Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: P
- packet
: 1.3. TCP/IP Protocol Architecture
 
  - authentication
: 7.4.2. RIP Version 2 
  
- bogus, interjecting
: 5.3.1.1. Options 
  
- capturing
: 5.3.1.2. Pseudo-device 
  
- damaged
: 6.1.1. Determining the Interface Name 
  
- filters
: 11.7.1. Packet Filters 
  
     
    - constructing
: 11.7.1. Packet Filters 
    
- in firewalls
: 12.7. Firewalls 
    
- primitives used, listed
: 11.7.1. Packet Filters 
  
   
  - options in DHCP
: 3.6.1. Dynamic Host Configuration Protocol
  
- queued
: 6.1.1. Determining the Interface Name 
  
- routing
: 1.5.1.1. The datagram
  
- switching
: 1.5.1.1. The datagram
  
- update
: 7.4.1. Routing Information Protocol 
     
- packetsize
: 11.3.1. The ping Command 
- PAP (Password Authentication Protocol)
  
  - 6.3.4. PPP Daemon Security 
  
- A.2. The PPP Daemon
  
- pap-secrets file
: 6.3.4. PPP Daemon Security 
- Parallel Line IP (PLIP)
: 5.2. Linux Kernel Configuration 
- parallel multipart subtype
: 3.4.3. Multipurpose Internet Mail Extensions
- parentheses (), for continuation characters
: C.3.1. Standard Resource Records
- partial message subtype
: 3.4.3. Multipurpose Internet Mail Extensions
- passing data
: (see data communications model)
- passive option
       
  - in pppd
: 6.3.5. PPP Server Configuration 
  
- in RIP
  
  
    - 7.4.1.1. Running RIP with routed 
    
- 7.7.1.2. Interior gateway configurations 
  
  
- passwd command line
: 12.2.1. The Shadow Password File 
- passwd file
  
  - 6.3.5. PPP Server Configuration 
  
- 6.4.3. SLIP Server Configuration 
  
- 9.1.5. NFS Authentication Server 
  
- 9.3. Network Information Service 
  
- 10.4.1.1. Building a sendmail.cf with m4 macros 
  
- 12.2.1. The Shadow Password File 
  
- 13.2.1. Creating an FTP Server 
  
- protecting
: 12.2. User Authentication 
  
- in security checks
: 12.4.2. Looking for Trouble 
         
- password
 
  - 1.7. Application Layer
  
- (see also shadow password file)
  
- aging
: 12.2.1. The Shadow Password File 
  
- changing frequently
: 12.2. User Authentication 
  
    
    - tricks used to avoid
: 12.2.1. The Shadow Password File 
  
 
  - choosing
: 12.2.2. Choosing a Password 
  
 
    - guidelines for
: 12.2.2. Choosing a Password 
  
 
  - command
: 6.3.2. Dial-Up PPP 
  
- guessing or stealing
: 12.2. User Authentication 
  
- one-time
  
   
    - Preface
    
- 12.2.3. One-Time Passwords 
    
- systems for
: 12.2.3. One-Time Passwords 
  
   
  - seemingly random, constructing
: 12.2.2. Choosing a Password 
  
- writing down
: 12.2.4. OPIE 
  
- Password Authentication Protocol (PAP)
: A.2. The PPP Daemon
- password-based authentication
  
  - 7.4.3. Open Shortest Path First 
  
- 7.7.1.2. Interior gateway configurations 
  
- 9.1.5. NFS Authentication Server 
   
- path MTU discovery code
: 5.2. Linux Kernel Configuration 
- path vector protocols
: 7.5.2. Border Gateway Protocol 
- pattern matching
: 10.6.1. Pattern Matching 
   
  - symbols for
: 10.5.3. The Define Class Command 
 
- PC NFS Authentication and Print Server (pcnfsd)
: 9.1.5. NFS Authentication Server 
- PCI bus
: 5.3.1.3. Devices 
- PCM audio subtype
: 3.4.3. Multipurpose Internet Mail Extensions
- pcnfsd.conf file
: 9.1.5.1. NFS print services 
- PDUs (Protocol Data Units)
: 11.9. Simple Network Management Protocol 
- peer
      
  - 3. Network Services
  
- 7.5.2. Border Gateway Protocol 
  
- B.5. Options Statements
  
- clauses
: 7.7.1.3. Exterior gateway configuration 
  
- level communications
: 1.2. A Data Communications Model
  
- subclauses
: B.8.5. The bgp Statement
      
- Perimeter Network
: 12.7. Firewalls 
- periods (..) for domain name
: C.3.1. Standard Resource Records
- personal mail forwarding
: 10.3.1. Personal mail forwarding 
- PGP (Pretty Good Privacy)
: 12.6.1. When is symmetric encryption useful? 
- physical
     
