing NFS and NIS)
- of IRC: 19.1. Internet Relay Chat (IRC) (Building Internet Firewalls)
- Kerberos V5: 12.5.5. RPCSEC_GSS: Generic security services for RPC (Managing NFS and NIS)
- lack of: 1.4. How Can You Protect Your Site? (Building Internet Firewalls)
- LDAP and: 12.2. How secure are NIS and NFS? (Managing NFS and NIS)
- least privilege: 24.1.4.1. Least privilege (Building Internet Firewalls)
- 24.2.4.1. Least privilege (Building Internet Firewalls)
- legal responsibilities: 25.2.3. External Factors That Influence Security Policies (Building Internet Firewalls)
- limiting requests to agents: 7.2. Security Concerns (Essential SNMP)
- 7.3.4.2. Creating a configuration by hand (Essential SNMP)
- login restrictions: 12.1. User-oriented network security (Managing NFS and NIS)
- of machine: 10.9. Securing the Machine (Building Internet Firewalls)
- Unix/Linux: 11.2.1. Setting Up System Logs on Unix (Building Internet Firewalls)
- Windows NT: 12.3.1. Setting Up System Logs Under Windows NT (Building Internet Firewalls)
- MACs: 12.5.2.4. One-way hash functions and MACs (Managing NFS and NIS)
- maps, private: 12.3.2. Making NIS more secure (Managing NFS and NIS)
- methods for remote account access: 1. Introduction to SSH (SSH, The Secure Shell)
- models: 1.4.2. Security Through Obscurity (Building Internet Firewalls)
- modem pools: 6.6. Terminal Servers and Modem Pools (Building Internet Firewalls)
- for name servers: 11.2. Securing Your Name Server (DNS and Bind)
- netacl: 11.4.1.2. Using netacl to protect services (Building Internet Firewalls)
- netgroups: 12.1.3. Using netgroups (Managing NFS and NIS)
- networks
- insecure: 6.7.2. Insecure Networks (Building Internet Firewalls)
- protecting: 6.7. Internal Firewalls (Building Internet Firewalls)
- NFS: 12.4. NFS security (Managing NFS and NIS)
- future of: 12.5.7. NFS security futures (Managing NFS and NIS)
- increasing: 12.5. Stronger security for NFS (Managing NFS and NIS)
- increasing, transition: 12.5.6. Planning a transition from NFS/sys to stronger NFS security (Managing NFS and NIS)
- levels: 12.2. How secure are NIS and NFS? (Managing NFS and NIS)
- RPC: 12.4.1. RPC security (Managing NFS and NIS)
- superuser mapping: 12.4.2. Superuser mapping (Managing NFS and NIS)
- version 4 and: 7.6.1. NFS Version 4 (Managing NFS and NIS)
- NIS
- increasing: 12.3.2. Making NIS more secure (Managing NFS and NIS)
- passwords: 12.3. Password and NIS security (Managing NFS and NIS)
- NIS+ and: 2.2.3. NIS+ (Managing NFS and NIS)
- NIS levels: 12.2. How secure are NIS and NFS? (Managing NFS and NIS)
- one-way hash functions: 12.5.2.4. One-way hash functions and MACs (Managing NFS and NIS)
- operating system bugs: 10.9.2. Fix All Known System Bugs (Building Internet Firewalls)
- passwords
- one-time: 12.2.3. One-Time Passwords (TCP/IP Network Administration)
- OPIE: 12.2.4. OPIE (TCP/IP Network Administration)
- selecting: 12.2.2. Choosing a Password (TCP/IP Network Administration)
- per-account configuration: 8.1. Limits of This Technique (SSH, The Secure Shell)
- performance and: 12.5.5.4. Security and performance (Managing NFS and NIS)
- planning, overview: 12.1. Security Planning (TCP/IP Network Administration)
- policies, creating: 12.1.3. Writing a Security Policy (TCP/IP Network Administration)
- policies for: 1.5.1.1. A firewall is a focus for security decisions (Building Internet Firewalls)
- 25. Security Policies (Building Internet Firewalls)
- reviewing: 25.1.1.6. Provision for reviews (Building Internet Firewalls)
- polling over the Internet: 3.2. NMS Architectures (Essential SNMP)
- of POP: 16.6. Post Office Protocol (POP) (Building Internet Firewalls)
- port monitoring: 12.4.6. Port monitoring (Managing NFS and NIS)
- PPP: 6.3.4. PPP Daemon Security (TCP/IP Network Administration)
- private keys: 12.5.4.6. Public and private keys (Managing NFS and NIS)
- proxy servers: 4.2.1. Obtaining an IP Address (TCP/IP Network Administration)
- public key exchange: 12.5.2.3. Public key exchange (Managing NFS and NIS)
- public keys: 12.5.4.6. Public and private keys (Managing NFS and NIS)
- queries, restricting: 11.2.2. Restricting Queries (DNS and Bind)
- r commands (Unix): 12.2.5. Secure the r Commands (TCP/IP Network Administration)
- disabling: 12.2.6. Secure Shell (TCP/IP Network Administration)
- read-only access: 12.4.5. Read-only access (Managing NFS and NIS)
- refused queries and: 12.7.4. Query Refused (DNS and Bind)
- remote logins: 1.4.1. Secure Remote Logins (SSH, The Secure Shell)
- resolvers and: 11.2.5.2. "Resolving" name server configuration (DNS and Bind)
- resources: 12.8. Words to the Wise (TCP/IP Network Administration)
- A. Resources (Building Internet Firewalls)
- response from unexpected source message: 7.6.1. Common Syslog Messages (DNS and Bind)
- risks: 4.1. Connected and Non-Connected Networks (TCP/IP Network Administration)
- types of: 12.1.1. Assessing the Threat (TCP/IP Network Administration)
- RPC: 12.4.1. RPC security (Managing NFS and NIS)
- RPC/DH: 12.5.4.3. How RPC/DH works (Managing NFS and NIS)
- RPCSEC_GSS: 12.5.5. RPCSEC_GSS: Generic security services for RPC (Managing NFS and NIS)
- Samba, encrypted passwords: 9.3.1. Configuring a Samba Server (TCP/IP Network Administration)
- sandbox model: 15.4.3. Java (Building Internet Firewalls)
- SATAN: 14.4.5. SATAN (Managing NFS and NIS)
- SEAM: 12.5.5.2. SEAM: Kerberos V5 for Solaris (Managing NFS and NIS)
- securenets file: 12.3.2.1. The secure nets file (Managing NFS and NIS)
- services: 12.5.1. Security services (Managing NFS and NIS)
- session keys: 12.5.4.8. Establishing a session key (Managing NFS and NIS)
- setuid executables and: 12.4.2. Superuser mapping (Managing NFS and NIS)
- simplicity of: 3.8. Simplicity (Building Internet Firewalls)
- SMB (CIFS): 12.2. How secure are NIS and NFS? (Managing NFS and NIS)
- of SNMP: 22.1.2. Simple Network Management Protocol (SNMP) (Building Internet Firewalls)
- 7.2. Security Concerns (Essential SNMP)
- F. SNMPv3 (Essential SNMP)
- SNMPv3 and: 7.2. Security Concerns (Essential SNMP)
- F.1. Changes in SNMPv3 (Essential SNMP)
- Cisco routers: F.2.1. Configuring SNMPv3 for a Cisco Router (Essential SNMP)
- encryption: F.1.1. The SNMPv3 Engine (Essential SNMP)
- F.2.1. Configuring SNMPv3 for a Cisco Router (Essential SNMP)
- levels: F.1.4. SNMPv3 Textual Conventions (Essential SNMP)
- Net-SNMP: F.2.2. Configuring SNMPv3 for Net-SNMP (Essential SNMP)
- USM: F.1.4. SNMPv3 Textual Conventions (Essential SNMP)
- ssh: 12.2.6. Secure Shell (TCP/IP Network Administration)
- strategies for: 3. Security Strategies (Building Internet Firewalls)
- symmetric key encryption: 12.5.2.1. Symmetric key encryption (Managing NFS and NIS)
- system monitoring: 12.4.1. Know Your System (TCP/IP Network Administration)
- find command: 12.4.2.1. Checking files (TCP/IP Network Administration)
- intruder detection: 12.4.2. Looking for Trouble (TCP/IP Network Administration)
- login activity: 12.4.2.2. Checking login activity (TCP/IP Network Administration)
- TCP Wrapper: 11.4.1. Using the TCP Wrapper Package to Protect Services (Building Internet Firewalls)
- terminal servers: 6.6. Terminal Servers and Modem Pools (Building Internet Firewalls)
- time information and: 22.5. Network Time Protocol (NTP) (Building Internet Firewalls)
- trusted hosts: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
- 12.2.5. Secure the r Commands (TCP/IP Network Administration)
- trusted users: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
- UIDs: 12.3.3. Unknown password entries (Managing NFS and NIS)
- universal participation: 3.6. Universal Participation (Building Internet Firewalls)
- 24.1.4.6. Universal participation (Building Internet Firewalls)
- 24.2.4.6. Universal participation (Building Internet Firewalls)
- user authentication: 12.2. User Authentication (TCP/IP Network Administration)
- user-oriented: 12.1. User-oriented network security (Managing NFS and NIS)
- vendors, information mailing lists: 12.1.2.2. Use the network to distribute information (TCP/IP Network Administration)
- violations: 2.3.1. Known Hosts (SSH, The Secure Shell)
- 3.1.2. Integrity (SSH, The Secure Shell)
- viruses: 12.6. Viruses (Managing NFS and NIS)
- vulnerabilities of: 11.2.1. BIND Version (DNS and Bind)
- weakest link: 3.4. Weakest Link (Building Internet Firewalls)
- 24.1.4.4. Weakest link (Building Internet Firewalls)
- 24.2.4.4. Weakest link (Building Internet Firewalls)
- web servers
- CGI scripts: 11.4.1. The CGI and SSI Threat (TCP/IP Network Administration)
- overview: 11.4. Web Server Security (TCP/IP Network Administration)
- SSI: 11.4.1. The CGI and SSI Threat (TCP/IP Network Administration)
- when proxying is ineffective: 9.8.2. Proxying Won't Secure the Service (Building Internet Firewalls)
- when system crashes: 10.12.1. Watch Reboots Carefully (Building Internet Firewalls)
- of whois service: 20.7.2. whois (Building Internet Firewalls)
- zone data, importance of backups for: 4.8.2. Backup Files (DNS and Bind)
- zone transfers, preventing unauthorized: 11.2.3. Preventing Unauthorized Zone Transfers (DNS and Bind)
- zones, Internet Exporer and: 15.2.5. Internet Explorer and Security Zones (Building Internet Firewalls)
security category: 7.5.3.1. BIND 8 categories (DNS and Bind)
security configuration files: 2.2.5.2. Security files (Network Troubleshooting Tools)
security issues
- books and resources: B.2.7. Security (Network Troubleshooting Tools)
- challenge response systems: 11.1.2. vnc (Network Troubleshooting Tools)
- compromised ps command: 2.1.7. Scanning Tools (Network Troubleshooting Tools)
- discovery tools and: 6.6. Politics and Security (Network Troubleshooting Tools)
- egos and: 1.3.2.2. Ego management (Network Troubleshooting Tools)
- expn and vrfy telnet commands: 10.1.1. Email (Network Troubleshooting Tools)
- levels in syslog: 11.2.1.1. Configuring syslog (Network Troubleshooting Tools)
- network management software: 6.1.1. Characteristics of Management Software (Network Troubleshooting Tools)
- packet capture and: 5. Packet Capture (Network Troubleshooting Tools)
- 5.7. Dark Side of Packet Capture (Network Troubleshooting Tools)
- ping and DOS attacks: 3.3.3.1. Security and ICMP (Network Troubleshooting Tools)
- protecting networks: 5.7.2. Protecting Yourself (Network Troubleshooting Tools)
- secrecy and: 1.3.2.1. Professionalism (Network Troubleshooting Tools)
- security tools: 11.4. Security Tools (Network Troubleshooting Tools)
- cops: 11.4. Security Tools (Network Troubleshooting Tools)
- iss: 11.4. Security Tools (Network Troubleshooting Tools)
- nmap: 11.4. Security Tools (Network Troubleshooting Tools)
- portscan: 11.4. Security Tools (Network Troubleshooting Tools)
- sanitize: 5.5.1. sanitize (Network Troubleshooting Tools)
- satan: 11.4. Security Tools (Network Troubleshooting Tools)
- system integrity checkers: 11.4. Security Tools (Network Troubleshooting Tools)
- tcpdpriv tool: 5.5.2. tcpdpriv (Network Troubleshooting Tools)
- tcpwrappers: 11.2.3.1. tcpwrappers (Network Troubleshooting Tools)
- 11.4. Security Tools (Network Troubleshooting Tools)
- tripwire: 11.4.1. tripwire (Network Troubleshooting Tools)
- segmented networks and: 5.2. Access to Traffic (Network Troubleshooting Tools)
- Smurf attacks: 3.3.3.2. Smurf Attacks (Network Troubleshooting Tools)
- SNMP security: 7.1. Overview of SNMP (Network Troubleshooting Tools)
- ssh tools: 11.1.3. ssh (Network Troubleshooting Tools)
- switches and: 5.7.1. Switch Security (Network Troubleshooting Tools)
- syslog files: 11.2.1.1. Configuring syslog (Network Troubleshooting Tools)
- TCP streams and: 5.6.1.1. Using ethereal (Network Troubleshooting Tools)
- testing firewalls: 12.2.1.1. Firewall testing (Network Troubleshooting Tools)
- web server configuration: 10.1.2. HTTP (Network Troubleshooting Tools)
- Windows and packet capture tools: 5.8. Microsoft Windows (Network Troubleshooting Tools)
security manager (Java): 15.4.3. Java (Building Internet Firewalls)
security parameter (smb.config file): 9.3.1. Configuring a Samba Server (TCP/IP Network Administration)
security roots: 11.4.5.1. Security roots (DNS and Bind)
Security Subsystem (SNMPv3): F.1.1. The SNMPv3 Engine (Essential SNMP)
security threats
- countered by SSH: 3.10. Threats SSH Can Counter (SSH, The Secure Shell)
- dictionary attack: 2.4.3. Installing a Public Key on an SSH ServerMachine (SSH, The Secure Shell)
- not countered by SSH: 3.11. Threats SSH Doesn't Prevent (SSH, The Secure Shell)
seed devices: 6.2. Castle Rock's SNMPc Enterprise Edition (Essential SNMP)
- 6.2.2. Discovery and Filters (Essential SNMP)
seed files: 6.1.2. The netmon Process (Essential SNMP)
seeds: 3.7. Randomness (SSH, The Secure Shell)
segment header: Appendix g.2. TCP Segment Header (TCP/IP Network Administration)
segmenting networks: 5.2. Access to Traffic (Network Troubleshooting Tools)
segments: 1.3. TCP/IP Protocol Architecture (TCP/IP Network Administration)
- format: 1.6.2. Transmission Control Protocol (TCP/IP Network Administration)
- TCP headers: 1.6.2. Transmission Control Protocol (TCP/IP Network Administration)
SELECT command (IMAP): 3.4.3. Internet Message Access Protocol (TCP/IP Network Administration)
selector fields in syslog configuration: 11.2.1.1. Configuring syslog (Network Troubleshooting Tools)
self-decrypting archives: 16.1.1. Keeping Mail Secret (Building Internet Firewalls)
semicolon (;) starting comments: 4.2.2. Comments (DNS and Bind)
- 4.3. Setting Up a BIND Configuration File (DNS and Bind)
- A.1. Master File Format (DNS and Bind)
- E.5.4. ; and # (4.9+)
(DNS and Bind)
- in resolv.conf file: 6.1.7. Comments (DNS and Bind)
send command (dip): 6.3.2. Dial-Up PPP (TCP/IP Network Administration)
- A.1.1. The dip Script File (TCP/IP Network Administration)
send (gated): B.4. Trace Statements (TCP/IP Network Administration)
send queues, displaying with netstat: 2.1.3. netstat (Network Troubleshooting Tools)
send utilization (If%util): A. Using Input and Output Octets (Essential SNMP)
sendbuffer parameter (gated): B.8.4. The bgp Statement (TCP/IP Network Administration)
Sender fields (sendmail): 10.5.8. Defining Mailers (TCP/IP Network Administration)
sending email with telnet: 10.1.1. Email (Network Troubleshooting Tools)
sending traps: 10.3. Sending Traps (Essential SNMP)
- Cisco devices: 7.3.6.2. Advanced configuration (Essential SNMP)
- forcing: 10.3.5. Forcing Your Hardware to Generate Traps (Essential SNMP)
- hooks in programs: 10.3.6. Using Hooks with Your Programs (Essential SNMP)
- Net-SNMP: 10.3.4. Sending Traps with Net-SNMP (Essential SNMP)
- F.2.2.3. Sending SNMPv3 traps with Net-SNMP (Essential SNMP)
- OpenView: 10.3.1. Sending Traps with OpenView (Essential SNMP)
- Perl: 10.3.2. Sending Traps with Perl (Essential SNMP)
- SNMPv3: F.1.2. SNMPv3 Applications (Essential SNMP)
- F.2.2.3. Sending SNMPv3 traps with Net-SNMP (Essential SNMP)
- testing: 10.3.5. Forcing Your Hardware to Generate Traps (Essential SNMP)
- Trap Generator: 10.3.3. Sending Traps with Network Computing Technologies Trap Generator (Essential SNMP)
Sendmail: 2.3.1. Electronic Mail (Building Internet Firewalls)
- 2.3.1. Electronic Mail (Building Internet Firewalls)
- 3.1. Least Privilege (Building Internet Firewalls)
- 16.2.7. Sendmail (Building Internet Firewalls)
- Morris worm: 13.2.2. What Data Does the Protocol Transfer? (Building Internet Firewalls)
- 13.2.3.1. Does it have any other commands in it? (Building Internet Firewalls)
sendmail process
- checking running processes: 11.1. Net-SNMP (Essential SNMP)
- monitoring: 7.3.5.2. Advanced configuration (Essential SNMP)
sendmail.cf file: 6.3.2. Electronic Mail (DNS and Bind)
- 6.3.3. Updating .rhosts, hosts.equiv, etc. (DNS and Bind)
- configuring: E.4. More sendmail.cf (TCP/IP Network Administration)
- creating with m4 macros: 10.4.1.1. Building a sendmail.cf with m4 macros (TCP/IP Network Administration)
- modifying
- local information: 10.7.1. Modifying Local Information (TCP/IP Network Administration)
- Options section: 10.7.2. Modifying Options (TCP/IP Network Administration)
- overview: 10.7. Modifying a sendmail.cf File (TCP/IP Network Administration)
- overview: 10.4. The sendmail.cf File (TCP/IP Network Administration)
- samples: 10.4.1. Locating a Sample sendmail.cf File (TCP/IP Network Administration)
- structure: 10.4.2. General sendmail.cf Structure (TCP/IP Network Administration)
- testing: 10.8. Testing sendmail.cf (TCP/IP Network Administration)
- testing rewrite rules: 10.8.1. Testing Rewrite Rules (TCP/IP Network Administration)
sendport command: 11.2.5.3. FTP with the default data ports (SSH, The Secure Shell)
sendto() system calls: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
Sequence Number field, TCP headers: 1.6.2. Transmission Control Protocol (TCP/IP Network Administration)
sequence numbers, for one-time password systems: 5.5.1.10. S/Key authentication (SSH, The Secure Shell)
sequence (sendmail K command value): E.4.5. The sendmail K Command (TCP/IP Network Administration)
sequence space arithmetic: 7.2.3. Starting Over with a New Serial Number (DNS and Bind)
Sergey Okhapkin (see Okhapkin's SSH1)
