Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: N
- name
: 3.1. Names and Addresses
- name service
  
  - 1.7. Application Layer
  
- 8. Configuring DNS Name Service 
  
- (see also DNS)
  
- (see also Domain Name Service)
  
- addresses
: (see addresses)
  
- process
: 3.3.4. BIND, resolver, and named
  
- troubleshooting
  
       
    - 11.3. Testing Basic Connectivity 
    
- 11.6. Checking Name Service 
  
  
- Name Service Switch file (nsswitch.conf)
: 9.3.1. The nsswitch.conf file 
- named server daemon
  
  - 5.4. The Internet Daemon 
  
- 8.1. BIND: UNIX Name Service 
  
- booting
: 8.3.3. The Cache Initialization File 
  
- command
: C.1. The named Command
  
- configuring
: 8.3. Configuring named 
  
- process
: 3.3.4. BIND, resolver, and named
  
- starting at startup
: 8.3.6.1. Starting named 
  
- tools reference
: C. A named Reference
        
- named.boot file
 
  - 8.3.1. The named.boot File 
  
- 11.6.3. Cache corruption 
  
- C.1. The named Command
  
- configuration commands
: C.2. named.boot Configuration Commands
  
    
    - listed
: 8.3.1. The named.boot File 
  
 
- named.ca file
: 11.6.3. Cache corruption 
- named.hosts file
: 8.3.6. The named.hosts File 
- named.local file
: 8.3.4. The named.local File 
- named.pid file
: 11.6.3. Cache corruption 
- named.rev file
: 8.3.5. The Reverse Domain File 
- nameserver entry, in resolv.conf
: 8.2.1. The Resolver Configuration File 
- National Center for Supercomputer Applications (NCSA)
: 13.1. The World Wide Web 
- National Institute of Standards and Technology (NIST)
        
  - 12.1.2.2. Use mailing lists to distribute information 
  
- 13.1. The World Wide Web 
  
- National Science Foundation (NSF)
: 1.1. TCP/IP and the Internet
- natural mask
: 2.2.2. Classless IP Addresses
- NBMA interfaces
   
  - B.6. Interface Statements
  
- B.8.1. The ospf Statement
  
- NCSA (National Center for Supercomputer Applications)
: 13.1. The World Wide Web 
- neighbors
  
  - acquiring
: 7.5.1. Exterior Gateway Protocol 
  
- allowing
  
  
    - 7.7.1.3. Exterior gateway configuration 
    
- B.8.6. The egp Statement
  
  
- net domain
: 3.3.1. The Domain Hierarchy
- Net/Dest
: (see Net/Dest value)
- Net/Dest value
   
  - 6.1.1. Determining the Interface Name 
  
- 6.1.5.5. Point-to-point 
  
- netconfig
: 4.7. netconfig 
- Netscape browser
: 13.1. The World Wide Web 
- netstat
   
  - -in command
: 6.1.1. Determining the Interface Name 
  
- -ni command
: 6.4.4. Troubleshooting Serial Connections 
  
- -nr command
  
   
    - 2.5. The Routing Table
    
- 7.3.1. Adding Static Routes 
    
- 11.5. Checking Routing 
  
   
  - to display routing table
: 12.7.2. Routing control 
  
- troubleshooting with
  
  
    - 11.2. Diagnostic Tools 
    
- 11.3. Testing Basic Connectivity 
    
- 11.4.3. Checking the Interface with netstat 
  
   
- network
: (see enterprise)
 
  - access
  
 
    - balancing against computer security
: 12. Network Security 
    
- troubleshooting
: 11.4. Troubleshooting Network Access 
  
  
  - address translation (NAT)
: 4.2.1. Obtaining an IP Address 
  
 
    - advantages of
: 4.2.1. Obtaining an IP Address 
    
- disadvantages of
: 4.2.1. Obtaining an IP Address 
  
  
  - administration
  
 
    - 1.7. Application Layer
    
- 3.1. Names and Addresses
    
- avoiding problems
    
   
      - 11.4.2.1. ARP problem case study 
      
- 11.9. Simple Network Management Protocol 
    
  
    - decentralized
: 2.3. Subnets
    
- defined
    
  
      - 1. Overview of TCP/IP
      
- 11. Troubleshooting TCP/IP 
    
  
    - developing feel for
: 12.4.1. Know Your System 
    
- need for information about
: Preface
    
- security responsibilites of
: 12.1.3. Writing a Security Policy 
    
- simplifying
: 4.2.2. Defining the Subnet Mask 
  
    
  - break-ins, increasing
: 12. Network Security 
  
- building
: Foreword from the First Edition
  
- connected or not connected to Internet
: 4.1. Connected and Non-Connected Networks 
  