  - network
  
 
    - 1.5.1.2. Routing datagrams
    
- 2.3. Subnets
    
- 2.6. Address Resolution
    
- 3.5.1. Reverse Address Resolution Protocol
    
- address, embedded in response
: 3.6. Bootstrap Protocol
    
- independence from
    
      
      - 1.1.1. TCP/IP Features
      
- 6. Configuring the Interface 
    
  
  
  - security
: 12.1.1. Assessing the Threat 
  
- serial ports
: 6.4.4. Troubleshooting Serial Connections 
  
- Physical Layer
 
  - 1.2. A Data Communications Model
  
- 6.1.1. Determining the Interface Name 
  
- ping command
 
  - 6.4.4. Troubleshooting Serial Connections 
  
- 7.2. The Minimal Routing Table 
  
- statistics displayed by
  
   
    - 11.3.1. The ping Command 
    
- 11.4.3. Checking the Interface with netstat 
  
  
  - in troubleshooting
: 11.3. Testing Basic Connectivity 
 
- pipe character (|) separating multiple printer names
: 9.2.1. The printcap File 
- plain text subtype
: 3.4.3. Multipurpose Internet Mail Extensions
- planning sheets
: 4.6.1. Sample Planning Sheets 
- PLIP (Parallel Line IP)
: 5.2. Linux Kernel Configuration 
- plumb/unplumb parameters
: 6.1.5.5. Point-to-point 
- plus sign (+) indicating a trusted host
: 12.2.5. Secure the r Commands 
- point-to-point interfaces
       
  - 6.1.5.5. Point-to-point 
  
- B.6. Interface Statements
  
- defined
: 6.1.1. Determining the Interface Name 
   
- Point-to-Point Protocol
: (see PPP)
- pointers
: 3.3.2. Creating Domains and Subdomains
- poison reverse feature
: 7.4.1.1. Running RIP with routed 
- policy-based routing
: 7.5.2. Border Gateway Protocol 
    
  - database
: 2.4. Internet Routing Architecture
 
- polling
 
  - 7.5.1. Exterior Gateway Protocol 
  
- 11.9. Simple Network Management Protocol 
  
- trap-directed
: 11.9. Simple Network Management Protocol 
   
- POP (Post Office Protocol)
 
  - 3.4.2. Post Office Protocol
  
- 4.5.3. Planning Your Mail System 
  
- commands, listed
: 3.4.2. Post Office Protocol
  
- mail server
: 9.7.1. POP Server 
    
- pop3d.tar
: 9.7.1. POP Server 
- popper17.tar
: 9.7.1. POP Server 
- port
   
  - 1.2. A Data Communications Model
  
- 2.7.3. Sockets
  
- numbers
  
   
    - 1.6.2. Transmission Control Protocol
    
- 2.7. Protocols, Ports, and Sockets
    
- 2.7.2. Port Numbers
    
- passing
: 2.7.3. Sockets
  
    
  - randomly generated
: 3.6. Bootstrap Protocol
 
- portmapper
: 2.7.2. Port Numbers
- Positive Acknowledgment
: 1.6.2. Transmission Control Protocol
  
  - with Re-transmission (PAR)
: 1.6.2. Transmission Control Protocol
 
- Post Office Protocol
: (see POP)
- post office servers
: (see mailbox servers)
- PostScript application subtype
: 3.4.3. Multipurpose Internet Mail Extensions
- pound sign (#) for comments
    
  - 3.2. The Host Table
  
- 5.4. The Internet Daemon 
  
- 7.7.1.1. A host configuration 
  
- 9.1.4. NFS Automounter 
  
- 9.2.1. The printcap File 
  
- 9.4. A BOOTP Server 
  
- A.1.1. The dip Script File
  
- D.3. The dhcpd.conf Configuration File
        
- power outage, possible effects of
 
  - 9.4. A BOOTP Server 
  
- 9.5.1. dhcpd.conf 
  
- PPP (Point-to-Point Protocol)
 
  - 5.2. Linux Kernel Configuration 
  
- 5.3.1.2. Pseudo-device 
  
- 6.2.1. The Serial Protocols 
  
- daemon (pppd)
: 6.3.1. The PPP Daemon 
  
    
    - command-line options
: 6.3.1. The PPP Daemon 
    
- overriding address exchanges
: 6.3.1. The PPP Daemon 
    
- security in
: 6.3.4. PPP Daemon Security 
    
- tools reference
: A.2. The PPP Daemon
  
    
  - as default
: A.1.1. The dip Script File
  
- installing
  
  
    - 6.1.5.5. Point-to-point 
    
- 6.3. Installing PPP 
  
  
  - interoperability and
: 6.2.2. Choosing a Serial Protocol 
  
- server configuration
: 6.3.5. PPP Server Configuration 
  
  
    - in Solaris
: 6.3.6. Solaris PPP 
  
 
  - tools reference
: A. PPP Tools
 
- ppp directory, protecting
: A.2. The PPP Daemon
- ppplogin
: 6.3.5. PPP Server Configuration 
- .ppprc file
: A.2. The PPP Daemon
- precedence
: 10.5.6. Defining Mail Precedence 
- Predictor-1 compression
: A.2. The PPP Daemon
- preference values
      