serial connections with crossover cables: 3.2. Testing Adapters (Network Troubleshooting Tools)
serial counters in servers: 10.1.4.1. nslookup and dig (Network Troubleshooting Tools)
Serial Line IP protocol, BSD Unix support: 5.1.5.2. The pseudo-device statement (TCP/IP Network Administration)
serial lines
- connections, troubleshooting: 6.3.7. Troubleshooting Serial Connections (TCP/IP Network Administration)
- overview: 6.2. TCP/IP Over a Serial Line (TCP/IP Network Administration)
- protocols, SLIP: 6.2.1. The Serial Protocols (TCP/IP Network Administration)
- speed: A. Using Input and Output Octets (Essential SNMP)
serial numbers: 4.8.4. Multiple Master Servers (DNS and Bind)
- dynamic update and: 10.2.1. Dynamic Update and Serial Numbers (DNS and Bind)
- incrementing: 7.2.2. SOA Serial Numbers (DNS and Bind)
- nslookup and: 12.1.4. Zone Transfers (DNS and Bind)
- of equipment: 1.3.1. Documentation (Network Troubleshooting Tools)
- setting new: 7.2.3. Starting Over with a New Serial Number (DNS and Bind)
- SOA serial# message and: 7.6.1. Common Syslog Messages (DNS and Bind)
- unincremented: 14.3.1. Forgot to Increment Serial Number (DNS and Bind)
- 14.3.1. Forgot to Increment Serial Number (DNS and Bind)
- for zone data: 4.8.3. SOA Values (DNS and Bind)
serial ports, troubleshooting: 6.3.7. Troubleshooting Serial Connections (TCP/IP Network Administration)
serial-queries option (named): C.2.5. The options Statement (TCP/IP Network Administration)
serial-queries substatement: 10.12.2.6. Limiting the number of SOA queries (DNS and Bind)
SErr statistic: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
server
- AAA: 21. Authentication and Auditing Services (Building Internet Firewalls)
- caching: 15.3.4. Proxying Characteristics of HTTP (Building Internet Firewalls)
- 15.5. Cache Communication Protocols (Building Internet Firewalls)
- database, locating: 23.1.1. Locating Database Servers (Building Internet Firewalls)
- DNS
- for internal hosts: 20.1.5.2. Set up a real DNS server on an internal system for internal hosts to use (Building Internet Firewalls)
- setting up fake: 20.1.5.1. Set up a "fake" DNS server on the bastion host for the outside world to use (Building Internet Firewalls)
- FTP, preventing attacks from: 17.1.4.3. Preventing people from using your server to attack other machines (Building Internet Firewalls)
- HTTP: 15.3.2. Special HTTP Servers (Building Internet Firewalls)
- security of: 15.1. HTTP Server Security (Building Internet Firewalls)
- KDC: 21.5.1. How It Works (Building Internet Firewalls)
- mail, evaluating: 16.1.2.1. Junk mail (Building Internet Firewalls)
- proxy (see proxy services)
- routed: 11.3.4.5. routed (Building Internet Firewalls)
- SMB authentication: 21.6.4. SMB Authentication (Building Internet Firewalls)
- SMTP
- for Windows NT: 16.2.13. SMTP Servers for Windows NT (Building Internet Firewalls)
- commercial: 16.2.9. Commercial SMTP Servers for Unix (Building Internet Firewalls)
- freely available: 16.2.8. Other Freely Available SMTP Servers for Unix (Building Internet Firewalls)
- SSH, authentication: 18.2.5.2. SSH server authentication (Building Internet Firewalls)
- TIS FWTK authentication: 21.4.1. The TIS FWTK Authentication Server (Building Internet Firewalls)
- web: 2.2.2. Web Server Security Issues (Building Internet Firewalls)
- Windows Browser: 20.4. The Windows Browser (Building Internet Firewalls)
- WINS, communication among: 20.3.4. WINS Server-Server Communication (Building Internet Firewalls)
- wuarchive: 17.1.4.4. Using the wuarchive FTP daemon (Building Internet Firewalls)
server authentication: 3.1.3. Authentication (SSH, The Secure Shell)
- 3.4.1. Establishing the Secure Connection (SSH, The Secure Shell)
server command (nslookup): 12.5.3. Switching Name Servers (DNS and Bind)
- bogus servers and: 10.11. Avoiding a Bogus Name Server (DNS and Bind)
server configuration
- per-account: 8. Per-Account Server Configuration (SSH, The Secure Shell)
- three levels of: 0.4. Our Approach (SSH, The Secure Shell)
server executable, finding location of in manual pages: 4.7.1. Starting Up the Name Server (DNS and Bind)
server field
- chap-secrets file: 6.3.4. PPP Daemon Security (TCP/IP Network Administration)
- inet.conf file: 5.3. The Internet Daemon (TCP/IP Network Administration)
server-identifier parameter (dhcpd): D.3.2. Configuration Parameters (TCP/IP Network Administration)
server keys: 3.3. The Architecture of an SSH System (SSH, The Secure Shell)
- generating: 5.4.4. Server Key Generation (SSH, The Secure Shell)
- recommended settings for: 10.3.2. /etc/sshd_config (SSH, The Secure Shell)
Server Message Block (SMB): and Server Message Block (SMB) (Building Internet Firewalls) 14.4. Common Internet File System (CIFS)
- 3.5.1. File Sharing (TCP/IP Network Administration)
server-name parameter (dhcpd): D.3.2. Configuration Parameters (TCP/IP Network Administration)
server names: 5.1. The Name of the Server (SSH, The Secure Shell)
server only NIS: 3.1. Masters, slaves, and clients (Managing NFS and NIS)
server response time,
threshold value: 16.2. Measuring performance (Managing NFS and NIS)
Server Selection (SRV) records: C.3.1.11. Server Selection record (TCP/IP Network Administration)
server setting (smb.config file): 9.3.1. Configuring a Samba Server (TCP/IP Network Administration)
server-side caching: 7.4.3. Server-side caching (Managing NFS and NIS)
server-side configuration, PC/NFS: 10.3.1. Server-side PC/NFS configuration (Managing NFS and NIS)
server-side fields (RPC), statistics: 14.2. NFS statistics (Managing NFS and NIS)
Server Side Includes (see SSI)
server-side performance tuning: 16. Server-Side Performance Tuning (Managing NFS and NIS)
- benchmarking: 16.3. Benchmarking (Managing NFS and NIS)
server statement (named.conf file): C.2.4. The server Statement (TCP/IP Network Administration)
server string parameter (smb.config file): 9.3.1. Configuring a Samba Server (TCP/IP Network Administration)
server threads: 7.2.1. NFS RPC procedures (Managing NFS and NIS)
- 7.3.3. NFS kernel code (Managing NFS and NIS)
- NFS: 7.3.1. nfsd and NFS server threads (Managing NFS and NIS)
server-to-client relationships, trusted hosts and users: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
server-to-server relationships, trusted hosts and users: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
ServerAdmin defines (httpd.conf file): 11.3.2. Basic Configuration Directives (TCP/IP Network Administration)
ServerAdmin values (Apache), changing (Solaris): 11.2.1. Configuring Apache on Solaris (TCP/IP Network Administration)
ServerKeyBits: 5.4.4. Server Key Generation (SSH, The Secure Shell)
ServerName (httpd.conf file): 11.3.2. Basic Configuration Directives (TCP/IP Network Administration)
ServerRoot directive (httpd.conf file): 11.3.2. Basic Configuration Directives (TCP/IP Network Administration)
servers: 3.3. The Architecture of an SSH System (SSH, The Secure Shell)
- 4.3.5. Compilation Flags (SSH, The Secure Shell)
- 11. Configuring Apache (TCP/IP Network Administration)
- allocating, domains: 4.1.3. Number of NIS servers per domain (Managing NFS and NIS)
- caching-only: 8.1.1. BIND Configurations (TCP/IP Network Administration)
- configuration: 8.3.1.1. A caching-only server configuration (TCP/IP Network Administration)
- checking email servers: 10.1.1. Email (Network Troubleshooting Tools)
- checking FTP performance: 10.1.3. FTP and TFTP (Network Troubleshooting Tools)
- checking HTTP servers: 10.1.2. HTTP (Network Troubleshooting Tools)
- as clients: 3.3.11. NIS server as an NIS client (Managing NFS and NIS)
- compensation, slow: 18.1. Slow server compensation (Managing NFS and NIS)
- configuration: 3.6. Configuration Servers (TCP/IP Network Administration)
- DHCP: 3.6.2. Dynamic Host Configuration Protocol (TCP/IP Network Administration)
- diskless clients: 8. Diskless Clients (Managing NFS and NIS)
- RARP: 3.6.1. Reverse Address Resolution Protocol (TCP/IP Network Administration)
- RPCs and: 1.5.3. Internet and RPC server configuration (Managing NFS and NIS)
- configuration files: 5.3.1. Server Configuration Files (SSH, The Secure Shell)
- CPU loading, bottlenecks and: 16.4.1. Problem areas (Managing NFS and NIS)
- debugging: 12.1.2. Server Debugging (SSH, The Secure Shell)
- 10.1. Application-Protocols Tools (Network Troubleshooting Tools)
- disk bandwidth: 16.4.1. Problem areas (Managing NFS and NIS)
- disk-space checking script: 12.5. Disk-Space Checker (Essential SNMP)
- distributed, management: 9.6. Managing Distributed Servers (TCP/IP Network Administration)
- DNS: 5.2.3. Run DNS on NIS clients and servers (Managing NFS and NIS)
- DNS, authoritative: 3.3. DNS (TCP/IP Network Administration)
- graphing parameters: 13.3. Graphing Other Objects (Essential SNMP)
- IMAP
- configuring: 9.7.2. IMAP Server (TCP/IP Network Administration)
- testing: 3.4.3. Internet Message Access Protocol (TCP/IP Network Administration)
- listing open files: 2.1.4. lsof (Network Troubleshooting Tools)
- load, buffer size and: 18.3. Adjusting for network reliability problems (Managing NFS and NIS)
- locating, binding the domain: 3.3.10. The ypbind daemon (Managing NFS and NIS)
- log files: 14.6.1. NFS server logging mechanics (Managing NFS and NIS)
- logging: 5.8. History, Logging, and Debugging (SSH, The Secure Shell)
- configuration: 14.6.3. NFS server logging configuration (Managing NFS and NIS)
- configuration files: 14.6.3. NFS server logging configuration (Managing NFS and NIS)
- disabling: 14.6.9. Disabling NFS server logging (Managing NFS and NIS)
- enabling: 14.6.2. Enabling NFS server logging (Managing NFS and NIS)
- mail: 4.5.3. Planning Your Mail System (TCP/IP Network Administration)
- mail servers, monitoring: 12.6. Port Monitor (Essential SNMP)
- master name: 8.1.1. BIND Configurations (TCP/IP Network Administration)
- configuration: 8.3.1.2. Master and slave server configurations (TCP/IP Network Administration)
- master server
- creating: 3.2.2. Installing the NIS master server (Managing NFS and NIS)
- hosts, changing: 4.3.2. Changing NIS master servers (Managing NFS and NIS)
- number of: 3.2.2. Installing the NIS master server (Managing NFS and NIS)
- unavailable: 3.2.2. Installing the NIS master server (Managing NFS and NIS)
- ypxfr tool: 4.2.2. Regular map transfers (Managing NFS and NIS)
- memory usage, bottlenecks: 16.4.1. Problem areas (Managing NFS and NIS)
- multihomed: 16.5.7. Multihomed servers (Managing NFS and NIS)
- name, classifications: 3.3.4. BIND, Resolvers, and named (TCP/IP Network Administration)
- name servers: 10.1.4.1. nslookup and dig (Network Troubleshooting Tools)
- 10.1.4.2. doc, dnswalk, and lamers (Network Troubleshooting Tools)
- network interface, bottlenecks: 16.4.1. Problem areas (Managing NFS and NIS)
- NFS: 9.1. The Network File System (TCP/IP Network Administration)
- 10.1.6. NFS (Network Troubleshooting Tools)
- B.1. NFS server problems (Managing NFS and NIS)
- NIS
- selecting: 3.2.1. Choosing NIS servers (Managing NFS and NIS)
- testing: 3.2.2. Installing the NIS master server (Managing NFS and NIS)
- NLM crash: 11.2.2.1. Server crash (Managing NFS and NIS)
- performance tuning: 16.5. Server tuning (Managing NFS and NIS)
- buffers: 16.5.3. Memory usage (Managing NFS and NIS)
- CPU loading: 16.5.1. CPU loading (Managing NFS and NIS)
- cross-mounting filesystem: 16.5.6. Cross-mounting filesystems (Managing NFS and NIS)
- kernel configuration: 16.5.5. Kernel configuration (Managing NFS and NIS)
- memory usage: 16.5.3. Memory usage (Managing NFS and NIS)
- multhomed: 16.5.7. Multihomed servers (Managing NFS and NIS)
- nfsd threads: 16.5.2. NFS server threads (Managing NFS and NIS)
- throughput: 16.5.4. Disk and filesystem throughput (Managing NFS and NIS)
- polling: 12.5. Disk-Space Checker (Essential SNMP)
- 12.5. Disk-Space Checker (Essential SNMP)
- POP, configuring: 9.7.1. POP Server (TCP/IP Network Administration)
- PPP, configuring: 6.3.5. PPP Server Configuration (TCP/IP Network Administration)
- proxy servers: 10.3. Sending Traps (Essential SNMP)
- renegade, debugging case study: 15.2. Renegade NIS server (Managing NFS and NIS)
- replication, automounter: 9.5.1. Replicated servers (Managing NFS and NIS)
- response time
- disk-intensive activity and: 16.2. Measuring performance (Managing NFS and NIS)
- users and: 16.2. Measuring performance (Managing NFS and NIS)
- root: 3.3.1. The Domain Hierarchy (TCP/IP Network Administration)
- cache initialization files: 8.3.4. The Cache Initialization File (TCP/IP Network Administration)
- root privileges: 12.3.1. Managing the root password with NIS (Managing NFS and NIS)
- RPC
- configuration: 1.5.3. Internet and RPC server configuration (Managing NFS and NIS)
- initialization: 1.5.3. Internet and RPC server configuration (Managing NFS and NIS)
- Samba, configuring: 9.3.1. Configuring a Samba Server (TCP/IP Network Administration)
- serial counters: 10.1.4.1. nslookup and dig (Network Troubleshooting Tools)
- slave: 8.1.1. BIND Configurations (TCP/IP Network Administration)
- configuration: 8.3.1.2. Master and slave server configurations (TCP/IP Network Administration)
- slave server
- adding: 3.2. Basics of NIS management (Managing NFS and NIS)
- adding later: 3.2.3.1. Adding slave servers later (Managing NFS and NIS)
- initializing: 3.2.3. Installing NIS slave servers (Managing NFS and NIS)
- installing: 3.2.3. Installing NIS slave servers (Managing NFS and NIS)
- listing: 3.2.3. Installing NIS slave servers (Managing NFS and NIS)
- removing: 4.3.1. Removing an NIS slave server (Managing NFS and NIS)
- slow
- testing: 18.1.1. Identifying NFS retransmissions (Managing NFS and NIS)
- timeo parameter and: 18.1.2. Timeout period calculation (Managing NFS and NIS)
- stack fingerprinting and: 6.3.1. Stack Fingerprinting (Network Troubleshooting Tools)
- stratum 1 and 2 servers: 11.3. NTP (Network Troubleshooting Tools)
- synchronizing clocks on: 11.3. NTP (Network Troubleshooting Tools)
- TCP/IP networks compared to PC LAN servers: 3. Network Services (TCP/IP Network Administration)
- terminal servers: 16.5.1. CPU loading (Managing NFS and NIS)
- troubleshooting name services: 10.1.4.1. nslookup and dig (Network Troubleshooting Tools)
- usage guage: 4.1.3. Number of NIS servers per domain (Managing NFS and NIS)
- vnc servers: 11.1.2. vnc (Network Troubleshooting Tools)
- 11.1.2. vnc (Network Troubleshooting Tools)
- web servers: 7.3.5.2. Advanced configuration (Essential SNMP)
- B.4. Using NNM for Communications (Essential SNMP)
- zone authority records: 10.1.4.1. nslookup and dig (Network Troubleshooting Tools)
- 10.1.4.1. nslookup and dig (Network Troubleshooting Tools)
ServerType directive (httpd.conf file): 11.3.2. Basic Configuration Directives (TCP/IP Network Administration)
serverwide configuration: 0.4. Our Approach (SSH, The Secure Shell)
- 4.1.5. Compile-Time Configuration (SSH, The Secure Shell)
- 5. Serverwide Configuration (SSH, The Secure Shell)
- 10.3. Serverwide Configuration (SSH, The Secure Shell)
- command-line options: 5.3.2. Command-Line Options (SSH, The Secure Shell)
- files, commenting: 5.3.1. Server Configuration Files (SSH, The Secure Shell)
- modifying: 5.3.3. Changing the Configuration (SSH, The Secure Shell)
- port forwarding: 9.2.10.2. Serverwide configuration (SSH, The Secure Shell)
- precedence rules: 5.3.2. Command-Line Options (SSH, The Secure Shell)
- 5.3.4. A Tricky Reconfiguration Example (SSH, The Secure Shell)
SERVFAIL errors: 14.3.3. Slave Name Server Can't Load Zone Data (DNS and Bind)
SERVFAIL responses: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
service contracts: 1.3.1. Documentation (Network Troubleshooting Tools)
- 1.3.2.4. Economic considerations (Network Troubleshooting Tools)
- B.1. Sources of Information (Network Troubleshooting Tools)
Service Control Manager (see SCM)
service extensions, SMTP: 3.4.4. Multipurpose Internet Mail Extensions (TCP/IP Network Administration)
Service field, NFS log record: 14.6. NFS server logging (Managing NFS and NIS)
service packs, services and: 12.5. Installing and Modifying Services (Building Internet Firewalls)
services: 13. Internet Services and Firewalls (Building Internet Firewalls)
- booting, on Unix: 11.3.4.3. Booting services (Building Internet Firewalls)
- fir commands: 11.3.4.4. BSD "r" command services (Building Internet Firewalls)
- started by /etc/rc: 11.3.1.1. Services started by /etc/rc files or directories (Building Internet Firewalls)
- automatically starting services: 2.1.1. ps (Network Troubleshooting Tools)
- biff: 16.2.11. biff (Building Internet Firewalls)
- contacting providers about incidents: 27.1.5.3. Vendors and service providers (Building Internet Firewalls)
- 27.4.4.3. Vendors and service providers (Building Internet Firewalls)
- differential growth and: 12.2.2.3. Capacity planning (Network Troubleshooting Tools)
- disabling those not required: 10.10. Disabling Nonrequired Services (Building Internet Firewalls)
- on Unix/Linux: 11.3.2. Disabling Services Under Unix (Building Internet Firewalls)
- 11.3.4. Specific Unix Services to Disable (Building Internet Firewalls)