- diameter
: 1.7. Application Layer
  
    
    - limited
: 7.4.1.1. Running RIP with routed 
  
 
  - hardware
  
 
    - 1.7. Application Layer
    
- (see also physical, network)
    
- with built-in diagnostic software
: 11.3.1. The ping Command 
    
- problems with
    
    
      - 11.3.1. The ping Command 
      
- 11.4.3. Checking the Interface with netstat 
      
- 11.4.4.1. Network hardware problems 
    
   
  
  - heterogeneous
: 1.1.2. Protocol Standards
  
- interfaces
: 3.1. Names and Addresses
  
  
    - enabling or disabling
: 6.1.5.1. Enabling and disabling the interface 
    
- information need for
: 6.1. The ifconfig Command 
  
  
  - maps drawn by monitors
: 11.9. Simple Network Management Protocol 
  
- mask
: 2.5. The Routing Table
  
  
    - in RIP-2
: 7.4.2. RIP Version 2 
  
 
  - monitoring traffic on
: 11.7. Analyzing Protocol Problems 
  
- news
: 13.5.1. Newsgroups 
  
- numbers
  
   
    - 2.2.1. Address Classes
    
- 4.2.1.1. Assigning host addresses 
  
  
  - problems, how to approach
: 11. Troubleshooting TCP/IP 
  
- processes
: 8.2. Configuring the Resolver 
  
- resources, controlling
: 12.1.3. Writing a Security Policy 
  
- saturated
: 11.4.3. Checking the Interface with netstat 
  
- servers
: 2.7.2. Port Numbers
  
     
    - configuring
: 9. Configuring Network Servers 
  
 
  - shared media
: 11.4.4. Subdividing an Ethernet 
  
- subdividing
: 11.4.3. Checking the Interface with netstat 
  
- subnetted
: 4.2.1.1. Assigning host addresses 
  
- topology of
: 2.2.2. Classless IP Addresses
  
- underlying
: 1.4. Network Access Layer
  
- unreliable
: 11.3.1. The ping Command 
  
- unusual activity on
: 12.4.1. Know Your System 
  
- usage, monitoring
: 5.2. Linux Kernel Configuration 
  
- X.25
: 1.5.1.3. Fragmenting datagrams
         
- Network Access Layer
 
  - 1.3. TCP/IP Protocol Architecture
  
- 6.1.1. Determining the Interface Name 
  
- protocols
: 3.6. Bootstrap Protocol
   
- Network Access Points
 
  - 1.1. TCP/IP and the Internet
  
- 2.4. Internet Routing Architecture
  
- 7.5.2. Border Gateway Protocol 
   
- Network Control protocols
: 6.2.1. The Serial Protocols 
- Network File System
: (see NFS)
- Network Information Center
: (see NIC)
- Network Information Service
: (see NIS)
- Network Layer
     
  - 1.2. A Data Communications Model
  
- 6.1.1. Determining the Interface Name 
  
- Network Management Station (NMS)
: 11.9. Simple Network Management Protocol 
- Network News Transfer Protocol (NNTP)
: 13.5.1. Newsgroups 
- Network Terminal Protocol (TELNET)
: 1.7. Application Layer
- network unreachable error message
    
  - 11.3. Testing Basic Connectivity 
  
- 11.5. Checking Routing 
  
- Network/Destination value
 
  - 6.1.1. Determining the Interface Name 
  
- 6.1.5.5. Point-to-point 
  
- networks file
 
  - 3.2. The Host Table
  
- 6.1.3. Assigning a Subnet Mask 
  
- 7.3. Building a Static Routing Table 
  
- 9.3. Network Information Service 
  
- as maps
: 3.3.5. Network Information Service
     
- newly registered hosts
: 3.2. The Host Table
- news message subtype
: 3.4.3. Multipurpose Internet Mail Extensions
- newsgroups
: 13.5.1. Newsgroups 
   