  - 7.6.1. gated's Preference Value 
  
- B.6. Interface Statements
  
- B.8.5. The bgp Statement
  
- B.9. static Statements
  
- B.10. Control Statements
  
- high-cost
: 7.7.1.2. Interior gateway configurations 
  
- negative
: B.10.1. The import Statement
       
- prefix-length
: 2.2.2. Classless IP Addresses
- Presentation Layer
: 1.2. A Data Communications Model
- Pretty Good Privacy (PGP)
: 12.6.1. When is symmetric encryption useful? 
- primary nameservers
    
  - 3.3.4. BIND, resolver, and named
  
- 4.4.1. Obtaining a Domain Name 
  
- 8.1.1. BIND Configurations 
  
- C.2. named.boot Configuration Commands
  
- configuring
: 8.3.1.2. Primary and secondary server configurations 
     
- print servers
: 3.7.2. Print Services
 
  - configuring
  
 
    - 4.5.2. Print servers 
    
- 9.2.1. The printcap File 
  
  
- print spool directory, making
 
  - 9.1.5.1. NFS print services 
  
- 9.2.1. The printcap File 
  
- printcap file
: 9.2.1. The printcap File 
- printers
  
  - multiple
: 9.2.1. The printcap File 
  
- queue display
: 9.2.1.2. Using LPD 
  
- security
: 9.2.1.1. LPD security 
   
- priority of messages, assigning
 
  - 10.5.6. Defining Mail Precedence 
  
- B.8.4. The isis Statement
  
- private argument
: 6.1.5.3. Metric 
- procmail
: E.3.5. MAILER
- prog pattern
: 13.3.1. archie 
- promiscuous mode
    
  - 6.1.5.5. Point-to-point 
  
- 11.7.1. Packet Filters 
  
- interface
: 5.3.1.2. Pseudo-device 
   
- proto clauses
 
  - 7.7.1.3. Exterior gateway configuration 
  
- A.1. Dial-Up IP
  
- B.10.2. The export Statement
   
- protocol
 
  - analyzers
  
 
    - 5.3.1.2. Pseudo-device 
    
- 11.7. Analyzing Protocol Problems 
    
- 12.2.3. One-Time Passwords 
  
   
  - client server
: 11.9. Simple Network Management Protocol 
  
- manager/agent
: 11.9. Simple Network Management Protocol 
  
- minor
: 2.7.1. Protocol Numbers
  
- name, alias for
: 2.7.1. Protocol Numbers
  
- number
  
     
    - 1.5.1.4. Passing datagrams to the transport layer
    
- 2.7.1. Protocol Numbers
  
  
  - problems, troubleshooting
: 11.7. Analyzing Protocol Problems 
  
- stack
  
  
    - 1.2. A Data Communications Model
    
- 11.1. Approaching a Problem 
  
  
  - standards
  
 
    - 1.1.2. Protocol Standards
    
- 1.7. Application Layer
  
  
  - statements (in gated)
: B.8. Protocol Statements
  
- suite
: 1.2. A Data Communications Model
  
- tracing
: B.1. The gated Command
   
- Protocol Data Units (PDUs)
: 11.9. Simple Network Management Protocol 
- protocols file
  
  - 2.7.1. Protocol Numbers
  
- 5.4. The Internet Daemon 
  
- 9.3. Network Information Service 
   
- proxy servers
 
  - 4.2.1. Obtaining an IP Address 
  
- 5.3.1.1. Options 
  
- 12.7. Firewalls 
  
- providing on a firewall
: 12.7.1. Functions of the firewall 
    
- proxyarp option
: A.2. The PPP Daemon
- ps command
: 12.4.1. Know Your System 
- pseudo-device statement
: 5.3.1.2. Pseudo-device 
- pseudo-domains
: 10.7.1. Modifying Local Information 
- pseudo-terminals
: 5.3.1.2. Pseudo-device 
- PTR resource records
      
  - 8.3.5. The Reverse Domain File 
  
- C.3.1.6. Domain Name Pointer record
  
- ptys
: 5.3.1.2. Pseudo-device 
- public-key encryption
: 12.6. Encryption 
- pulse code modulation (PCM) audio subtype
: 3.4.3. Multipurpose Internet Mail Extensions
   
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
 O'Reilly & Associates, Inc.
All Rights Reserved.