- on Windows NT: 12.4.2. How to Disable Services Under Windows NT (Building Internet Firewalls)
- 12.4.5. Specific Windows NT Services to Disable (Building Internet Firewalls)
- displaying for hosts: 2.1.3. netstat (Network Troubleshooting Tools)
- essential
- on Unix/Linux: 11.3.3. Which Services Should You Leave Enabled? (Building Internet Firewalls)
- on Windows NT: 12.4.4. Which Services Should You Leave Enabled? (Building Internet Firewalls)
- evaluating risks of: 13.2.1. What Operations Does the Protocol Allow? (Building Internet Firewalls)
- filtering traffic: 5.4.2.4.2. Protocol and port filtering. (Network Troubleshooting Tools)
- information lookup: 20.7. Information Lookup Services (Building Internet Firewalls)
- installing and modifying: 10.10.5. Installing and Modifying Services (Building Internet Firewalls)
- on Windows NT: 12.5. Installing and Modifying Services (Building Internet Firewalls)
- on Unix/Linux: 11.4. Installing and Modifying Services (Building Internet Firewalls)
- LAN-oriented: 10.6. Selecting Services Provided by a Bastion Host (Building Internet Firewalls)
- management of, on Unix/Linux: 11.3.1. How Are Services Managed Under Unix? (Building Internet Firewalls)
- network management (see network, management services)
- protecting with TCP Wrapper: 11.4.1. Using the TCP Wrapper Package to Protect Services (Building Internet Firewalls)
- protecting with tcpwrappers tool: 11.2.3.1. tcpwrappers (Network Troubleshooting Tools)
- proxy (see proxy services)
- real-time conferencing: 19. Real-Time Conferencing Services (Building Internet Firewalls)
- registry keys for: 12.4.1.1. Registry keys (Building Internet Firewalls)
- run levels and: 2.2.4. Startup Files and Scripts (Network Troubleshooting Tools)
- selecting for bastion host: 10.6. Selecting Services Provided by a Bastion Host (Building Internet Firewalls)
- types of in packets: 5.6.1.1. Using ethereal (Network Troubleshooting Tools)
- waiting for connection requests: 2.1.3. netstat (Network Troubleshooting Tools)
- Windows NT: 12.4.1. How Are Services Managed Under Windows NT? (Building Internet Firewalls)
services file, NIS map: 9.4. Network Information Service (TCP/IP Network Administration)
session identifiers: 3.4.1. Establishing the Secure Connection (SSH, The Secure Shell)
session keys: 12.5.4.8. Establishing a session key (Managing NFS and NIS)
- 3.3. The Architecture of an SSH System (SSH, The Secure Shell)
- 3.5.1.2. Session key exchange and the server key (SSH, The Secure Shell)
- double-encryption: 3.4.1. Establishing the Secure Connection (SSH, The Secure Shell)
- generation by client: 3.4.1. Establishing the Secure Connection (SSH, The Secure Shell)
session layer (7-layer model): 1.5. The session and presentation layers (Managing NFS and NIS)
Session Layer (OSI Model): 1.2. A Data Communications Model (TCP/IP Network Administration)
- 1.2. A Data Communications Model (TCP/IP Network Administration)
sessions: 3.3. The Architecture of an SSH System (SSH, The Secure Shell)
- client-server key exchange, SSH-2: 3.5.1.2. Session key exchange and the server key (SSH, The Secure Shell)
- rekeying for improved security: 3.5.1.7. Session rekeying (SSH, The Secure Shell)
set all command (nslookup): 14.3.11. Syntax Error in resolv.conf (DNS and Bind)
- 14.7.1. Local Name Can't Be Looked Up (DNS and Bind)
set command (nslookup): 12.3. Option Settings (DNS and Bind)
set operations: 2.6.4. The set Operation (Essential SNMP)
- 8. Polling and Setting (Essential SNMP)
- creating text files with: 11.3. OpenView's Extensible Agent (Essential SNMP)
- error messages: 2.6.5. get, get-next, get-bulk, and set Error Responses (Essential SNMP)
- 8.4. Error Responses (Essential SNMP)
- Net-SNMP: C.3.5. snmpset (Essential SNMP)
- Perl: E.2.4. snmpset( ) (Essential SNMP)
- setting and confirming values: 8.3. Setting a MIB Value (Essential SNMP)
- SNMP compatibility and: 4.1. What Does SNMP-Compatible Really Mean? (Essential SNMP)
- SNMPv3: F.1.2. SNMPv3 Applications (Essential SNMP)
- SystemEDGE output requirements: 11.2.1. Extensibility for Unix and Windows NT (Essential SNMP)
- updating tables: 11.3.1. Tables (Essential SNMP)
set option command (sendmail): 10.5.4. Setting Options (TCP/IP Network Administration)
SetEnvIf directive (Apache): 11.4.5. Using Encryption (TCP/IP Network Administration)
setgid files, share command and: 9.1.2.1. The share command (TCP/IP Network Administration)
setgid/setuid capabilities: 11. Unix and Linux Bastion Hosts (Building Internet Firewalls)
SET_REQUEST messages (SNMP): 7.1. Overview of SNMP (Network Troubleshooting Tools)
- 7.2.1.1. snmpget (Network Troubleshooting Tools)
- 7.2.1.4. snmpset (Network Troubleshooting Tools)
setrlimit() system calls, cannot set resource limits message and: 7.6.1. Common Syslog Messages (DNS and Bind)
Sets in filters: 6.1.5. Using OpenView Filters (Essential SNMP)
- 6.1.5.1. Sets (Essential SNMP)
setting up
- BIND configuration file: 4.3. Setting Up a BIND Configuration File (DNS and Bind)
- slave name servers: 4.8.1. Setup (DNS and Bind)
setting values with scotty (SNMP): 7.2.2. scotty (Network Troubleshooting Tools)
setuid
- executables, security and: 12.4.2. Superuser mapping (Managing NFS and NIS)
- root privileges, remote files and: 12.4.2. Superuser mapping (Managing NFS and NIS)
- client, security risks under SSH1: 3.5.2.3. Setuid client (SSH, The Secure Shell)
- files, share command and: 9.1.2.1. The share command (TCP/IP Network Administration)
- programs: 4.1.5.2. Installation, files, and directories (SSH, The Secure Shell)
setup
- diskless clients: 8.2. Setting up a diskless client (Managing NFS and NIS)
- NFS: 6.1. Setting up NFS (Managing NFS and NIS)
setup packets: 5.4.2.4.3. Packet characteristics. (Network Troubleshooting Tools)
severities, list of: 7.5. Logging in BIND 8 and 9 (DNS and Bind)
severity levels of events (OpenView): 10.2.2.3. Forwarding events and event severities (Essential SNMP)
SFail statistic: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
SFErr statistic: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
SFS benchmarking tool: 10.1.6. NFS (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
sftp2 error messages: 12.2.5.5. sftp2 (SSH, The Secure Shell)
sftp2, regular expressions: A. SSH2 Manpage for sshregex (SSH, The Secure Shell)
sftp protocol: 3.8. SSH and File Transfers (scp and sftp) (SSH, The Secure Shell)
sftp-server: 3.8. SSH and File Transfers (scp and sftp) (SSH, The Secure Shell)
sftp (SSH2): 2.7.1. sftp (SSH, The Secure Shell)
- : 12.2.6. Secure Shell (TCP/IP Network Administration)
- 3.8.2. scp2/sftp Details (SSH, The Secure Shell)
- ASCII vs. binary transfer: 2.7.1. sftp (SSH, The Secure Shell)
- command-line options: 2.7.1. sftp (SSH, The Secure Shell)
- vs. ftp: 2.7.1. sftp (SSH, The Secure Shell)
SFwdQ statistic: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
SFwdR statistic: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
SGMP (Simple Gateway Management Protocol): 1.1. Network Management and Monitoring (Essential SNMP)
SHA-1 (Secure Hash Algorithm): 3.9.3.3. SHA-1 (SSH, The Secure Shell)
SHA algorithm: F.1.1. The SNMPv3 Engine (Essential SNMP)
- F.2.1. Configuring SNMPv3 for a Cisco Router (Essential SNMP)
shadow files: 4.3.5. Compilation Flags (SSH, The Secure Shell)
shadow namespace: 11.3.5. A Split Namespace (DNS and Bind)
shadow password files: 12.2.1. The Shadow Password File (TCP/IP Network Administration)
share command: 6.2. Exporting filesystems (Managing NFS and NIS)
- enabling logging: 14.6.1. NFS server logging mechanics (Managing NFS and NIS)
- exporting filesystems and: 6.2.2. Exporting options (Managing NFS and NIS)
- options: 9.1.2.1. The share command (TCP/IP Network Administration)
- persistence: 9.1.2.1. The share command (TCP/IP Network Administration)
share setting (smb.config file): 9.3.1. Configuring a Samba Server (TCP/IP Network Administration)
share utility, /etc/dfs/sharetab and: 14.1. NFS administration tools (Managing NFS and NIS)
shared media networks: 13.4.4. Subdividing an Ethernet (TCP/IP Network Administration)
shared-network statement (dhcpd): D.3.1. Topology Statements (TCP/IP Network Administration)
sharing files: 2.4. File Transfer, File Sharing, and Printing (Building Internet Firewalls)
- 2.4.2. File Sharing (Building Internet Firewalls)
- 17.3. Network File System (NFS)
(Building Internet Firewalls)
- on Microsoft networks: 17.4. File Sharing for Microsoft Networks (Building Internet Firewalls)
sharp sign (#)
- automounter comments: 9.1.4. NFS Automounter (TCP/IP Network Administration)
- comments: 3.2. The Host Table (TCP/IP Network Administration)
- comments in host table: 3.2. The Host Table (TCP/IP Network Administration)
- inittab file: 5.2.1.1. Understanding /etc/inittab (TCP/IP Network Administration)
SHA/SHA-1 algorithms: C.5.3. Cryptographic Hashes and Message Digests (Building Internet Firewalls)
shell command
- dip: A.1.1. The dip Script File (TCP/IP Network Administration)
- security: 12.5.1.2. Defining an optional shell command (TCP/IP Network Administration)
SHELL environment variable: 2.5. The SSH Agent (SSH, The Secure Shell)
shell escapes, from within forced commands: 8.2.4.1. Security issues (SSH, The Secure Shell)
shell files, security considerations: 12.4.2. Looking for Trouble (TCP/IP Network Administration)
shell profiles: 12.2. Who's Logging into My Machine? (I-Am-in) (Essential SNMP)
shell script programming: 15.1. Shell Script Programming with nslookup (DNS and Bind)
shell scripts: 11.3.1.1. Services started by /etc/rc files or directories (Building Internet Firewalls)
- checking file types: 11.1. Net-SNMP (Essential SNMP)
- dig tool and: 10.1.4.1. nslookup and dig (Network Troubleshooting Tools)
- finding files: 11.1. Net-SNMP (Essential SNMP)
- hooks to: 10.3.6. Using Hooks with Your Programs (Essential SNMP)
- 10.3.6. Using Hooks with Your Programs (Essential SNMP)
- internal polling scripts: 9.1. Internal Polling (Essential SNMP)
- OpenView: 6.1. HP's OpenView Network Node Manager (Essential SNMP)
- sanitize tool: 5.5.1. sanitize (Network Troubleshooting Tools)
- SystemEDGE: 11.2.1. Extensibility for Unix and Windows NT (Essential SNMP)
- tclsh tool: 6.4.1. Tcl/Tk and scotty (Network Troubleshooting Tools)
- tcp-reduce tool: 5.5.4. tcp-reduce (Network Troubleshooting Tools)
shortcuts for zone data files: 4.4. Abbreviations (DNS and Bind)
- examples illustrating: 4.4.4. The Shortened Zone Data Files (DNS and Bind)
.shosts: 3.4.2.3.1. Trusted-host access files (SSH, The Secure Shell)
- 5.5.2.4. shosts access control (SSH, The Secure Shell)
- access control: 5.5.2.4. shosts access control (SSH, The Secure Shell)
- ownership: 10.1. The Basics (SSH, The Secure Shell)
- permissions: 5.4.2.1. Acceptable permissions for user files (SSH, The Secure Shell)
- syntax: 3.4.2.3.2. Control file details (SSH, The Secure Shell)
shosts.equiv file: 3.4.2.3.1. Trusted-host access files (SSH, The Secure Shell)
- 5.5.2.4. shosts access control (SSH, The Secure Shell)
- syntax: 3.4.2.3.2. Control file details (SSH, The Secure Shell)
show-password option (pppd): A.2. The PPP Daemon (TCP/IP Network Administration)
showmount command: 13.3.1.1. Identifying RPC services (Managing NFS and NIS)
- 14.1. NFS administration tools (Managing NFS and NIS)
- 9.1.3. Mounting Remote Filesystems (TCP/IP Network Administration)
showwarnings parameter (gated): B.8.4. The bgp Statement (TCP/IP Network Administration)
shuffle address records: 10.7. Round Robin Load Distribution (DNS and Bind)
shutdown scripts: 2.2.4. Startup Files and Scripts (Network Troubleshooting Tools)
shutting down
- interfaces: 2.1.5. ifconfig (Network Troubleshooting Tools)
- routers: 7.3.6.2. Advanced configuration (Essential SNMP)
- systems: 27.1.3. Disconnect or Shut Down, as Appropriate (Building Internet Firewalls)
- 27.4.3. Planning for Disconnecting or Shutting Down Machines (Building Internet Firewalls)
sibling nodes, domain name labels and: 2.1.1. Domain Names (DNS and Bind)
SIG record: 11.4.3. The SIG Record (DNS and Bind)
sig-validity-interval (named): C.2.5.1. The BIND 9 options statement (TCP/IP Network Administration)
siggen checksum tool: 11.4.1. tripwire (Network Troubleshooting Tools)
SIGHUP:
5.3.3. Changing the Configuration (SSH, The Secure Shell)
- gated signal processing: B.1.1. Signal Processing (TCP/IP Network Administration)
- named signal processing: C.1.1. Signal Processing (TCP/IP Network Administration)
- pppd signal processing: A.2.1. Signal Processing (TCP/IP Network Administration)
SIGILL (named signal processing): C.1.1. Signal Processing (TCP/IP Network Administration)
SIGINT
- gated signal processing: B.1.1. Signal Processing (TCP/IP Network Administration)
- named signal processing: C.1.1. Signal Processing (TCP/IP Network Administration)
- pppd signal processing: A.2.1. Signal Processing (TCP/IP Network Administration)
SIGKILL (gated signal processing): B.1.1. Signal Processing (TCP/IP Network Administration)
signal processing
- gated: B.1.1. Signal Processing (TCP/IP Network Administration)
- named command: C.1.1. Signal Processing (TCP/IP Network Administration)
- pppd: A.2.1. Signal Processing (TCP/IP Network Administration)
signals: 7.1. Controlling the Name Server (DNS and Bind)
- to primary server, forgetting: 14.3.2. Forgot to Reload Primary Master Name Server (DNS and Bind)
- using: 7.1.3. Using Signals (DNS and Bind)
- control channels instead of: 7.1. Controlling the Name Server (DNS and Bind)
signatures for devices: 6.3.1. Stack Fingerprinting (Network Troubleshooting Tools)
signer: 3.3. The Architecture of an SSH System (SSH, The Secure Shell)
SIGSYS (named signal processing): C.1.1. Signal Processing (TCP/IP Network Administration)
SIGTERM
- gated signal processing: B.1.1. Signal Processing (TCP/IP Network Administration)
- named signal processing: C.1.1. Signal Processing (TCP/IP Network Administration)
SIGUSR2
- B.1.1. Signal Processing (TCP/IP Network Administration)
- named signal processing: C.1.1. Signal Processing (TCP/IP Network Administration)
- pppd signal processing: A.2.1. Signal Processing (TCP/IP Network Administration)
SIGWINCH (named signal processing): C.1.1. Signal Processing (TCP/IP Network Administration)
silent option (pppd): A.2. The PPP Daemon (TCP/IP Network Administration)
SilentDeny: 5.5.2.3. Hostname access control (SSH, The Secure Shell)
- recommended settings: 10.3.2. /etc/sshd_config (SSH, The Secure Shell)
Silicon Graphics (see IRIX)
Simple Gateway Management Protocol (SGMP): 1.1. Network Management and Monitoring (Essential SNMP)
Simple Mail Transfer Protocol (see SMTP)
- 1.7. Application Layer (TCP/IP Network Administration)
- 3.4.1. Simple Mail Transfer Protocol (TCP/IP Network Administration)
Simple Network Management Protocol (see SNMP)
- 0. Preface (Essential SNMP)
- 7.1. Overview of SNMP (Network Troubleshooting Tools)
Simple Network Time Protocol (SNTP): 11.3. NTP (Network Troubleshooting Tools)
Simple Public Key Infrastructure (SPKI): C.3.2. Certificates (Building Internet Firewalls)
Simple TCP/IP printing services, disabling: 12.4.5. Specific Windows NT Services to Disable (Building Internet Firewalls)
simple watcher tool: 11.2.2. Log File Management (Network Troubleshooting Tools)
SimpleWeb: 1.7. Getting More Information (Essential SNMP)
simplex (gated): B.6. Interface Statements (TCP/IP Network Administration)
simulations of system performance: 12.2.2. Performance Analysis and Monitoring (Network Troubleshooting Tools)
simulators
- animating: 9.2.2. ns and nam (Network Troubleshooting Tools)
- benefits: 9.2. Network Emulators and Simulators (Network Troubleshooting Tools)
- ns and nam tools: 9.2.2. ns and nam (Network Troubleshooting Tools)
- uses: 9.2. Network Emulators and Simulators (Network Troubleshooting Tools)
single-homed devices: 8.2. Retrieving Multiple MIB Values (Essential SNMP)
single-purpose routers: 8.8.2. It Can Be a Single-Purpose Router or a General-Purpose Computer (Building Internet Firewalls)
siphon fingerprinting tool: 6.3.1. Stack Fingerprinting (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
SITE macro (sendmail): E.3. m4 sendmail Macros (TCP/IP Network Administration)
SITECONFIG macro (sendmail): E.3. m4 sendmail Macros (TCP/IP Network Administration)
size bytes (gated): B.4. Trace Statements (TCP/IP Network Administration)
size field (lsmod command): 5.1.1. Using Dynamically Loadable Modules (TCP/IP Network Administration)
S/Key
- authentication using: 5.5.1.10. S/Key authentication (SSH, The Secure Shell)
- enabling in OpenSSH: 4.3.5. Compilation Flags (SSH, The Secure Shell)
skey command (dip): A.1.1. The dip Script File (TCP/IP Network Administration)
S/Key password program: 21.3.1. One-Time Password Software (Building Internet Firewalls)
S/Key software OTP system: 3.4.2.5. One-time passwords (SSH, The Secure Shell)
SKeyAuthentication: 5.5.1.10. S/Key authentication (SSH, The Secure Shell)
Skipjack algorithm: C.5.1. Encryption Algorithms (Building Internet Firewalls)
SLAC (Stanford Linear Accelerator Center): A.2. Generic Sources (Network Troubleshooting Tools)