  - for security information
: 12.1.2.2. Use mailing lists to distribute information 
  
- using
: 4.1.1. Network Contacts 
  
- newsreader, using
: 13.5.1. Newsgroups 
- next-hop route
: 7.4.3. Open Shortest Path First 
  
  - specifying
: 7.3. Building a Static Routing Table 
  
 
    - in RIP-2
: 7.4.2. RIP Version 2 
  
 
- NFS (Network File System)
 
  - 1.7. Application Layer
  
- 3.7.1. File Sharing
  
- 9.1. The Network File System 
  
- 9.6. Managing Distributed Servers 
  
- benefits of
: 9.1. The Network File System 
     
- NFS daemon (nfsd)
: 9.1.1. NFS Daemons 
- NFS-based print services
: 9.1.5.1. NFS print services 
- nfs.client script
: 9.1.1. NFS Daemons 
- nfs.server script
: 9.1.1. NFS Daemons 
- NFSNET backbone
: 1.1. TCP/IP and the Internet
- NIC (Network Information Center)
: 3.3.2. Creating Domains and Subdomains
      
  - handle
: 4.4.1. Obtaining a Domain Name 
 
- NIS (Network Information Service)
 
  - 3.3.5. Network Information Service
  
- 9.3. Network Information Service 
  
- maps of
  
   
    - 3.3.5. Network Information Service
    
- 6.1.3. Assigning a Subnet Mask 
    
- 10.6.1. Pattern Matching 
  
   
- NIS+
: 9.3.2. NIS+ 
- NIST (National Institute of Standards and Technology)
  
  - 12.1.2.2. Use mailing lists to distribute information 
  
- 13.1. The World Wide Web 
  
- NMS (Network Management Station)
: 11.9. Simple Network Management Protocol 
- NNTP (Network News Transfer Protocol)
: 13.5.1. Newsgroups 
- no answer error message
: 11.3. Testing Basic Connectivity 
- no more data from sender (FIN) bit
: 1.6.2. Transmission Control Protocol
- nobody uid
     
  - 5.4. The Internet Daemon 
  
- 9.1.2.1. The share command 
  
- non-authoritative servers
: 3.3.4. BIND, resolver, and named
- non-broadcast multi-access (NBMA) interfaces
  
  - B.6. Interface Statements
  
- B.8.1. The ospf Statement
  
- non-connected network
: 4.1. Connected and Non-Connected Networks 
- non-encoded binary data
: 3.4.3. Multipurpose Internet Mail Extensions
- non-Internet sites, delivering mail to
: C.3.1.4. Mail exchanger record
- non-recursive queries
: 3.3.2. Creating Domains and Subdomains
- notation, dotted decimal
: 2.3. Subnets
- NP keyword
: 12.2.1. The Shadow Password File 
- NS query
: 11.6. Checking Name Service 
- NS records
        
  - 8.3.5. The Reverse Domain File 
  
- 8.3.6. The named.hosts File 
  
- NS resource records
: C.3.1.2. Name server record
- nservers option
: 9.1.1. NFS Daemons 
- NSF (National Science Foundation)
   
  - 1.1. TCP/IP and the Internet
  
- 7.5.2. Border Gateway Protocol 
  
- NSFNET
: 2.4. Internet Routing Architecture
 
  - backbone
: 7.4. Interior Routing Protocols 
 
- nslookup
 
  - 4.4.1. Obtaining a Domain Name 
  
- 8.4. Using nslookup 
  
- in troubleshooting
  
   
    - 11.2. Diagnostic Tools 
    
- 11.3. Testing Basic Connectivity 
    
- 11.6. Checking Name Service 
  
   
- nsswitch.conf file
 
  - 9.3.1. The nsswitch.conf file 
  
- E.4.2. sendmail Options
  
- numeric addresses
: (see addresses)
- numeric values, in printcap parameters
: 9.2.1. The printcap File 
  
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.