slash (/) indicating Unix filesystem root: 1.3. The Domain Name System in a Nutshell (DNS and Bind)
- 2.1. The Domain Name Space (DNS and Bind)
slave directive: E.2.7. slave (DNS and Bind)
slave name servers: 2.4.2. Types of Name Servers (DNS and Bind)
- 8.2.3. Partial-Slave Servers (DNS and Bind)
- (see also partial-slave name servers)
- adding: 8.2.1. Primary Master and Slave Servers (DNS and Bind)
- 9.4.6. Adding a movie.edu Slave (DNS and Bind)
- caution with: 8.2.1. Primary Master and Slave Servers (DNS and Bind)
- backups of zone data for, importance of: 4.8.2. Backup Files (DNS and Bind)
- checking zone (debugging example): 13.3.6. A Slave Name Server Checking Its Zone (BIND 8, Debug Level 1) (DNS and Bind)
- forwarders and: 10.5. Forwarding (DNS and Bind)
- loading from other slaves: 8.2.1. Primary Master and Slave Servers (DNS and Bind)
- outages and: 8.6.2. Longer Outages (Days) (DNS and Bind)
- vs. primary master name server: 4.8. Running a Slave Name Server (DNS and Bind)
- reloading, command for: 7.1.1. ndc and controls (BIND 8) (DNS and Bind)
- running: 4.8. Running a Slave Name Server (DNS and Bind)
- setting up: 4.8.1. Setup (DNS and Bind)
- example of: 9.4.3. An fx.movie.edu Slave (DNS and Bind)
- starting up: 4.8.1. Setup (DNS and Bind)
- automatically: 4.8.1. Setup (DNS and Bind)
- testing with nslookup: 4.8.1. Setup (DNS and Bind)
- unable to load zone data: 14.3.3. Slave Name Server Can't Load Zone Data (DNS and Bind)
slave servers: 3.1. Masters, slaves, and clients (Managing NFS and NIS)
- 3.3.4. BIND, Resolvers, and named (TCP/IP Network Administration)
- 8.1.1. BIND Configurations (TCP/IP Network Administration)
- adding: 3.2. Basics of NIS management (Managing NFS and NIS)
- adding later: 3.2.3.1. Adding slave servers later (Managing NFS and NIS)
- configuring: 8.3.1.2. Master and slave server configurations (TCP/IP Network Administration)
- 8.3.5. The named.local File (TCP/IP Network Administration)
- initializing: 3.2.3. Installing NIS slave servers (Managing NFS and NIS)
- installing: 3.2.3. Installing NIS slave servers (Managing NFS and NIS)
- listing: 3.2.3. Installing NIS slave servers (Managing NFS and NIS)
- removing: 4.3.1. Removing an NIS slave server (Managing NFS and NIS)
slave zones, command for maintaining: 7.1.2. rndc and controls (BIND 9) (DNS and Bind)
sleep 2 command (dip): 6.3.2. Dial-Up PPP (TCP/IP Network Administration)
sleep command (dip): A.1.1. The dip Script File (TCP/IP Network Administration)
SLIP END character: 6.2.1. The Serial Protocols (TCP/IP Network Administration)
SLIP ESC character: 6.2.1. The Serial Protocols (TCP/IP Network Administration)
SLIP (Serial Line IP): 6.2.1. The Serial Protocols (TCP/IP Network Administration)
- limitations: 6.2.1. The Serial Protocols (TCP/IP Network Administration)
sl4nt syslog tool: A.4. Sources for Tools (Network Troubleshooting Tools)
slogin (SSH1): 2.7.2. slogin (SSH, The Secure Shell)
slow servers, testing for: 18.1.1. Identifying NFS retransmissions (Managing NFS and NIS)
smail program: 16.2.8.1. smail (Building Internet Firewalls)
smap/smapd programs: 16.2.8.2. Postfix (Building Internet Firewalls)
- 16.2.10. Improving SMTP Security with smap and smapd (Building Internet Firewalls)
Smart Card service: 12.4.4. Which Services Should You Leave Enabled? (Building Internet Firewalls)
SMB (Server Message Block):
and Server Message Block (SMB)
(Building Internet Firewalls)
- 14.4. Common Internet File System (CIFS) and Server Message Block (SMB)
(Building Internet Firewalls)
- 17.4. File Sharing for Microsoft Networks (Building Internet Firewalls)
- 10.2.1. NFS versus SMB (CIFS)
(Managing NFS and NIS)
- 3.5.1. File Sharing (TCP/IP Network Administration)
- authentication: 14.4.1. Authentication and SMB (Building Internet Firewalls)
- 21.6.4. SMB Authentication (Building Internet Firewalls)
- (CIFS) security flavor: 12.2. How secure are NIS and NFS? (Managing NFS and NIS)
SMB (System Messaged Blocks): 6.6. Politics and Security (Network Troubleshooting Tools)
smb.conf file: 9.3.1. Configuring a Samba Server (TCP/IP Network Administration)
- directory sharing: 9.3.1.2. Sharing directories through Samba (TCP/IP Network Administration)
- global section: 9.3.1. Configuring a Samba Server (TCP/IP Network Administration)
- home section: 9.3.1.1. The smb.conf homes section (TCP/IP Network Administration)
- name server configuration: 9.3.2. NetBIOS Name Service (TCP/IP Network Administration)
- printer sharing: 9.3.1.3. Sharing printers through Samba (TCP/IP Network Administration)
smbd command: 9.3. Using Samba to Share Resources with Windows (TCP/IP Network Administration)
smbpasswd file: 9.3.1. Configuring a Samba Server (TCP/IP Network Administration)
SMI (Structure of Management Information): 1.4. The Structure of Management Information and MIBS (Essential SNMP)
- 7.1. Overview of SNMP (Network Troubleshooting Tools)
- SMI Next Generation (SMING): 2.3.2. Defining OIDs (Essential SNMP)
- SMIv2: 2.3. The Structure of Management Information (Essential SNMP)
- 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
- datatypes: 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
- object definition enhancements: 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
- RFC standards: D.2. SMIv2 Data Definition Language (Essential SNMP)
- textual conventions: 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
S/MIME: 16.1.4. S/MIME and OpenPGP (Building Internet Firewalls)
SMIT (System Management Interface Tool): 6.4.4.2. AIX 4.2.1 (DNS and Bind)
SMS (System Management Server): 22.1.3. System Management Server (SMS) (Building Internet Firewalls)
- 5.8. Microsoft Windows (Network Troubleshooting Tools)
smtp8 mailer: 10.4.1.1. Building a sendmail.cf with m4 macros (TCP/IP Network Administration)
SMTP (Simple Mail Transfer Protocol): 2.3.1. Electronic Mail (Building Internet Firewalls)
- 10.1.1. Email (Network Troubleshooting Tools)
- 10.6. Selecting Services Provided by a Bastion Host (Building Internet Firewalls)
- 16.2. Simple Mail Transfer Protocol (SMTP)
(Building Internet Firewalls)
- 1.7. Application Layer (TCP/IP Network Administration)
- 3.4.1. Simple Mail Transfer Protocol (TCP/IP Network Administration)
- commands: 3.4.1. Simple Mail Transfer Protocol (TCP/IP Network Administration)
- source code: 3.4.1. Simple Mail Transfer Protocol (TCP/IP Network Administration)
- viewing: E.2. The sendmail Command (TCP/IP Network Administration)
- configuring: 24.2.1.2. SMTP (Building Internet Firewalls)
- firewalls and: 16.2.6. Configuring SMTP to Work with a Firewall (Building Internet Firewalls)
- in screened subnet architecture: 24.1.1.2. SMTP (Building Internet Firewalls)
- ESMTP (Extended SMTP): 3.4.4. Multipurpose Internet Mail Extensions (TCP/IP Network Administration)
- private extensions to: 3.4.4. Multipurpose Internet Mail Extensions (TCP/IP Network Administration)
- proxying: 9.4. Proxying Without a Proxy Server (Building Internet Firewalls)
- sendmail: 10.2. Running sendmail as a Daemon (TCP/IP Network Administration)
- required macros: 10.4.1.1. Building a sendmail.cf with m4 macros (TCP/IP Network Administration)
- servers
- for Windows NT: 16.2.13. SMTP Servers for Windows NT (Building Internet Firewalls)
- commercial: 16.2.9. Commercial SMTP Servers for Unix (Building Internet Firewalls)
- freely available: 16.2.8. Other Freely Available SMTP Servers for Unix (Building Internet Firewalls)
- service extensions: 3.4.4. Multipurpose Internet Mail Extensions (TCP/IP Network Administration)
- 3.4.4. Multipurpose Internet Mail Extensions (TCP/IP Network Administration)
- for Unix (see Sendmail)
SMTP support in devices: 6.2.2. Discovery and Filters (Essential SNMP)
Smurf attacks: 3.3.3.2. Smurf Attacks (Network Troubleshooting Tools)
SMUX (SNMP Multiplexing Protocol): 4.5. A Look Ahead (Essential SNMP)
smux statement (gated): B.8.6. The smux Statement (TCP/IP Network Administration)
SNaAns statistic: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
snapshots, system: 27.1.6. Snapshot the System (Building Internet Firewalls)
- of traffic data: 5.5.8. trafshow (Network Troubleshooting Tools)
- planning for: 27.4.5. Planning for Snapshots (Building Internet Firewalls)
sniffers: 1.2.1.3. Information theft (Building Internet Firewalls)
- 13.1.6. Packet Sniffing (Building Internet Firewalls)
- protecting against: 13.1.10. Protecting Services (Building Internet Firewalls)
sniffing for passwords: 21.3.1. One-Time Password Software (Building Internet Firewalls)
SNMP++: 5.5. Supporting Software (Essential SNMP)
SNMP for Perl 5 package: A.4. Sources for Tools (Network Troubleshooting Tools)
SNMP Link: 1.7. Getting More Information (Essential SNMP)
SNMP Manager tool: 6.1.2. Discovery and Mapping Tools (Network Troubleshooting Tools)
SNMP MIB Browser (OpenView): 8.1.1. Using HP OpenView to Retrieve Values (Essential SNMP)
- 8.2.1. Walking the MIB Tree with OpenView (Essential SNMP)
SNMP Multiplexing Protocol (SMUX): 4.5. A Look Ahead (Essential SNMP)
SNMP (Simple Network Management Protocol): 2.9.1. System Management (Building Internet Firewalls)
- 22.1.2. Simple Network Management Protocol (SNMP)
(Building Internet Firewalls)
- 0. Preface (Essential SNMP)
- 0. Preface (Essential SNMP)
- 1. What Is SNMP?
(Essential SNMP)
- AgentX: 4.5. A Look Ahead
(Essential SNMP)
- basic operation and structures: 7.1. Overview of SNMP (Network Troubleshooting Tools)
- before-and-after scenarios: 1.1.1. Before and After SNMP (Essential SNMP)
- bilingual agents: 4.1. What Does SNMP-Compatible Really Mean? (Essential SNMP)
- books and resources: B.2.3. Specific Protocols (Network Troubleshooting Tools)
- compatibility: 4.1. What Does SNMP-Compatible Really Mean? (Essential SNMP)
- in bottleneck analysis: 12.2.2.2. Bottleneck analysis (Network Troubleshooting Tools)
- communities: 2.2. SNMP Communities (Essential SNMP)
- community strings: 6.6. Politics and Security (Network Troubleshooting Tools)
- 7.1. Overview of SNMP (Network Troubleshooting Tools)
- compatible or compliant devices: 4.1. What Does SNMP-Compatible Really Mean? (Essential SNMP)
- devices lacking support for: 7.2.3.1. ICMP monitoring (Network Troubleshooting Tools)
- disabling, on Windows NT: 12.4.5. Specific Windows NT Services to Disable (Building Internet Firewalls)
- error messages: 2.6.5. get, get-next, get-bulk, and set Error Responses (Essential SNMP)
- examining MIBs with tkined: 7.2.3.3. Examining MIBs (Network Troubleshooting Tools)
- FAQs: 1.7. Getting More Information (Essential SNMP)
- graphing objects: 8.6.2. getif revisited (Network Troubleshooting Tools)
- history: 1. What Is SNMP? (Essential SNMP)
- host management: 1.5. Host Management (Essential SNMP)
- 2.7. Host Management Revisited (Essential SNMP)
- information and resources: 1.7. Getting More Information (Essential SNMP)
- management groups (MIB-II): 2.5. A Closer Look at MIB-II (Essential SNMP)
- managers and agents: 7.1. Overview of SNMP (Network Troubleshooting Tools)
- MIBs (see MIBs)
- Microsoft Windows: 7.4. Microsoft Windows (Network Troubleshooting Tools)
- mrtg usage of: 8.4.1. mrtg (Network Troubleshooting Tools)
- NET SNMP tool: 7.2. SNMP-Based Management Tools (Network Troubleshooting Tools)
- network management: 1.1. Network Management and Monitoring (Essential SNMP)
- objects: 7.1. Overview of SNMP (Network Troubleshooting Tools)
- operations overview: 2.6. SNMP Operations (Essential SNMP)
- performance measurements: 8.4. Network-Monitoring Tools (Network Troubleshooting Tools)
- Perl operations: E.2. SNMP Operations (Essential SNMP)
- ports: 6.3. Device Identification (Network Troubleshooting Tools)
- in protocol stack: 2.1. SNMP and UDP (Essential SNMP)
- remote monitoring (see RMON)
- RFC standards: 1.2. RFCs and SNMP Versions (Essential SNMP)
- D. SNMP RFCs (Essential SNMP)
- RMON extensions: 8.5. RMON (Network Troubleshooting Tools)
- scotty tool: 7.2.2. scotty (Network Troubleshooting Tools)
- security issues: 7.1. Overview of SNMP (Network Troubleshooting Tools)
- security weaknesses: 7.2. Security Concerns (Essential SNMP)
- F. SNMPv3 (Essential SNMP)
- SMI: 1.4. The Structure of Management Information and MIBS (Essential SNMP)
- SMIv2: 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
- SNMP Manager: 6.1.2. Discovery and Mapping Tools (Network Troubleshooting Tools)
- snmp.conf file: 7.2.1.2. Configuration and options (Network Troubleshooting Tools)
- SNMPv3: 7.1. Overview of SNMP (Network Troubleshooting Tools)
- SNMPv2 Classic, v2*, v2c, and v2u: 7.1. Overview of SNMP (Network Troubleshooting Tools)
- staffing considerations: 1.1.2. Human Considerations (Essential SNMP)
- tkined tool: 7.2.3. tkined (Network Troubleshooting Tools)
- toasters controlled by: 7.2.1.4. snmpset (Network Troubleshooting Tools)
- traps: 7.2.3.2. SNMP traps (Network Troubleshooting Tools)
- troubleshooting routing tables: 10.1.5. Routing (Network Troubleshooting Tools)
- UDP and: 2.1. SNMP and UDP (Essential SNMP)
- versions: 7.1. Overview of SNMP (Network Troubleshooting Tools)
- (Network Troubleshooting Tools) 7.2.1. NET SNMP (UCD SNMP)
- web-based interfaces: 3.3. A Look Ahead (Essential SNMP)
snmpbulkget command (see snmpgetbulk command)
snmpbulkwalk command (Net-SNMP): C.3.4. snmpbulkwalk (Essential SNMP)
SNMPc: 5.2. NMS Suites (Essential SNMP)
- configuration: 6.2. Castle Rock's SNMPc Enterprise Edition (Essential SNMP)
- installation: 6.2. Castle Rock's SNMPc Enterprise Edition (Essential SNMP)
- loading MIBs: 6.2.3. Loading MIBs into SNMPc (Essential SNMP)
- node discovery: 6.2.2. Discovery and Filters (Essential SNMP)
- seed devices: 6.2. Castle Rock's SNMPc Enterprise Edition (Essential SNMP)
- 6.2.2. Discovery and Filters (Essential SNMP)
- external polling: 9.2.4. Castle Rock's SNMPc (Essential SNMP)
- Automatic Alarms: 9.2.4. Castle Rock's SNMPc (Essential SNMP)
- customizing menus: 9.2.4. Castle Rock's SNMPc (Essential SNMP)
- graphing: 9.2.4. Castle Rock's SNMPc (Essential SNMP)
- learning periods: 9.2.4. Castle Rock's SNMPc (Essential SNMP)
- thresholds: 9.2.4. Castle Rock's SNMPc (Essential SNMP)
- 9.2.4. Castle Rock's SNMPc (Essential SNMP)
- workgroup and enterprise editions: 9.2.4. Castle Rock's SNMPc (Essential SNMP)
snmpCol.trace file (OpenView): 9.2.3.2. Creating a threshold (Essential SNMP)
snmp.conf file: 7.2.1.2. Configuration and options (Network Troubleshooting Tools)
snmpconf utility (Net-SNMP): 7.3.4. Net-SNMP (Formerly UCD-SNMP) (Essential SNMP)
- 8.1.2. Using Net-SNMP (Essential SNMP)
- C.3.13. snmpconf (Essential SNMP)
snmpd agent: 7.2.1.8. Agents and traps (Network Troubleshooting Tools)
snmpd log files: 7.3.4. Net-SNMP (Formerly UCD-SNMP) (Essential SNMP)
- 11.3. OpenView's Extensible Agent (Essential SNMP)
snmpd.conf file: 7.2.1.8. Agents and traps (Network Troubleshooting Tools)
snmpdelta command: C.3.7. snmpdelta (Essential SNMP)
snmpdf command (Net-SNMP): C.3.8. snmpdf (Essential SNMP)
snmpdm (OpenView master agent): 11. Extensible SNMP Agents (Essential SNMP)
- 11.3. OpenView's Extensible Agent (Essential SNMP)
snmpget command: 2.6.1. The get Operation (Essential SNMP)
- 7.2.1.1. snmpget (Network Troubleshooting Tools)
- 2.6.1. The get Operation (Essential SNMP)
- 8. Polling and Setting (Essential SNMP)
- E.2.1. snmpget( ) (Essential SNMP)
- confirming set commands: 2.6.4. The set Operation (Essential SNMP)
- diagnosing SNMP version with: 4.2. Is My Device SNMP-Compatible? (Essential SNMP)
- error responses: 8.4. Error Responses (Essential SNMP)
- Net-SNMP operations: 8.1.2. Using Net-SNMP (Essential SNMP)
- C.3.2. snmpget (Essential SNMP)
- OpenView operations: 8.1.1. Using HP OpenView to Retrieve Values (Essential SNMP)
- Perl scripts: 8.1. Retrieving a Single MIB Value (Essential SNMP)
- multiple OIDs in: 8.2. Retrieving Multiple MIB Values (Essential SNMP)
snmpgetbulk command: 2.6.3. The get-bulk Operation (Essential SNMP)
- 2.6.3. The get-bulk Operation (Essential SNMP)
- diagnosing SNMP version with: 4.2. Is My Device SNMP-Compatible? (Essential SNMP)
- Net-SNMP: C.3.3. snmpbulkget (Essential SNMP)
snmpgetnext command: C.3.9. snmpgetnext (Essential SNMP)
- C.3.9. snmpgetnext (Essential SNMP)
- (see also get-next operations)
- E.2.2. snmpgetnext( ) (Essential SNMP)
- 7.2.1.1. snmpget (Network Troubleshooting Tools)
- 7.2.1.3. snmpgetnext, snmpwalk, and snmptable (Network Troubleshooting Tools)
snmpInfo table (SNMPc): 9.2.4. Castle Rock's SNMPc (Essential SNMP)
snmpinform command: C.3.14. snmpinform (Essential SNMP)
snmpLoad_OID_Cache() routine: E.1.3. snmpLoad_OID_Cache( ) (Essential SNMP)
snmpmapOID() routine: E.1.1. snmpmapOID( ) (Essential SNMP)
snmpMIB_to_OID() routine: E.1.2. snmpMIB_to_OID( ) (Essential SNMP)
snmpnetstat utility: 7.2.1.6. snmpnetstat (Network Troubleshooting Tools)
snmpOutPkts object (MIB): 9.2.4. Castle Rock's SNMPc (Essential SNMP)
snmpQueue_MIB_File() routine: E.1.4. snmpQueue_MIB_File( ) (Essential SNMP)
SNMP_Session module: 8.1. Retrieving a Single MIB Value (Essential SNMP)
SNMP_Session.pm extension: 6.4. Scripts (Network Troubleshooting Tools)
snmpset command: 2.6.4. The set Operation (Essential SNMP)
- E.2.4. snmpset( ) (Essential SNMP)
- 7.2.1.1. snmpget (Network Troubleshooting Tools)
- 7.2.1.4. snmpset (Network Troubleshooting Tools)
- 2.6.4. The set Operation (Essential SNMP)
- 8. Polling and Setting (Essential SNMP)
- creating text files: 11.3. OpenView's Extensible Agent (Essential SNMP)
- error responses: 8.4. Error Responses (Essential SNMP)
- Net-SNMP: C.3.5. snmpset (Essential SNMP)
- setting and confirming values: 8.3. Setting a MIB Value (Essential SNMP)
- updating tables: 11.3.1. Tables (Essential SNMP)
snmpstatus command: C.3.10. snmpstatus (Essential SNMP)
- 7.2.1.7. snmpstatus (Network Troubleshooting Tools)
snmptable command: C.3.11. snmptable (Essential SNMP)
- 7.2.1.3. snmpgetnext, snmpwalk, and snmptable (Network Troubleshooting Tools)
- 7.2.1.5. snmptranslate (Network Troubleshooting Tools)
- 8.5. RMON (Network Troubleshooting Tools)
snmptranslate utility (Net-SNMP): 8.1.2. Using Net-SNMP (Essential SNMP)
- C.3.15. snmptranslate (Essential SNMP)
snmptrap programs: 10.3. Sending Traps (Essential SNMP)
- 7.2.1.8. Agents and traps (Network Troubleshooting Tools)
- hooks in: 10.3.6. Using Hooks with Your Programs (Essential SNMP)
- Net-SNMP: 10.3.4. Sending Traps with Net-SNMP (Essential SNMP)
- C.3.6. snmptrap (Essential SNMP)
- OpenView: 10.3.1. Sending Traps with OpenView (Essential SNMP)
- snmptrap() routine: 10.3.2. Sending Traps with Perl (Essential SNMP)
- (Essential SNMP) E.2.5. snmptrap( )
snmptrapd daemon: 7.2.1.8. Agents and traps (Network Troubleshooting Tools)
snmptrapd utility: 10.2.9. Receiving Traps Using Net-SNMP (Essential SNMP)
- 10.3.2. Sending Traps with Perl (Essential SNMP)
snmpusm utility: C.3.12. snmpusm (Essential SNMP)
- F.2.2.1. Using snmpusm to manage users (Essential SNMP)
SNMP_util module: 8.1. Retrieving a Single MIB Value (Essential SNMP)
- E. SNMP Support for Perl (Essential SNMP)
SNMPv3: 1.2. RFCs and SNMP Versions (Essential SNMP)
- applications: F.1.2. SNMPv3 Applications (Essential SNMP)
- authentication (see authentication, SNMPv3)
- changes in: F.1. Changes in SNMPv3 (Essential SNMP)
- Cisco router configuration: F.2.1. Configuring SNMPv3 for a Cisco Router (Essential SNMP)
- cloning users: F.2.2.1. Using snmpusm to manage users (Essential SNMP)
- copying configuration files: F.2.2. Configuring SNMPv3 for Net-SNMP (Essential SNMP)
- creating users: F.2.1. Configuring SNMPv3 for a Cisco Router (Essential SNMP)
- default configurations: F.2.2.2. Simplifying commands by setting defaults (Essential SNMP)
- determining compatibility: 4.2. Is My Device SNMP-Compatible? (Essential SNMP)
- device support: 4.2. Is My Device SNMP-Compatible? (Essential SNMP)
- engine: F.1.1. The SNMPv3 Engine (Essential SNMP)
- entities: F.1. Changes in SNMPv3 (Essential SNMP)
- F.1.3. What Does an Entity Look Like? (Essential SNMP)
- fields: F.2.2.2. Simplifying commands by setting defaults (Essential SNMP)
- groups: F.2.1. Configuring SNMPv3 for a Cisco Router (Essential SNMP)
- IETF working group site: F.3. Final Words on SNMPv3 (Essential SNMP)
- Net-SNMP configuration: 7.3.4.1. Running the configuration script (Essential SNMP)
- F.2. Configuring SNMPv3 (Essential SNMP)
- OpenSSL: F.2.2. Configuring SNMPv3 for Net-SNMP (Essential SNMP)
- privacy: F.1.1. The SNMPv3 Engine (Essential SNMP)
- F.1.4. SNMPv3 Textual Conventions (Essential SNMP)
- F.2.2. Configuring SNMPv3 for Net-SNMP (Essential SNMP)
- RFCs: F.1. Changes in SNMPv3 (Essential SNMP)
- security (see security)
- textual conventions: F.1.4. SNMPv3 Textual Conventions (Essential SNMP)
- trap definition: 10.1.1. SNMPv2 Traps (Essential SNMP)
- trap generation: F.2.2.3. Sending SNMPv3 traps with Net-SNMP (Essential SNMP)
- views: F.2.1. Configuring SNMPv3 for a Cisco Router (Essential SNMP)
snmpV2 branch: 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
snmpwalk command: 2.6.2. The get-next Operation (Essential SNMP)
- E.2.3. snmpwalk( ) (Essential SNMP)
- 7.2.1.3. snmpgetnext, snmpwalk, and snmptable (Network Troubleshooting Tools)
- 2.6.2. The get-next Operation (Essential SNMP)
- 8. Polling and Setting (Essential SNMP)
- dangers of overloading systems: 8.2.1. Walking the MIB Tree with OpenView (Essential SNMP)
- error responses: 8.4. Error Responses (Essential SNMP)
- Net-SNMP: 8.2.2. Walking the Tree with Net-SNMP (Essential SNMP)
- C.3.1. snmpwalk (Essential SNMP)
- OpenView: 8.2.1. Walking the MIB Tree with OpenView (Essential SNMP)
- 11.3. OpenView's Extensible Agent (Essential SNMP)
- Perl scripts: 8.2. Retrieving Multiple MIB Values (Essential SNMP)
- retrieving disk space: 11.1. Net-SNMP (Essential SNMP)
- RMON event tables: 9.1.1.1. RMON configuration (Essential SNMP)
- walking tables: 11.3.1. Tables (Essential SNMP)
- 11.3.1. Tables (Essential SNMP)
snoop: 13.5.1. snoop (Managing NFS and NIS)
- 5.5.10. Other Packet Capture Programs (Network Troubleshooting Tools)
- 14.3. snoop (Managing NFS and NIS)
- diagnostic troubleshooting: 13.2. Diagnostic Tools (TCP/IP Network Administration)
- filters: 14.3.1. Useful filters (Managing NFS and NIS)
- NFS Server Logging utility: 14.6. NFS server logging (Managing NFS and NIS)
- troubleshooting protocols: 13.7.1. Packet Filters (TCP/IP Network Administration)
- ftp failure: 13.8. Protocol Case Study (TCP/IP Network Administration)
Snort (automated system monitoring): 12.4.3. Automated Monitoring (TCP/IP Network Administration)
SNTP (Simple Network Time Protocol): 11.3. NTP (Network Troubleshooting Tools)
sntpd clock tools: 11.3. NTP (Network Troubleshooting Tools)
snuffie program: 10.10.1.1. Next steps after disabling services (Building Internet Firewalls)
SNXD statistic: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
SOA records
(see also Start of Authority records)
3.2.2. Where in the World Do I Fit? (DNS and Bind)
- 4.2.4. SOA Records (DNS and Bind)
- 15.1.1. A Typical Problem (DNS and Bind)
- A.1.2. Types (DNS and Bind)
- @ notation in: 4.4.2. The @ Notation (DNS and Bind)
- changing values in: 8.4.1. Changing Other SOA Values (DNS and Bind)
- finding for subdomains: 3.2.3.1. The us domain (DNS and Bind)
- getting serial numbers for
- sample program in C: 15.2.8. A Sample Program: check_soa (DNS and Bind)
- sample program in Perl: 15.3.6. A Perl Version of check_soa (DNS and Bind)
- incrementing serial numbers and: 7.2.2. SOA Serial Numbers (DNS and Bind)
- no NS records for: 14.5.2. Name Server Reports "No NS Record for SOA MNAME" (DNS and Bind)
- order of in zone data files: 4.2.1. The Zone Data Files (DNS and Bind)
- queries, limiting number of: 10.12.2.6. Limiting the number of SOA queries (DNS and Bind)
- query statistics for: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
- TTL and: 8.4. Changing TTLs (DNS and Bind)
- values for: 4.8.3. SOA Values (DNS and Bind)
- RFC 1537 recommendation for: 4.8.3. SOA Values (DNS and Bind)
SOA serial# message: 7.6.1. Common Syslog Messages (DNS and Bind)
SOA (Start of Authority) records
(see also SOA records)
C.3.1.1. Start of Authority record (TCP/IP Network Administration)
- forward-mapping zone files: 8.3.7. The Forward-Mapping Zone File (TCP/IP Network Administration)
- named.local file: 8.3.5. The named.local File (TCP/IP Network Administration)
- reverse zone files: 8.3.6. The Reverse Zone File (TCP/IP Network Administration)
social manipulation attacks: 2.3.1. Electronic Mail (Building Internet Firewalls)
sock traffic tool: 9.1.1.3. Other tools (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
socket descriptors: 13.3.1. Name Server Startup (BIND 8, Debug Level 1) (DNS and Bind)
socket options parameter (smb.config file): 9.3.1. Configuring a Samba Server (TCP/IP Network Administration)
socket RPC: 1.5.3.1. Socket RPC and Transport Independent RPC (Managing NFS and NIS)
socket TCP tool: 9.1.1.3. Other tools (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
Socket.pm utility: 13.6. Tools (DNS and Bind)
sockets: 9.2.1. Local Forwarding (SSH, The Secure Shell)
- 1.2. A Data Communications Model (TCP/IP Network Administration)
- 2.6.3. Sockets (TCP/IP Network Administration)
- buffer size: 4.2.3.3. iperf (Network Troubleshooting Tools)
- displaying for connections: 2.1.3. netstat (Network Troubleshooting Tools)
- snmpnetstat results: 7.2.1.6. snmpnetstat (Network Troubleshooting Tools)
- ssh-agent: 6.3.4.1. Access control (SSH, The Secure Shell)
SOCKS: 7.4.6. Proxies and SOCKS (SSH, The Secure Shell)
- compile-time configuration: 4.1.5.8. SOCKS proxy support (SSH, The Secure Shell)
- configuration flags: 4.1.5.8. SOCKS proxy support (SSH, The Secure Shell)
- OpenSSH: 7.4.6.3. SOCKS in OpenSSH (SSH, The Secure Shell)
- SSH1: 7.4.6.1. SOCKS in SSH1 (SSH, The Secure Shell)
- trusted-host authentication issues: 7.4.6.4. Other SOCKS issues (SSH, The Secure Shell)
SOCKS package: 5.3. Proxy Services (Building Internet Firewalls)
- 9.5. Using SOCKS for Proxying (Building Internet Firewalls)
- B.4.2. SOCKS (Building Internet Firewalls)
- functions: 9.5.4. Converting Clients to Use SOCKS (Building Internet Firewalls)
- HTTP proxying on, in screened subnet architecture: 24.1.1.1. HTTP and HTTPS (Building Internet Firewalls)
- modified finger service: 20.7.1.2. Proxying characteristics of finger (Building Internet Firewalls)
- proxy system for ping: 22.4.1.2. Proxying characteristics of ping (Building Internet Firewalls)
- versions: 9.5.1. Versions of SOCKS (Building Internet Firewalls)
SOCKS5_NONETMASKCHECK: 7.4.6.1. SOCKS in SSH1 (SSH, The Secure Shell)
SOCKS5_PASSWD: 7.4.6.1. SOCKS in SSH1 (SSH, The Secure Shell)
SOCKS_SERVER: 7.4.6.1. SOCKS in SSH1 (SSH, The Secure Shell)
SOCKS5_USER: 7.4.6.1. SOCKS in SSH1 (SSH, The Secure Shell)
soft mounts, filesystems: 6.3.5. Hard and soft mounts (Managing NFS and NIS)
soft option (vfstab file): 9.1.3.2. The vfstab and fstab files (TCP/IP Network Administration)
software
- BIND
- obtaining: 3.1. Getting BIND (DNS and Bind)
- C.1.1. Get the Source Code (DNS and Bind)
- precompiled: 3.1.1. Handy Mailing Lists and Usenet Newsgroups (DNS and Bind)
- choosing hosts and: 8.1.1. Where Do I Put My Name Servers? (DNS and Bind)
- connectivity: 3.3. Software Testing with ping (Network Troubleshooting Tools)
- firewall: 11.3.1. Types of Firewall Software (DNS and Bind)
- installation troubleshooting: 12.2.1. Installation Testing (Network Troubleshooting Tools)
- installing on machine: 10.10.6. Reconfiguring for Production (Building Internet Firewalls)
- 11.5. Reconfiguring for Production (Building Internet Firewalls)
- networking, included with Unix operating system: 3.1. Getting BIND (DNS and Bind)
- proxying: 5.3. Proxy Services (Building Internet Firewalls)
- 5.3.2.1. Proxy services lag behind nonproxied services (Building Internet Firewalls)
- 5.3.2.1. Proxy services lag behind nonproxied services (Building Internet Firewalls)
- 9.2. How Proxying Works (Building Internet Firewalls)
- routers (see routers)
- system monitoring: 10.11.2. Consider Using Software to Automate Monitoring (Building Internet Firewalls)
- tools (see tools, names of specific tools)
- viruses: 1.5.2.4. A firewall can't fully protect against viruses (Building Internet Firewalls)
Solaris (see also Solaris operating system)
- AddModule directive, modules referenced: 11.3.1. Loading Dynamic Shared Objects (TCP/IP Network Administration)
- Apache
- configuring: 11.2.1. Configuring Apache on Solaris (TCP/IP Network Administration)
- Directory containers: 11.3.4. Defining Where Things Are Stored (TCP/IP Network Administration)
- bootup: 5.1. Kernel Configuration (TCP/IP Network Administration)
- broadcast addresses, setting: 6.1.5. Setting the Broadcast Address (TCP/IP Network Administration)
- configuration files
- command-line option to override location: 11.3.2. Basic Configuration Directives (TCP/IP Network Administration)
- syslog.conf: 3.2. The Host Table (TCP/IP Network Administration)
- device drivers, installing: 5.1.1. Using Dynamically Loadable Modules (TCP/IP Network Administration)
- diskless clients (see diskless clients)
- dmesg command: 6.1.1. The Interface Name (TCP/IP Network Administration)
- DSO modules: 11.3.1. Loading Dynamic Shared Objects (TCP/IP Network Administration)
- dynamically loadable modules: 5.1.1. Using Dynamically Loadable Modules (TCP/IP Network Administration)
- Ethernet, ifconfig command: 6.1. The ifconfig Command (TCP/IP Network Administration)
- filesystem type, specifying: 9.1.3.1. The mount command (TCP/IP Network Administration)
- hostname file: 6.1.3. Assigning an Address (TCP/IP Network Administration)
- httpd.conf file: F. Solaris httpd.conf File (TCP/IP Network Administration)
- configuration directives: 11.3.2. Basic Configuration Directives (TCP/IP Network Administration)
- location: 11.2. Configuring the Apache Server (TCP/IP Network Administration)
- ifconfig command, syntax: 6.1. The ifconfig Command (TCP/IP Network Administration)
- IndexOptions directive (Apache): 11.3.5. Creating a Fancy Index (TCP/IP Network Administration)
- kernel configuration: 5.1. Kernel Configuration (TCP/IP Network Administration)
- loghost alias: 3.2. The Host Table (TCP/IP Network Administration)
- mount command: 6.3.3. Mount options (Managing NFS and NIS)
- mountall command: 9.1.3.2. The vfstab and fstab files (TCP/IP Network Administration)
- named command, running: 8.3.8. Controlling the named Process (TCP/IP Network Administration)
- netmasks file: 6.1.4. Assigning a Subnet Mask (TCP/IP Network Administration)
- network interfaces, checking status: 6.1.2. Checking the Interface with ifconfig (TCP/IP Network Administration)
- NFS, daemon locations: 9.1.1. NFS Daemons (TCP/IP Network Administration)
- NFS, export and: 6.2. Exporting filesystems (Managing NFS and NIS)
- physical network address: 3.6.1. Reverse Address Resolution Protocol (TCP/IP Network Administration)
- ping command option: 13.3.1. The ping Command (TCP/IP Network Administration)
- point-to-point connections, defining: 6.1.6.6. Point-to-point (TCP/IP Network Administration)
- PPP, configuring: 6.3.6. Solaris PPP (TCP/IP Network Administration)
- printers, configuring: 9.2.2. Line Printer Service (TCP/IP Network Administration)
- rc.script files: 6.1.6.7. Putting ifconfig in the startup scripts (TCP/IP Network Administration)
- routed command, running: 7.4.1.1. Running RIP with routed (TCP/IP Network Administration)
- routing metric, changing: 6.1.6.4. Metric (TCP/IP Network Administration)
- routing tables: 2.4. The Routing Table (TCP/IP Network Administration)
- runlevels: 5.2.1.1. Understanding /etc/inittab (TCP/IP Network Administration)
- sendmail: 10.2. Running sendmail as a Daemon (TCP/IP Network Administration)
- serial ports, troubleshooting: 6.3.7. Troubleshooting Serial Connections (TCP/IP Network Administration)
- shadow password files: 12.2.1. The Shadow Password File (TCP/IP Network Administration)
- share command: 9.1.2.1. The share command (TCP/IP Network Administration)
- SMTP extensions: 3.4.4. Multipurpose Internet Mail Extensions (TCP/IP Network Administration)
- static routing, adding to startup scripts: 7.3.1.1. Installing static routes at startup (TCP/IP Network Administration)
- System V startup: 5.2.1.1. Understanding /etc/inittab (TCP/IP Network Administration)
- vfstab files, options: 9.1.3.2. The vfstab and fstab files (TCP/IP Network Administration)
Solaris Easy Access Server (SEAS): 8.2. Setting up a diskless client (Managing NFS and NIS)
Solaris operating system (see also Solaris)
- agent software: 5.1. SNMP Agents (Essential SNMP)
- 5.1. SNMP Agents (Essential SNMP)
- 7.3.5. Concord SystemEDGE Agent for Unix and NT (Essential SNMP)
- changing kernel parameters: 2.2.3. Kernel (Network Troubleshooting Tools)
- configuration files: 2.2.1. Basic Configuration Files (Network Troubleshooting Tools)
- element manager software: 5.3. Element Managers (Vendor-Specific Management) (Essential SNMP)
- hooks in programs: 10.3.6. Using Hooks with Your Programs (Essential SNMP)
- kernel directives: 2.2.3. Kernel (Network Troubleshooting Tools)
- installing packages: A.1.2. Solaris Packages (Network Troubleshooting Tools)
- NMS suites: 5.2. NMS Suites (Essential SNMP)
- 5.2. NMS Suites (Essential SNMP)
- 5.2. NMS Suites (Essential SNMP)
- OpenSSH-incompatible Kerberos-4: 11.4.5.2. Kerberos on Solaris (SSH, The Secure Shell)
- OpenView and: 7.3.3. HP OpenView Agent for HP-UX and Solaris (Essential SNMP)
- packet capture: 5.5.10. Other Packet Capture Programs (Network Troubleshooting Tools)
- ping tools: 3.3.2.1. Simple examples (Network Troubleshooting Tools)
- supporting software: 5.5. Supporting Software (Essential SNMP)
- trend-analysis software: 5.4. Trend Analysis (Essential SNMP)
- vendor-specific software: 5.3. Element Managers (Vendor-Specific Management) (Essential SNMP)
Solaris 2.x, configuring resolvers for: 6.4.2. Sun's Solaris 2.x (DNS and Bind)
SO_LINGER: 4.1.5.3. TCP/IP support (SSH, The Secure Shell)
SO_LINGER socket flag: 4.1.5.3. TCP/IP support (SSH, The Secure Shell)
Solstice AdminSuite tool: 2.2.2. Configuration Programs (Network Troubleshooting Tools)
solstice command: 8.2. Setting up a diskless client (Managing NFS and NIS)
solutions in troubleshooting: 12.1. Generic Troubleshooting (Network Troubleshooting Tools)
- 12.2.2.2. Bottleneck analysis (Network Troubleshooting Tools)
sorting ntop results: 8.3.1.1. Interactive mode (Network Troubleshooting Tools)
- 8.3.1.2. Web mode (Network Troubleshooting Tools)
sortlist directive: 6.1. The Resolver (DNS and Bind)
- 8.2.1. The Resolver Configuration File (TCP/IP Network Administration)
- 6.1.5. The sortlist Directive (DNS and Bind)
- 10.8.1.2. Remote multihomed hosts (DNS and Bind)
- E.2.6. sortlist (DNS and Bind)
- E.5.5. sortlist (4.9+)
(DNS and Bind)
sortlist entry (resolv.conf file): 8.2.1. The Resolver Configuration File (TCP/IP Network Administration)
sortlist option (named): C.2.5. The options Statement (TCP/IP Network Administration)
sortlist substatement: 10.8.2. BIND 8 and 9 Address Sorting (DNS and Bind)
sound files, playing for events: 10.2.2.4. Log messages, notifications, and automatic actions (Essential SNMP)
source address
- arbitrary addresses in hping: 9.1.1.1. hping (Network Troubleshooting Tools)
- filtering by: 8.6.1. Risks of Filtering by Source Address (Building Internet Firewalls)
- forgery: 8.6.1. Risks of Filtering by Source Address (Building Internet Firewalls)
-
- filtering: 5.4.2.4.1. Address filtering. (Network Troubleshooting Tools)
- nemesis settings: 9.1.1.2. nemesis (Network Troubleshooting Tools)
source code
- for BIND, obtaining: 3.1. Getting BIND (DNS and Bind)
- C.1.1. Get the Source Code (DNS and Bind)
- comments in: B.1. Sources of Information (Network Troubleshooting Tools)
- downloading: A.1.1. Generic Installs (Network Troubleshooting Tools)
- map files: 4.2.5. Source code control for map files (Managing NFS and NIS)
source code control system (see SCCS)
source field (RIPE database): 4.2.1.2. Obtaining an IN-ADDR.ARPA domain (TCP/IP Network Administration)
source files
- domain, pushing to new: 4.4. Managing multiple domains (Managing NFS and NIS)
- maps: 4.2.1. Map distribution (Managing NFS and NIS)
- alternate source files: 4.2.6. Using alternate map source files (Managing NFS and NIS)
- NIS maps, ASCII code: 3.2.3. Installing NIS slave servers (Managing NFS and NIS)
source netgroup: 3.3.2. Netgroups (Managing NFS and NIS)
Source Port: 1.6.2. Transmission Control Protocol (TCP/IP Network Administration)
source port, filtering by: 8.7.4. Risks of Filtering by Source Port (Building Internet Firewalls)
Source Port numbers (UDP): 1.6.1. User Datagram Protocol (TCP/IP Network Administration)
Source Quench Message (ICMP): 1.5.2. Internet Control Message Protocol (TCP/IP Network Administration)
source routing: 10.10.3. Turning Off Routing (Building Internet Firewalls)
- 4.1. Path Discovery with traceroute (Network Troubleshooting Tools)
- 4.1.2. Complications with traceroute (Network Troubleshooting Tools)
- option, IP: 4.2.2. IP Options (Building Internet Firewalls)
sourcegateways parameter (gated): B.8.2. The rip Statement (TCP/IP Network Administration)
sourcenet parameter (gated): B.8.5. The egp Statement (TCP/IP Network Administration)
sources for tools: A.4. Sources for Tools (Network Troubleshooting Tools)
sources of host information, checking: 6.4.2. Sun's Solaris 2.x (DNS and Bind)
sources of information: B.1. Sources of Information (Network Troubleshooting Tools)
space as resource record name: 4.4.3. Repeat Last Name (DNS and Bind)
spam: 16.1.2.1. Junk mail (Building Internet Firewalls)
- preventing (sendmail features): E.3.2. FEATURE (TCP/IP Network Administration)
- sendmail macros: E.3.4. DOMAIN (TCP/IP Network Administration)
spanning ports: 5.2. Access to Traffic (Network Troubleshooting Tools)
spanning tree protocols: 5.4.2.3. Controlling what's displayed (Network Troubleshooting Tools)
spcl.DOMAIN file: 7.2.5. Generating Zone Data Files from the Host Table (DNS and Bind)
SPEC SFS tool: 10.1.6. NFS (Network Troubleshooting Tools)
special option: 8.2.1. Primary Master and Slave Servers (DNS and Bind)
Spectrum for Cabletron: 5.3. Element Managers (Vendor-Specific Management) (Essential SNMP)
speed command (dip): 6.3.2. Dial-Up PPP (TCP/IP Network Administration)
- A.1.1. The dip Script File (TCP/IP Network Administration)
speed of lines: A. Using Input and Output Octets (Essential SNMP)
speed, processing: 10.3.2. How Fast a Machine? (Building Internet Firewalls)
speeds of interfaces: 8.4.1.1. mrtg configuration file (Network Troubleshooting Tools)
spell command, Unix: 11.6. Running a Security Audit (Building Internet Firewalls)
SPF (Dijkstra Shortest Path First) algorithm: 7.4.3. Open Shortest Path First (TCP/IP Network Administration)
spf-interval parameter (gated): B.8.3. The isis Statement (TCP/IP Network Administration)
spidermap scanning scripts: 6.4. Scripts (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
spies: 1.2.2.4. Spies (industrial and otherwise) (Building Internet Firewalls)
SPKI (Simple Public Key Infrastructure): C.3.2. Certificates (Building Internet Firewalls)
split namespace: 11.3.5. A Split Namespace (DNS and Bind)
split-screened subnets, architecture of: 6.4.1. Split-Screened Subnet (Building Internet Firewalls)
spoofed addresses: 6.2.2. nmap (Network Troubleshooting Tools)
- hping settings: 9.1.1.1. hping (Network Troubleshooting Tools)
- 9.1.1.1. hping (Network Troubleshooting Tools)
- nmap settings: 6.2.2. nmap (Network Troubleshooting Tools)
- preventing with ssh: 11.1.3. ssh (Network Troubleshooting Tools)
- in Smurf attacks: 3.3.3.2. Smurf Attacks (Network Troubleshooting Tools)
- 3.3.3.2. Smurf Attacks (Network Troubleshooting Tools)
- source routing and: 4.1.2. Complications with traceroute (Network Troubleshooting Tools)
spoofing attacks: 3.10.2. Name Service and IP Spoofing (SSH, The Secure Shell)
spoofing IP addresses: 4.2.1. Obtaining an IP Address (TCP/IP Network Administration)
spoofing syslog messages: 11.2.1.2. Remote logging (Network Troubleshooting Tools)
Spooler service: 12.4.4. Which Services Should You Leave Enabled? (Building Internet Firewalls)
spray packet tool: 4.2.4. Traffic Measurements with netstat (Network Troubleshooting Tools)
- 9.1.2.1. spray (Network Troubleshooting Tools)
- 12.2.2.2. Bottleneck analysis (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
spray utility: 13.2.5. Gauging Ethernet interface capacity (Managing NFS and NIS)
SQL databases, logging data to: 8.3.1.2. Web mode (Network Troubleshooting Tools)
SQL Server: 23.1.6. Microsoft SQL Server (Building Internet Firewalls)
SQL*Net: 23.1.3. Oracle SQL*Net and Net8 (Building Internet Firewalls)
squash entries (exports file): 9.1.2.2. The /etc/exports file (TCP/IP Network Administration)
src/bin/named-bootconf: 4.3. Setting Up a BIND Configuration File (DNS and Bind)
SRI-NIC host: 1.2.1. The History of the Domain Name System (DNS and Bind)
srm.conf (Apache configuration file): 11.2. Configuring the Apache Server (TCP/IP Network Administration)
SRP (Secure Remote Password): 1.6.5. Secure Remote Password (SRP) (SSH, The Secure Shell)
SRV records: 16.6.5. SRV (DNS and Bind)
SRV (Server Selection) records: C.3.1.11. Server Selection record (TCP/IP Network Administration)
srvtab file: 11.4.5. Kerberos-4 in OpenSSH (SSH, The Secure Shell)
- 11.4.5. Kerberos-4 in OpenSSH (SSH, The Secure Shell)
ssh
- broken features, unexpected behaviors: 12.2.5.1. General client problems (SSH, The Secure Shell)
- error messages
- "Compression level must be from 1 to 9": 12.2.5.3. ssh (SSH, The Secure Shell)
- "rsh not available": 12.2.5.3. ssh (SSH, The Secure Shell)
- keywords: B.4. ssh and scp Keywords (SSH, The Secure Shell)
- options: B.5. ssh Options (SSH, The Secure Shell)
- suspending a chosen instance in a chain of connections: 12.2.5.3. ssh (SSH, The Secure Shell)
- unexpected suspension, background processes: 12.2.5.3. ssh (SSH, The Secure Shell)
- using instead of rsh: 2.5.1. Other Uses For Agents (SSH, The Secure Shell)
SSH-1
- authentication methods: 3.4.2. Client Authentication (SSH, The Secure Shell)
- client authentication: 3.4.2.3. Trusted-host authentication (Rhosts and RhostsRSA) (SSH, The Secure Shell)
- protocols: 3.4. Inside SSH-1 (SSH, The Secure Shell)
- trusted-host authentication: 3.4.2.3. Trusted-host authentication (Rhosts and RhostsRSA) (SSH, The Secure Shell)
SSH-1 protocol: 1.5. History of SSH (SSH, The Secure Shell)
SSH-2 protocols: 1.5. History of SSH (SSH, The Secure Shell)
- 3.5. Inside SSH-2 (SSH, The Secure Shell)
- vs. SSH-1: 3.5. Inside SSH-2 (SSH, The Secure Shell)
ssh-add: 2.5. The SSH Agent (SSH, The Secure Shell)
- 6. Key Management and Agents (SSH, The Secure Shell)
- 6.3. SSH Agents (SSH, The Secure Shell)
- 6.3.3. Loading Keys with ssh-add (SSH, The Secure Shell)
- error message
- "Could not open a connection to your authentication agent": 12.2.3.3. ssh-agent and ssh-add (SSH, The Secure Shell)
- 12.2.3.3. ssh-agent and ssh-add (SSH, The Secure Shell)
- listing keys: 2.5. The SSH Agent (SSH, The Secure Shell)
- options: B.9. ssh-add Options (SSH, The Secure Shell)
- reading input: 2.5. The SSH Agent (SSH, The Secure Shell)
ssh-agent: 2.5. The SSH Agent (SSH, The Secure Shell)
- 6. Key Management and Agents (SSH, The Secure Shell)
- 6.3. SSH Agents (SSH, The Secure Shell)
- environment variables: 6.3.2.3. Format of environment variable commands (SSH, The Secure Shell)
- failure to terminate after logout: 12.2.3.3. ssh-agent and ssh-add (SSH, The Secure Shell)
- options: B.8. ssh-agent Options (SSH, The Secure Shell)
- precedence of keys: 6.4.2. Switching Identities with an Agent (SSH, The Secure Shell)
- proper invocation with eval command: 6.3.2.1. Single-shell method (SSH, The Secure Shell)
- terminating: 6.3.2.1. Single-shell method (SSH, The Secure Shell)
SSH1 and SSH2 (products): 4.1. SSH1 and SSH2 (SSH, The Secure Shell)
- ftp sources: 4.1.2. Obtaining the Distribution (SSH, The Secure Shell)
SSH-ARCH: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2) (SSH, The Secure Shell)
ssh-askpass: 2.5. The SSH Agent (SSH, The Secure Shell)
- 6.3.3. Loading Keys with ssh-add (SSH, The Secure Shell)
SSH-AUTH: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2) (SSH, The Secure Shell)
SSH Communications Security, Ltd.: 1.5. History of SSH (SSH, The Secure Shell)
- 4.2. F-Secure SSH Server (SSH, The Secure Shell)
SSH-CONN: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2) (SSH, The Secure Shell)
.ssh directory,
permissions: 5.4.2.1. Acceptable permissions for user files (SSH, The Secure Shell)
ssh-keygen2: 2.4.2. Generating Key Pairs with ssh-keygen (SSH, The Secure Shell)
- 6.2.2. Generating RSA/DSA Keys for SSH2 (SSH, The Secure Shell)
ssh-keygen (secure shell): 12.2.6. Secure Shell (TCP/IP Network Administration)
ssh-keyscan: 13.4. Other SSH-Related Products (SSH, The Secure Shell)
ssh-probe2: 5.4.3.9. Discovering other servers (SSH, The Secure Shell)
SSH1 product: 1.5. History of SSH (SSH, The Secure Shell)
- compared to SSH2: 3.5.2. Implementation Differences (SSH, The Secure Shell)
SSH (product for BeOS): 13.3. Table of Products (SSH, The Secure Shell)
SSH Protocol Architecture: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2) (SSH, The Secure Shell)
SSH-related files, securing: 10.3.3. /etc/ssh2/sshd2_config (SSH, The Secure Shell)
ssh (secure shell): 12.2.6. Secure Shell (TCP/IP Network Administration)
SSH Secure Shell (product): 13.3. Table of Products (SSH, The Secure Shell)
ssh-signer2: 3.5.2.3. Setuid client (SSH, The Secure Shell)
- 4.1.5.2. Installation, files, and directories (SSH, The Secure Shell)
- 7.4.12. Program Locations (SSH, The Secure Shell)
ssh tools: 11.1.3. ssh (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
- books and resources: B.2.3. Specific Protocols (Network Troubleshooting Tools)
- extensions: A.4. Sources for Tools (Network Troubleshooting Tools)
- Microsoft Windows: 11.5. Microsoft Windows (Network Troubleshooting Tools)
- monitoring devices with: 7.3. Non-SNMP Approaches (Network Troubleshooting Tools)
- remote probing with: 5.2. Access to Traffic (Network Troubleshooting Tools)
- source web site: A.4. Sources for Tools (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
- vnc in ssh sessions: 11.1.2. vnc (Network Troubleshooting Tools)
SSH-TRANS: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2) (SSH, The Secure Shell)
Ssh1AgentCompatibility (keyword, SSH2): 7.4.14. SSH1/SSH2 Compatibility (SSH, The Secure Shell)
SSH_ALL_SCP_STATS: 4.1.5.11. scp behavior (SSH, The Secure Shell)
- 7.5.7.1. scp1 statistics (SSH, The Secure Shell)
SSH_AUTH_SOCK: 11.1.2.3. Using an agent (SSH, The Secure Shell)
sshCE: 13.3. Table of Products (SSH, The Secure Shell)
SSH_CLIENT: 7.4.4.2. Forcing a nonprivileged local port (SSH, The Secure Shell)
SSH2_CLIENT environment variable,
simulating SSH1 from feature in SSH2: 8.2.5.1. Simulating "from" with SSH2 (SSH, The Secure Shell)
Ssh1Compatibility: 5.9. Compatibility Between SSH-1 and SSH-2 Servers (SSH, The Secure Shell)
- 7.4.14. SSH1/SSH2 Compatibility (SSH, The Secure Shell)
- recommended setting: 10.3.3. /etc/ssh2/sshd2_config (SSH, The Secure Shell)
ssh2_config file: 7.1.3.2. Global and local files (SSH, The Secure Shell)
sshd2
- -b option for setting server key length: 10.3.3. /etc/ssh2/sshd2_config (SSH, The Secure Shell)
- known hosts directories: 5.5.1.5. Fetching public keys of known hosts (SSH, The Secure Shell)
- setting maximum allowable connections: 4.1.5.3. TCP/IP support (SSH, The Secure Shell)
sshd1 default path: 4.1.5.9. User logins and shells (SSH, The Secure Shell)
sshd (secure shell daemon): 12.2.6. Secure Shell (TCP/IP Network Administration)
sshd2_config: 5.3.1. Server Configuration Files (SSH, The Secure Shell)
- 5.3.1. Server Configuration Files (SSH, The Secure Shell)
- 5.7. Subsystems (SSH, The Secure Shell)
- recommended settings: 10.3.3. /etc/ssh2/sshd2_config (SSH, The Secure Shell)
sshdfwd: 9.4.1. TCP-wrappers Configuration (SSH, The Secure Shell)
sshdfwd-x11: 9.4.1. TCP-wrappers Configuration (SSH, The Secure Shell)
SSHDOS: 13.3. Table of Products (SSH, The Secure Shell)
Sshd1Path: 5.9. Compatibility Between SSH-1 and SSH-2 Servers (SSH, The Secure Shell)
sshd.pid: 5.3.3. Changing the Configuration (SSH, The Secure Shell)
ssh.el: 13.4. Other SSH-Related Products (SSH, The Secure Shell)
sshexec.com: 13.3. Table of Products (SSH, The Secure Shell)
ssh_known_hosts file: 3.5.2.1. Host keys (SSH, The Secure Shell)
- 4.1.6. Creating the Serverwide Known-Hosts File (SSH, The Secure Shell)
- 7.4.3. Host Keys and Known-Hosts Databases (SSH, The Secure Shell)
SSH_NO_ALL_SCP_STATS: 4.1.5.11. scp behavior (SSH, The Secure Shell)
- 7.5.7.1. scp1 statistics (SSH, The Secure Shell)
SSH_NO_SCP_STATS: 4.1.5.11. scp behavior (SSH, The Secure Shell)
- 7.5.7.1. scp1 statistics (SSH, The Secure Shell)
SSH_ORIGINAL_COMMAND: 8.2.4.4. Examining the client's original command (SSH, The Secure Shell)
- 11.5.2.1. Passing along the remote command (SSH, The Secure Shell)
SSHOS2: 13.3. Table of Products (SSH, The Secure Shell)
Ssh1Path: 7.4.14. SSH1/SSH2 Compatibility (SSH, The Secure Shell)
ssh.pid file, path specification: 4.3.5. Compilation Flags (SSH, The Secure Shell)
ssh_prng_cmds: 3.7. Randomness (SSH, The Secure Shell)
- 4.3.4. Randomness (SSH, The Secure Shell)
~/ssh/rc files: 5.6.4. Arbitrary Actions with /etc/sshrc (SSH, The Secure Shell)
sshregex: A. SSH2 Manpage for sshregex (SSH, The Secure Shell)
SSH_SCP_STATS: 4.1.5.11. scp behavior (SSH, The Secure Shell)
- 7.5.7.1. scp1 statistics (SSH, The Secure Shell)
SshSignerPath: 7.4.12. Program Locations (SSH, The Secure Shell)
SSH_SOCKS_SERVER: 4.1.5.8. SOCKS proxy support (SSH, The Secure Shell)
- 7.4.6.2. SOCKS in SSH2 (SSH, The Secure Shell)
SSH_TTY environment variables: 7.4.5.5. Pseudo-terminal allocation (TTY/PTY/PTTY) (SSH, The Secure Shell)
- 8.2.9. Disabling TTY Allocation (SSH, The Secure Shell)
SSI (Server Side Includes), security considerations: 11.4.1. The CGI and SSI Threat (TCP/IP Network Administration)
SSL: 7.2. Security Concerns (Essential SNMP)
ssl CA certFile parameter (smb.config file): 9.3.1. Configuring a Samba Server (TCP/IP Network Administration)
SSL (Secure Socket Layer): and Secure Socket Layer (SSL) (Building Internet Firewalls) 14.7. Transport Layer Security (TLS)
- email and: 16.2.2. TLS/SSL, SSMTP, and STARTTLS (Building Internet Firewalls)
SSL (Secure Socket Layers): Protocol (SSH, The Secure Shell) 1.6.6. Secure Socket Layer (SSL)
- TCP-based applications, enhanced with: 1.6.7. SSL-Enhanced Telnet and FTP (SSH, The Secure Shell)
SSL (Secure Sockets Layer)
- Apache: 11.4.5. Using Encryption (TCP/IP Network Administration)
- certificates, creating: 11.4.5. Using Encryption (TCP/IP Network Administration)
SSLCertificateFile directive (Apache): 11.4.5. Using Encryption (TCP/IP Network Administration)
SSLCertificateKeyFile directive (Apache): 11.4.5. Using Encryption (TCP/IP Network Administration)
SSLEngine directive (Apache): 11.4.5. Using Encryption (TCP/IP Network Administration)
SSLOptions directive (Apache): 11.4.5. Using Encryption (TCP/IP Network Administration)
SSMTP: 16.2.2. TLS/SSL, SSMTP, and STARTTLS (Building Internet Firewalls)
ssyslog log tool: 11.2.1.2. Remote logging (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
SSysQ statistic: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
stab (sendmail K command value): E.4.5. The sendmail K Command (TCP/IP Network Administration)
stack fingerprinting
- nmap tool: 6.2.2. nmap (Network Troubleshooting Tools)
- 6.3.3. nmap Revisited (Network Troubleshooting Tools)
- passive fingerprinting: 6.3.1. Stack Fingerprinting (Network Troubleshooting Tools)
- queso tool: 6.3.2. queso (Network Troubleshooting Tools)
- uses: 6.3.1. Stack Fingerprinting (Network Troubleshooting Tools)
stack (protocol): 1.2. A Data Communications Model (TCP/IP Network Administration)
- headers: 1.3. TCP/IP Protocol Architecture (TCP/IP Network Administration)
stack size limit, changing: 10.12.2.2. Changing the stack size limit (DNS and Bind)
stacksize option (named): C.2.5. The options Statement (TCP/IP Network Administration)
staffing
- considerations: 1.1.2. Human Considerations (Essential SNMP)
- NMS architecture and: 3.2. NMS Architectures (Essential SNMP)
stale filehandler error: 7.2.5. Pathnames and filehandles (Managing NFS and NIS)
stale filehandles,
performance and: 18.8. Stale filehandles (Managing NFS and NIS)
standard configuration files: 2.2.1. Basic Configuration Files (Network Troubleshooting Tools)
Standard Performance Evaluation Corporation: 16.2. Measuring performance (Managing NFS and NIS)
standard resource records: C.3.1. Standard Resource Records (TCP/IP Network Administration)
standards
- categories of: 1.1.2. Protocol Standards (TCP/IP Network Administration)
- protocols: 1.1.1. TCP/IP Features (TCP/IP Network Administration)
- 1.1.2. Protocol Standards (TCP/IP Network Administration)
standards track RFCs, maturity levels: 1.1.2. Protocol Standards (TCP/IP Network Administration)
Stanford Linear Accelerator Center (SLCA): A.2. Generic Sources (Network Troubleshooting Tools)
start argument (sendmail): 10.2. Running sendmail as a Daemon (TCP/IP Network Administration)
start command: 7.1.1. ndc and controls (BIND 8) (DNS and Bind)
Start of Authority (see SOA records)
start of authority records (see SOA records)
Start registry key: 12.4.1.1. Registry keys (Building Internet Firewalls)
starting
- primary master name server: 4.7.1. Starting Up the Name Server (DNS and Bind)
- automatically: 4.7.4. Editing the Startup Files (DNS and Bind)
- slave name servers: 4.8.1. Setup (DNS and Bind)
starting agents: 6.3.2. Starting an Agent (SSH, The Secure Shell)
starting message: 4.7.2. Check for Syslog Errors (DNS and Bind)
- 7.6.1. Common Syslog Messages (DNS and Bind)
starting ports for traceroute: 4.1.1. Options (Network Troubleshooting Tools)
StartServers directive (Apache): 11.3.3. Managing the Swarm (TCP/IP Network Administration)
STARTTLS: 16.2.2. TLS/SSL, SSMTP, and STARTTLS (Building Internet Firewalls)
startup files: 7.3.1.1. Installing static routes at startup (TCP/IP Network Administration)
- 2.2.4. Startup Files and Scripts (Network Troubleshooting Tools)
- gated: 7.7.2.1. Running gated at startup (TCP/IP Network Administration)
- ifconfig command: 6.1.6.7. Putting ifconfig in the startup scripts (TCP/IP Network Administration)
- inetd: 5.2.1.1. Understanding /etc/inittab (TCP/IP Network Administration)
- mountall command: 9.1.3.2. The vfstab and fstab files (TCP/IP Network Administration)
- sendmail: 10.2. Running sendmail as a Daemon (TCP/IP Network Administration)
- static routing: 7.3.1.1. Installing static routes at startup (TCP/IP Network Administration)
- Unix configuration: 5.2. Startup Files (TCP/IP Network Administration)
- xinetd: 5.4. The Extended Internet Daemon (TCP/IP Network Administration)
startup files, editing: 4.7.4. Editing the Startup Files (DNS and Bind)
- 4.8.1. Setup (DNS and Bind)
startup scripts: 11.3.1.1. Services started by /etc/rc files or directories (Building Internet Firewalls)
stat( ), symbolic links and: 6.4.1. Resolving symbolic links in NFS (Managing NFS and NIS)
STAT command (POP): 3.4.2. Post Office Protocol (TCP/IP Network Administration)
statd: 17.3.4. File Locking with NFS (Building Internet Firewalls)
- 9.1.1. NFS Daemons (TCP/IP Network Administration)
- NFS startup: 6.1. Setting up NFS (Managing NFS and NIS)
state (gated): B.4. Trace Statements (TCP/IP Network Administration)
state information: 1.4.1. TCP and UDP (Managing NFS and NIS)
- recreating: 7.5.3. Recreating state information (Managing NFS and NIS)
stateful protocols: 1.4.1. TCP and UDP (Managing NFS and NIS)
states, booting into: 2.2.4. Startup Files and Scripts (Network Troubleshooting Tools)
states, domains named after: 2.2.2. Further Down (DNS and Bind)
- 3.2.3. Back in the U.S.A. (DNS and Bind)
static address assignment: 4.2.2. Assigning Host Addresses (TCP/IP Network Administration)
static entries
- in ARP tables: 2.1.6. arp (Network Troubleshooting Tools)
- in routing tables: 2.1.3. netstat (Network Troubleshooting Tools)
static IP addresses: 6.2.1. IP Address Management (Network Troubleshooting Tools)
static ports, monitoring: 12.6. Port Monitor (Essential SNMP)
static routing: A.1. Routers and their routing tables (Managing NFS and NIS)
- A.2. Static routing (Managing NFS and NIS)
- 7.1. Common Routing Configurations (TCP/IP Network Administration)
- startup files: 7.3.1.1. Installing static routes at startup (TCP/IP Network Administration)
- tables: 4.3. Planning Routing (TCP/IP Network Administration)
- adding routes: 7.3.1. Adding Static Routes (TCP/IP Network Administration)
- creating: 7.3. Building a Static Routing Table (TCP/IP Network Administration)
static statements (gated): B.9. static Statements (TCP/IP Network Administration)
station addresses: 1.3.2. IP host addresses (Managing NFS and NIS)
statistics: 7.6.1. Common Syslog Messages (DNS and Bind)
- analyzing for overworked name servers: 8.1.2. Capacity Planning (DNS and Bind)
- filters: 14.3.1. Useful filters (Managing NFS and NIS)
- monitoring: 7.6.2.3. Using the BIND statistics (DNS and Bind)
- NFS diagnostics: 14.2. NFS statistics (Managing NFS and NIS)
- snoop and: 14.3. snoop (Managing NFS and NIS)
- understanding content of: 7.6.2. Understanding the BIND Statistics (DNS and Bind)
- viewing: 8.1.2. Capacity Planning (DNS and Bind)
statistics category: 7.5.3.1. BIND 8 categories (DNS and Bind)
statistics-file option (named): C.2.5. The options Statement (TCP/IP Network Administration)
statistics in OpenView polling: 9.2.2. OpenView Graphing (Essential SNMP)
statistics interval: 10.12.3.3. Statistics interval (DNS and Bind)
statistics-interval option (named): C.2.5. The options Statement (TCP/IP Network Administration)
stats command: 7.1.1. ndc and controls (BIND 8) (DNS and Bind)
status command: 7.1.1. ndc and controls (BIND 8) (DNS and Bind)
status daemon: 7.5.1. Lock and status daemons (Managing NFS and NIS)
status information (Net-SNMP): C.3.10. snmpstatus (Essential SNMP)
status lights: 3.1.3.1. Link lights (Network Troubleshooting Tools)
status source (OpenView): 6.1.4. A Few Words About NNM Map Colors (Essential SNMP)
- 10.2.2.3. Forwarding events and event severities (Essential SNMP)
stderr channel: 7.5.2.3. Stderr channel (DNS and Bind)
STDs (standards RFCs): 1.1.2. Protocol Standards (TCP/IP Network Administration)
stealth port scanners: 2.1.7. Scanning Tools (Network Troubleshooting Tools)
- 6.2.2. nmap (Network Troubleshooting Tools)
stealth scanning: 6.7. Microsoft Windows (Network Troubleshooting Tools)
step size in packets: 4.2.2.2. pathchar (Network Troubleshooting Tools)
stepping-stone mount points: 18.7. Mount point constructions (Managing NFS and NIS)
steps in troubleshooting (see strategies for troubleshooting)
sticky-bit access, swap files: 8.4. Managing client swap space (Managing NFS and NIS)
stop command: 7.1.1. ndc and controls (BIND 8) (DNS and Bind)
stopbits command (dip): A.1.1. The dip Script File (TCP/IP Network Administration)
storage requirements for data: 3.1. Hardware Considerations (Essential SNMP)
store and forward protocols: 3.4.1. Simple Mail Transfer Protocol (TCP/IP Network Administration)
store-and-forward switches: 4.2.2.2. pathchar (Network Troubleshooting Tools)
- 4.2.2.2. pathchar (Network Troubleshooting Tools)
STORE command (IMAP): 3.4.3. Internet Message Access Protocol (TCP/IP Network Administration)
storing log files: 11.2.2. Log File Management (Network Troubleshooting Tools)
strategies for troubleshooting
- generic troubleshooting: 12.1. Generic Troubleshooting (Network Troubleshooting Tools)
- installation practices and: 12.2.1. Installation Testing (Network Troubleshooting Tools)
- task-specific strategies: 12.2. Task-Specific Troubleshooting (Network Troubleshooting Tools)
stratum 1 and 2 servers: 11.3. NTP (Network Troubleshooting Tools)
stream field (inet.conf file): 5.3. The Internet Daemon (TCP/IP Network Administration)
streams: 1.3. TCP/IP Protocol Architecture (TCP/IP Network Administration)
- capturing: 5.5.3. tcpflow (Network Troubleshooting Tools)
- following: 5.6.1.1. Using ethereal (Network Troubleshooting Tools)
streams in graphs (NNM): B.1. Using External Data (Essential SNMP)
stress-testing networks: 4.2.4. Traffic Measurements with netstat (Network Troubleshooting Tools)
- 9.1. Packet Injection Tools (Network Troubleshooting Tools)
strict source routing: 4.1.2. Complications with traceroute (Network Troubleshooting Tools)
StrictHostKeyChecking: 7.4.3.1. Strict host key checking (SSH, The Secure Shell)
strictinterfaces (gated): B.6. Interface Statements (TCP/IP Network Administration)
StrictModes: 5.4.2.1. Acceptable permissions for user files (SSH, The Secure Shell)
- recommended setting: 10.3.2. /etc/sshd_config (SSH, The Secure Shell)
String value (dhcpd option statement): D.3.3. DHCP Options (TCP/IP Network Administration)
string values (printcap file): 9.2.1.1. The printcap file (TCP/IP Network Administration)
strings analysis tool: 5.4.2.3. Controlling what's displayed (Network Troubleshooting Tools)
strings, converting integers to: 11.3.1. Tables (Essential SNMP)
strings, data representation and: 1.5.2. External data representation (Managing NFS and NIS)
stripcharts in tkined: 7.2.3.1. ICMP monitoring (Network Troubleshooting Tools)
strobe port tool: 2.1.7. Scanning Tools (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
Structure of Management Information (see SMI)
Structure of Management Information (SMI): 7.1. Overview of SNMP (Network Troubleshooting Tools)
stub areas (OSPF hierarchy): 7.4.3. Open Shortest Path First (TCP/IP Network Administration)
stub directive: E.2.9. stub (4.9+) (DNS and Bind)
stub resolvers: 2.5. Resolvers (DNS and Bind)
- 2.5. Resolvers (DNS and Bind)
stub zones: 9.6.2.1. Stubs: another way to manage delegation (DNS and Bind)
stubhosts parameter (gated): B.8.1. The ospf Statement (TCP/IP Network Administration)
stunnel: 1.6.8. stunnel (SSH, The Secure Shell)
stunnel (public key encryption): 12.6.2.1. stunnel (TCP/IP Network Administration)
subagents: 4.5. A Look Ahead (Essential SNMP)
- 7.3.5. Concord SystemEDGE Agent for Unix and NT (Essential SNMP)
subdirectories, share command and: 9.1.2.1. The share command (TCP/IP Network Administration)
subdividing Ethernet segments: 13.4.4. Subdividing an Ethernet (TCP/IP Network Administration)
subdomains: 1.3. The Domain Name System in a Nutshell (DNS and Bind)
- 2.1.2. Domains (DNS and Bind)
- 2.1.2. Domains (DNS and Bind)
- 3.3.2. Creating Domains and Subdomains (TCP/IP Network Administration)
- choosing: 3.2.2. Where in the World Do I Fit? (DNS and Bind)
- contacting administrator of: 3.2.2. Where in the World Do I Fit? (DNS and Bind)
- 3.2.3.1. The us domain (DNS and Bind)
- control statement and: 7.3. Organizing Your Files (DNS and Bind)
- creating: 9.4. How to Become a Parent: Creating Subdomains (DNS and Bind)
- delegating: 2.4.1. Delegating Subdomains (DNS and Bind)
- 9.2. How Many Children? (DNS and Bind)
- 9.4. How to Become a Parent: Creating Subdomains (DNS and Bind)
- checking for conformance: 14.3.10. Incorrect Subdomain Delegation (DNS and Bind)
- octet boundaries and: 9.5. Subdomains of in-addr.arpa Domains (DNS and Bind)
- vs. domains and zones: 2.4. Name Servers and Zones (DNS and Bind)
- guidelines for implementing: 9.1. When to Become a Parent (DNS and Bind)
- how many to implement: 9.2. How Many Children? (DNS and Bind)
- how to read: 2.2.3. Reading Domain Names (DNS and Bind)
- in-addr.arpa domain and: 9.5. Subdomains of in-addr.arpa Domains (DNS and Bind)
- names for, choosing: 9.3. What to Name Your Children (DNS and Bind)
- registering, cost of: 3.2.3. Back in the U.S.A. (DNS and Bind)
- searching for with nslookup: 3.2.2. Where in the World Do I Fit? (DNS and Bind)
- size of, parenting and: 9.2. How Many Children? (DNS and Bind)
- SOA record, finding for: 3.2.3.1. The us domain (DNS and Bind)
subject (DSN error code): 10.6.2. Transforming the Address (TCP/IP Network Administration)
Subkeys registry key: 12.4.1.1. Registry keys (Building Internet Firewalls)
subnet addresses: 2.2.2. Subnets (TCP/IP Network Administration)
subnet architecture, screened: 6.3. Screened Subnet Architectures (Building Internet Firewalls)
- 24.1. Screened Subnet Architecture (Building Internet Firewalls)
subnet masks
- address masks in interfaces: 2.1.5. ifconfig (Network Troubleshooting Tools)
- in ARP tables: 2.1.6. arp (Network Troubleshooting Tools)
- assigning, ifconfig command: 6.1.4. Assigning a Subnet Mask (TCP/IP Network Administration)
- creating: 2.2.2. Subnets (TCP/IP Network Administration)
- defining: 4.2.3. Defining the Subnet Mask (TCP/IP Network Administration)
- 4.2.3. Defining the Subnet Mask (TCP/IP Network Administration)
- distributing: 4.2.3. Defining the Subnet Mask (TCP/IP Network Administration)
- packet headers: 5.4.2.4.3. Packet characteristics. (Network Troubleshooting Tools)
- 5.4.2.4.3. Packet characteristics. (Network Troubleshooting Tools)
- port scanning and: 6.2.2. nmap (Network Troubleshooting Tools)
- RFCs: 2.2.2. Subnets (TCP/IP Network Administration)
- in routing tables: 2.1.3. netstat (Network Troubleshooting Tools)
- stack fingerprinting: 6.3.2. queso (Network Troubleshooting Tools)
- system configuration: 4. Getting Started (TCP/IP Network Administration)
- wildcards in (*): 6.2.2. nmap (Network Troubleshooting Tools)
subnet security, distributing responsibility: 12.1.2.1. Use subnets to distribute control (TCP/IP Network Administration)
subnet statement (dhcpd): 9.5.1. dhcpd.conf (TCP/IP Network Administration)
- D.3.1. Topology Statements (TCP/IP Network Administration)
subnets
- collapsing in diagrams: 6.5.1.1. Drawing maps with tkined (Network Troubleshooting Tools)
- emulators: 9.2. Network Emulators and Simulators (Network Troubleshooting Tools)
- ntop results and: 8.3.1.2. Web mode (Network Troubleshooting Tools)
- specifying with sortlist directive: 6.1.5. The sortlist Directive (DNS and Bind)
subnetting
- need for: 4.2.2. Assigning Host Addresses (TCP/IP Network Administration)
- organization purposes for: 4.2.3. Defining the Subnet Mask (TCP/IP Network Administration)
- plans, RFCs: 4.2.1.1. Obtaining an official network address (TCP/IP Network Administration)
- topological reasons for: 4.2.3. Defining the Subnet Mask (TCP/IP Network Administration)
subnetting/subnetted networks: E.2.6. sortlist (DNS and Bind)
- E.5.5. sortlist (4.9+)
(DNS and Bind)
- address sorting and: 10.8.1.3. Address sorting on subnetted networks (DNS and Bind)
- on/off octet boundaries: 9.5.1. Subnetting on an Octet Boundary (DNS and Bind)
subnetwork masks: 13.2.2. Subnetwork masks (Managing NFS and NIS)
substituting subsystems: 1.1. General Approaches to Troubleshooting (Network Troubleshooting Tools)
substitutions, automounter maps: 9.4. Key and variable substitutions (Managing NFS and NIS)
subsystems: 5.3.1. Server Configuration Files (SSH, The Secure Shell)
- 5.7. Subsystems (SSH, The Secure Shell)
- identifying in troubleshooting: 12.1. Generic Troubleshooting (Network Troubleshooting Tools)
- substituting: 1.1. General Approaches to Troubleshooting (Network Troubleshooting Tools)
subsystems (SSH2): 7.4.13. Subsystems (SSH, The Secure Shell)
subtrees: 2.3.1. Naming OIDs (Essential SNMP)
- branches of iso(1).org(3).dod(6).internet(1): 2.3.1. Naming OIDs (Essential SNMP)
- creating: 11.3. OpenView's Extensible Agent (Essential SNMP)
- defining objects under: 11.3. OpenView's Extensible Agent (Essential SNMP)
- MIB-II: 2.5. A Closer Look at MIB-II (Essential SNMP)
subtrees in MIBs: 7.1. Overview of SNMP (Network Troubleshooting Tools)
- displaying with getif: 7.4.2. SNMP Tools (Network Troubleshooting Tools)
- displaying with snmptranslate: 7.2.1.5. snmptranslate (Network Troubleshooting Tools)
- examining with tkined: 7.2.3.3. Examining MIBs (Network Troubleshooting Tools)
- retrieving with scotty: 7.2.2. scotty (Network Troubleshooting Tools)
- retrieving with SNMP: 7.2.1.3. snmpgetnext, snmpwalk, and snmptable (Network Troubleshooting Tools)
SUCCESS condition: 6.4.2. Sun's Solaris 2.x (DNS and Bind)
success statistic: 7.6.2.2. BIND 9 statistics (DNS and Bind)
successful lookups (debugging example): 13.3.3. A Successful Lookup (BIND 8, Debug Level 1) (DNS and Bind)
summarizing
- connection-by-connection statistics: 5.5.7. tcptrace (Network Troubleshooting Tools)
- data in ethereal: 5.6.1.1. Using ethereal (Network Troubleshooting Tools)
- mrtg results: 8.4.1. mrtg (Network Troubleshooting Tools)
- packet captures: 5.5.4. tcp-reduce (Network Troubleshooting Tools)
summary-filter parameter (gated): B.8.3. The isis Statement (TCP/IP Network Administration)
summary-originate parameter (gated): B.8.3. The isis Statement (TCP/IP Network Administration)
summary web pages of mrtg results: 8.4.1. mrtg (Network Troubleshooting Tools)
Sun Management Center: 5.3. Element Managers (Vendor-Specific Management) (Essential SNMP)
Sun Microsystems: 0. Preface (Managing NFS and NIS)
Sun Microsystems agent software: 5.1. SNMP Agents (Essential SNMP)
Sun RPC: 14.1. Remote Procedure Call (RPC) (Building Internet Firewalls)
- 14.1. Remote Procedure Call (RPC)
(Building Internet Firewalls)
- authentication: 14.1.1. Sun RPC Authentication (Building Internet Firewalls)
SunOS 4.x: 14.5.6. SunOS Resolver Is Configured, but Host Doesn't Use DNS (DNS and Bind)
- configuring resolvers for: 6.4.1. Sun's SunOS 4.x (DNS and Bind)
superusers
- domain, default: 3.3.8. NIS domains (Managing NFS and NIS)
- keys, adding: 12.5.4.7. Creating keys (Managing NFS and NIS)
- mapping, NFS: 12.4.2. Superuser mapping (Managing NFS and NIS)
- restrictions: 12.4.2. Superuser mapping (Managing NFS and NIS)
support-ixfr substatement: 10.4.3. BIND 8 IXFR Configuration (DNS and Bind)
supporting software packages for NMSs: 5.5. Supporting Software (Essential SNMP)
suppressing graph display in mrtg: 8.4.1.1. mrtg configuration file (Network Troubleshooting Tools)
suspending jobs in tkined: 7.2.3.1. ICMP monitoring (Network Troubleshooting Tools)
svc.conf file: 6.4.5. Compaq's Tru64 Unix and Digital Unix (DNS and Bind)
svcsetup utility: 6.4.5. Compaq's Tru64 Unix and Digital Unix (DNS and Bind)
swap command (ntop): 8.3.1.1. Interactive mode (Network Troubleshooting Tools)
swap files
- sticky-bit access: 8.4. Managing client swap space (Managing NFS and NIS)
- temporary: 8.4. Managing client swap space (Managing NFS and NIS)
- VM system and: 8.1. NFS support for diskless clients (Managing NFS and NIS)
swap filesystem, AdminSuite: 8.2. Setting up a diskless client (Managing NFS and NIS)
swap process: 11.3.3. Which Services Should You Leave Enabled? (Building Internet Firewalls)
swap space, diskless clients: 8.4. Managing client swap space (Managing NFS and NIS)
swapper in initialization: 2.2.4. Startup Files and Scripts (Network Troubleshooting Tools)
swapping
- adapters: 3.2. Testing Adapters (Network Troubleshooting Tools)
- cables: 3.1.3.3. Other cable tests (Network Troubleshooting Tools)
- components: 1.1. General Approaches to Troubleshooting (Network Troubleshooting Tools)
- files, ND and: 8.1. NFS support for diskless clients (Managing NFS and NIS)
- security risks of: 10.7.1. NFS Security Risks (SSH, The Secure Shell)
swatch log tool: 11.2.2. Log File Management (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
switch (sendmail K command value): E.4.5. The sendmail K Command (TCP/IP Network Administration)
switched Ethernets: 17.3.1. Switched networks (Managing NFS and NIS)
switches
- compared to hubs: 5.2. Access to Traffic (Network Troubleshooting Tools)
- cut-through: 4.2.2.2. pathchar (Network Troubleshooting Tools)
- 4.2.2.2. pathchar (Network Troubleshooting Tools)
- networks: 17.2. Network partitioning hardware (Managing NFS and NIS)
- point-monitoring tools and: 8.3. Point-Monitoring Tools (Network Troubleshooting Tools)
- port aliasing: 5.2. Access to Traffic (Network Troubleshooting Tools)
- security and: 5.7.1. Switch Security (Network Troubleshooting Tools)
- static addresses and: 6.2.1. IP Address Management (Network Troubleshooting Tools)
- store-and-forward: 4.2.2.2. pathchar (Network Troubleshooting Tools)
- 4.2.2.2. pathchar (Network Troubleshooting Tools)
- traffic capture and: 5.2. Access to Traffic (Network Troubleshooting Tools)
- traffic monitoring and: 8.1. What, When, and Where (Network Troubleshooting Tools)
- types of: 4.2.2.2. pathchar (Network Troubleshooting Tools)
- unmanaged switches: 6.5. Mapping or Diagramming (Network Troubleshooting Tools)
Sybase: 23.1.5. Sybase (Building Internet Firewalls)
symbolic form in SNMP output: 7.2.1.5. snmptranslate (Network Troubleshooting Tools)
symbolic links: 6.4. Symbolic links (Managing NFS and NIS)
- absolute pathnames: 6.4.2. Absolute and relative pathnames (Managing NFS and NIS)
- automounter and: 9.1.1. Indirect maps (Managing NFS and NIS)
- boot blocks: 8.3.2. Getting a boot block (Managing NFS and NIS)
- created by SSH installations: 4.1.4.1. SSH1 and SSH2 on the same machine (SSH, The Secure Shell)
- /export subdirectories: 8.2. Setting up a diskless client (Managing NFS and NIS)
- exporting filesystems and: 6.4.3. Mount points, exports, and links (Managing NFS and NIS)
- mount points construction and: 18.7. Mount point constructions (Managing NFS and NIS)
- mounting filesystems and: 6.4.3. Mount points, exports, and links (Managing NFS and NIS)
- mounts: 6.4. Symbolic links (Managing NFS and NIS)
- relative pathnames: 6.4.2. Absolute and relative pathnames (Managing NFS and NIS)
- resolving, NFS: 6.4.1. Resolving symbolic links in NFS (Managing NFS and NIS)
symbols
- gated trace statements: B.4. Trace Statements (TCP/IP Network Administration)
- sendmail pattern matching: 10.6.1. Pattern Matching (TCP/IP Network Administration)
Symetra: 7.3.7. APC Symetra (Essential SNMP)
SymLinksIfOwnerMatch (Options directive setting): 11.4.2. Controlling Server Options (TCP/IP Network Administration)
symmetric ciphers (see cryptography)
symmetric encryption: 12.6. Encryption (TCP/IP Network Administration)
- 12.5.2.1. Symmetric key encryption (Managing NFS and NIS)
- 12.6.1. When Is Symmetric Encryption Useful? (TCP/IP Network Administration)
symptoms
- identifying: 12.1. Generic Troubleshooting (Network Troubleshooting Tools)
- system failures: 1.1. General Approaches to Troubleshooting (Network Troubleshooting Tools)
SYN bit, TCP headers: 1.6.2. Transmission Control Protocol (TCP/IP Network Administration)
SYN flood attacks: 3.11.2. IP and TCP Attacks (SSH, The Secure Shell)
SYN packets, blocking: 6.2.2. nmap (Network Troubleshooting Tools)
sync option (pppd): A.2. The PPP Daemon (TCP/IP Network Administration)
synchronization, TCP byte numbering: 1.6.2. Transmission Control Protocol (TCP/IP Network Administration)
synchronizing clocks: 11.3. NTP (Network Troubleshooting Tools)
synchronizing time: 14.7. Time synchronization (Managing NFS and NIS)
synchronous serial line, TCP/IP: 1.1. Networking overview (Managing NFS and NIS)
syntax
- for domain directive: 6.1.1. The Local Domain Name (DNS and Bind)
- E.5.1. domain (DNS and Bind)
- for search directive: 6.1.3. The search Directive (DNS and Bind)
- E.5.2. search (DNS and Bind)
syntax errors: 4.7.2. Check for Syslog Errors (DNS and Bind)
- 14.3.5. Syntax Error in Configuration File or Zone Data File (DNS and Bind)
- 14.3.5. Syntax Error in Configuration File or Zone Data File (DNS and Bind)
- in resolv.conf file: 14.3.11. Syntax Error in resolv.conf (DNS and Bind)
- SERVFAIL responses and: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
sys value (share command): 9.1.2.1. The share command (TCP/IP Network Administration)
sysContact parameter: 7.1. Parameter Settings (Essential SNMP)
- retrieving in Perl: 8.1. Retrieving a Single MIB Value (Essential SNMP)
- retrieving with OpenView: 8.1.1. Using HP OpenView to Retrieve Values (Essential SNMP)
- setting values: 8.3. Setting a MIB Value (Essential SNMP)
sysctl command: 2.2.3. Kernel (Network Troubleshooting Tools)
sysLocation parameter: 7.1. Parameter Settings (Essential SNMP)
- 7.1. Parameter Settings (Essential SNMP)
- configuring in Net-SNMP: 7.3.4. Net-SNMP (Formerly UCD-SNMP) (Essential SNMP)
- retrieving: 2.6.1. The get Operation (Essential SNMP)
- 8.1.2. Using Net-SNMP (Essential SNMP)
- setting values: 2.6.4. The set Operation (Essential SNMP)
syslog (see also syslog tool)
5.8.1. Logging and SSH1 (SSH, The Secure Shell)
- 5.8.1. Logging and SSH1 (SSH, The Secure Shell)
- queries performed with
- command for: 7.1.1. ndc and controls (BIND 8) (DNS and Bind)
- running before starting name server: 4.7. Running a Primary Master Name Server (DNS and Bind)
syslog channels: 7.5.2.2. Syslog channels (DNS and Bind)
syslog command (scotty): 6.4.1. Tcl/Tk and scotty (Network Troubleshooting Tools)
syslog file
- checking for error messages
- example of: 9.4.2. Creating and Delegating a Subdomain (DNS and Bind)
- primary master name server and: 4.7.2. Check for Syslog Errors (DNS and Bind)
- slave name server and: 4.8.1. Setup (DNS and Bind)
- statistics written to: 8.1.2. Capacity Planning (DNS and Bind)
syslog (gated): B.5. Options Statements (TCP/IP Network Administration)
syslog messages: 7.6.1. Common Syslog Messages (DNS and Bind)
- checking for
- primary master name server and: 4.7.2. Check for Syslog Errors (DNS and Bind)
- slave name server and: 4.8.1. Setup (DNS and Bind)
- logging (BIND 8/9): 7.5. Logging in BIND 8 and 9 (DNS and Bind)
syslog-ng tool: 11.2.1.2. Remote logging (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
syslog parameter (gated): B.8.1. The ospf Statement (TCP/IP Network Administration)
syslog protocol: 22.1.1. syslog (Building Internet Firewalls)
- daemons: 11.2.1. Setting Up System Logs on Unix (Building Internet Firewalls)
- example output from: 26.2.3. What Should You Watch For? (Building Internet Firewalls)
syslog records: 3.1. Hardware Considerations (Essential SNMP)
- 10.2.9. Receiving Traps Using Net-SNMP (Essential SNMP)
syslog tool: 11.2.1. syslog (Network Troubleshooting Tools)
- arpwatch data logging: 6.2.3. arpwatch (Network Troubleshooting Tools)
- configuring: 11.2.1.1. Configuring syslog (Network Troubleshooting Tools)
- Microsoft Windows: 11.5. Microsoft Windows (Network Troubleshooting Tools)
- modular syslog: 11.2.1.2. Remote logging (Network Troubleshooting Tools)
- remote logging: 11.2.1.2. Remote logging (Network Troubleshooting Tools)
- secure syslog: 11.2.1.2. Remote logging (Network Troubleshooting Tools)
- security holes: 11.2.1.1. Configuring syslog (Network Troubleshooting Tools)
- syslog-ng tool: 11.2.1.2. Remote logging (Network Troubleshooting Tools)
- A.4. Sources for Tools (Network Troubleshooting Tools)
syslog.conf configuration file: 3.2. The Host Table (TCP/IP Network Administration)
syslog.conf file: 11.2.1.1. Configuring syslog (Network Troubleshooting Tools)
syslogd daemon: 11.2.1. syslog (Network Troubleshooting Tools)
syslogd manual page: 4.7.2. Check for Syslog Errors (DNS and Bind)
syslogd process: 11.3.3. Which Services Should You Leave Enabled? (Building Internet Firewalls)
SyslogFacility: 5.8.3. Logging and OpenSSH (SSH, The Secure Shell)
- 5.8.3. Logging and OpenSSH (SSH, The Secure Shell)
sysName parameter: 7.1. Parameter Settings (Essential SNMP)
sysObjectID parameter: 9.2.3.1. Designing collections (Essential SNMP)
sysServices parameter: 7.3.2. Windows NT 4.0 and Windows 2000 Agent (Essential SNMP)
system
- crashes, watching carefully: 10.12.1. Watch Reboots Carefully (Building Internet Firewalls)
- cryptographic, components of: C.2. Key Components of Cryptographic Systems (Building Internet Firewalls)
- customized: 27.1.7. Restore and Recover (Building Internet Firewalls)
- defense, diversity of: 3.7. Diversity of Defense (Building Internet Firewalls)
- documenting after incident: 27.1.6. Snapshot the System (Building Internet Firewalls)
- 27.4.5. Planning for Snapshots (Building Internet Firewalls)
- failure of: 3.5. Fail-Safe Stance (Building Internet Firewalls)
- keeping up-to-date: 26.3.2. Keeping Your Systems up to Date (Building Internet Firewalls)
- labeling and diagramming: 27.5.2. Labeling and Diagramming Your System (Building Internet Firewalls)
- logs (see logs)
- monitoring: 10.11.2. Consider Using Software to Automate Monitoring (Building Internet Firewalls)
- 26.2. Monitoring Your System (Building Internet Firewalls)
- operating, testing reload of: 27.5.6. Testing the Reload of the Operating System (Building Internet Firewalls)
- rebuilding: 27.1.7. Restore and Recover (Building Internet Firewalls)
- restoring after incident: 27.1.7. Restore and Recover (Building Internet Firewalls)
- planning for: 27.4.6. Planning for Restoration and Recovery (Building Internet Firewalls)
- shutting down: 27.1.3. Disconnect or Shut Down, as Appropriate (Building Internet Firewalls)
system administration
- defined: 1. Overview of TCP/IP (TCP/IP Network Administration)
- distributed servers, managing: 9.6. Managing Distributed Servers (TCP/IP Network Administration)
- NFS: 6. System Administration Using the Network File System (Managing NFS and NIS)
- NIS: 4. System Management Using NIS (Managing NFS and NIS)
system administrators: 0.4. Audience (DNS and Bind)
system calls
- getrlimit(): 7.6.1. Common Syslog Messages (DNS and Bind)
- sendto(): 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
- setrlimit(): 7.6.1. Common Syslog Messages (DNS and Bind)
system clocks, synchronizing: 11.3. NTP (Network Troubleshooting Tools)
system configuration
- end users, distributing to: 4.6. Informing the Users (TCP/IP Network Administration)
- initialization scripts: 5.2.1.1. Understanding /etc/inittab (TCP/IP Network Administration)
- planning: 4. Getting Started (TCP/IP Network Administration)
system configuration files: 2.2. System Configuration Files (Network Troubleshooting Tools)
- application files: 2.2.5.1. Application files (Network Troubleshooting Tools)
- configuration programs: 2.2.2. Configuration Programs (Network Troubleshooting Tools)
- kernel configuration: 2.2.3. Kernel (Network Troubleshooting Tools)
- log files: 2.2.5.3. Log files (Network Troubleshooting Tools)
- mrtg: 8.4.1.1. mrtg configuration file (Network Troubleshooting Tools)
- security files: 2.2.5.2. Security files (Network Troubleshooting Tools)
- startup files and scripts: 2.2.4. Startup Files and Scripts (Network Troubleshooting Tools)
- testing: 11.2.3.1. tcpwrappers (Network Troubleshooting Tools)
system contacts (see sysContact parameter)
system failures: 1.1. General Approaches to Troubleshooting (Network Troubleshooting Tools)
- 1.1. General Approaches to Troubleshooting (Network Troubleshooting Tools)
- 1.1. General Approaches to Troubleshooting (Network Troubleshooting Tools)
system file, Solaris configuration: 5.1.1. Using Dynamically Loadable Modules (TCP/IP Network Administration)
system files, changing location of (BIND 8/9): 7.4. Changing System File Locations in BIND 8 and 9 (DNS and Bind)
system integrity checkers: 11.4. Security Tools (Network Troubleshooting Tools)
system locations (see sysLocation parameter)
system management: B.2.1. System Management (Network Troubleshooting Tools)
- (see also network management)
- books and resources: B.2.1. System Management (Network Troubleshooting Tools)
System Management Interface Tool (SMIT): 6.4.4.2. AIX 4.2.1 (DNS and Bind)
System Management Server (SMS): 22.1.3. System Management Server (SMS) (Building Internet Firewalls)
System Messaged Blocks (SMB): 6.6. Politics and Security (Network Troubleshooting Tools)
System Monitor tool: 7.4.3. Other Options (Network Troubleshooting Tools)
system performance (see performance monitoring)
System Policy Editor tool: 7.4.3. Other Options (Network Troubleshooting Tools)
system queries: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
system tuning: 10.12. System Tuning (DNS and Bind)
system uptime, polling: 8.1.1. Using HP OpenView to Retrieve Values (Essential SNMP)
- 13.4. Other Data-Gathering Applications (Essential SNMP)
System V
- Line Printer configuration: 9.2.2. Line Printer Service (TCP/IP Network Administration)
- vfstab files, options: 9.1.3.2. The vfstab and fstab files (TCP/IP Network Administration)
System V startup model: 5.2. Startup Files (TCP/IP Network Administration)
- inittab file: 5.2.1.1. Understanding /etc/inittab (TCP/IP Network Administration)
- runlevels: 5.2.1. Startup Runlevels (TCP/IP Network Administration)
System V systems: 2.2.4. Startup Files and Scripts (Network Troubleshooting Tools)
SystemEDGE: 5.1. SNMP Agents (Essential SNMP)
- configuring: 7.3.5. Concord SystemEDGE Agent for Unix and NT (Essential SNMP)
- configuration file: 7.3.5.1. Simple configuration (Essential SNMP)
- 11.2.1. Extensibility for Unix and Windows NT (Essential SNMP)
- 11.2.1. Extensibility for Unix and Windows NT (Essential SNMP)
- plug-ins: 7.3.5.2. Advanced configuration (Essential SNMP)
- extending: 11. Extensible SNMP Agents (Essential SNMP)
- 11.2. SystemEDGE (Essential SNMP)
- parameters: 7.3.5.2. Advanced configuration (Essential SNMP)
- 11.2.1. Extensibility for Unix and Windows NT (Essential SNMP)
- 11.2.2. Added Extensibility for Windows NT (Essential SNMP)
- self-monitoring capabilities: 7.3.5.2. Advanced configuration (Essential SNMP)
systemid systemid parameter (gated): B.8.3. The isis Statement (TCP/IP Network Administration)
Systems Management Server (SMS): 5.8. Microsoft Windows (Network Troubleshooting Tools)
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z

Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.