Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: S

safe, storing security information in : 12.2.6. Secure Shell
SATAN tool : 12.4.3.2. SATAN
saturated networks : (see network)
scaling well
2.4. Internet Routing Architecture
3.3. Domain Name Service
4.2.1. Obtaining an IP Address
7.5.1. Exterior Gateway Protocol
scp (secure copy) : 12.2.6. Secure Shell
script files
1.7. Application Layer
6.1.5.1. Enabling and disabling the interface
(see also startup script)
(see also UNIX, systems)
debugging tips : 6.4.4. Troubleshooting Serial Connections
invoking dialup IP (dip) : A.1. Dial-Up IP
scriptfile : A.3. chat
scripting language : 6.3.2. Dial-Up PPP
search entry, in resolv.conf : 8.2.1. The Resolver Configuration File
secondary nameservers
3.3.4. BIND, resolver, and named
4.4.1. Obtaining a Domain Name
8.1.1. BIND Configurations
C.2. named.boot Configuration Commands
configuring : 8.3.1.2. Primary and secondary server configurations
secrecy
defined : 12.1.1. Assessing the Threat
keys for : 6.3.4. PPP Daemon Security
secure copy (scp) : 12.2.6. Secure Shell
SECURE points : 12.4.3.1. COPS
secure shell (ssh) : 12.2.6. Secure Shell
daemon (sshd) : 12.2.6. Secure Shell
SECURE_USERS variable : 12.4.3.1. COPS
security
1.7. Application Layer
(see also intruders)
(see also printers)
attacks
1.7. Application Layer
4.2.1. Obtaining an IP Address
importance of notifying others
12.4.2. Looking for Trouble
12.4.2.2. Checking login activity
mechanisms included within applications : 12.2.5. Secure the r Commands
monitoring : 12.4. Security Monitoring
planning : 12.1. Security Planning
policy : 12.1. Security Planning
writing : 12.1.3. Writing a Security Policy
for printers : 4.5.2. Print servers
publications, list of : 12.8. Words to the Wise
risks
4.1. Connected and Non-Connected Networks
4.2.2. Defining the Subnet Mask
5.3.1.1. Options
5.3.1.2. Pseudo-device
5.4. The Internet Daemon
9.1.2.1. The share command
13.2.1. Creating an FTP Server
sources of information : 12.1.2.2. Use mailing lists to distribute information
segments : 1.3. TCP/IP Protocol Architecture
format : 1.6.2. Transmission Control Protocol
header : 1.6.2. Transmission Control Protocol
semicolon (;)
comment character : C.3.1. Standard Resource Records
ending gated configuration statements
7.7.1.1. A host configuration
B.2. The gated Configuration Language
sender addresses : (see addresses)
sendmail
UNIX Versions
4.5.3. Planning Your Mail System
10. sendmail
aliases in : 10.3. sendmail Aliases
classes, listed : E.4.1. sendmail Classes
command : E.2. The sendmail Command
arguments, listed : E.2. The sendmail Command
compiling : E.1. Compiling sendmail
configuring : 10.5. sendmail Configuration
internal macros, listed : 10.5.2. The Define Macro Command
mailer flags, listed : E.4.3. sendmail Mailer Flags
options : E.4.2. sendmail Options
running as a daemon : 10.2. Running sendmail as a Daemon
testing and debugging arguments : 10.8. Testing sendmail.cf
tools reference : E. A sendmail Reference
using key files in : 10.8.2. Using Key Files in sendmail
using most recent release
10.8.2. Using Key Files in sendmail
E.1. Compiling sendmail
Version 8 : Preface
sendmail startup script : 10.2. Running sendmail as a Daemon
sendmail.cf file : 10.4. The sendmail.cf File
commands, listed : 10.5. sendmail Configuration
define class command (C and F) : 10.5.3. The Define Class Command
define macro command (D) : 10.5.2. The Define Macro Command
define mail headers command (H) : 10.5.7. Defining Mail Headers
define mail precedence command (P) : 10.5.6. Defining Mail Precedence
define mailers command (M) : 10.5.8. Defining Mailers
define trusted users command (T) : 10.5.5. Defining Trusted Users
examining comments in : 10.4.2. General sendmail.cf Structure
modifying : 10.7. Modifying a sendmail.cf File
local information : 10.7.1. Modifying Local Information
options : 10.7.2. Modifying Options
options and flags : E.4. More sendmail.cf
rewrite rules (R, S, and K commands) : 10.6. Rewriting the Mail Address
pattern matching : 10.6.1. Pattern Matching
transforming the address : 10.6.2. Transforming the Address
sample of, locating : 10.4.1. Locating a Sample sendmail.cf File
set option command (O) : 10.5.4. The Set Option Command
structure of : 10.4.2. General sendmail.cf Structure
testing : 10.8. Testing sendmail.cf
commands, listed : 10.8.1. Testing Rewrite Rules
rewrite rules : 10.8.1. Testing Rewrite Rules
version level command (V) : 10.5.1. The Version Level Command
sendmail.tar file : 10.4.1. Locating a Sample sendmail.cf File
Sequence Number field : 1.6.2. Transmission Control Protocol
serial
communications packages : 6.4.4. Troubleshooting Serial Connections
devices, adding manually : 6.4.4. Troubleshooting Serial Connections
interfaces : 6.2. TCP/IP Over a Serial Line
lines
load balancing : 5.2. Linux Kernel Configuration
multiple, using simultaneously : 5.2. Linux Kernel Configuration
protocols
choosing
6.2.2. Choosing a Serial Protocol
A.1.1. The dip Script File
debugging : 6.4.4. Troubleshooting Serial Connections
Serial Line IP : (see SLIP)
Serial Line IP (SLIP)
1.7. Application Layer
(see also PLIP (Parallel Line IP))
server
1.7. Application Layer
(see also remote, servers)
cache, dumping : 11.6.2. The data is here and the server can't find it!
command : 8.4. Using nslookup
configuration statement : B.8.10. The routerdiscovery Statement
master : 8.1.1. BIND Configurations
multiple : 9.1.4. NFS Automounter
program, pathname of : 5.4. The Internet Daemon
service-list : 12.5.1.1. tcpd access control files
services file
5.4. The Internet Daemon
9.3. Network Information Service
9.4. A BOOTP Server
9.7.1. POP Server
9.7.2. IMAP Server
Session Layer : 1.2. A Data Communications Model
set debug command : 8.4. Using nslookup
set domain command : 8.4. Using nslookup
set ruleset (S) command : 10.6.3. The Set Ruleset Command
set type command : 11.6.4. dig: An Alternative to nslookup
setgid permission, avoiding : 12.4.2.1. Checking files
setuid : 9.1.3.2. The vfstab and fstab files
shadow file : 12.2.1. The Shadow Password File
shadow password file : 12.2.1. The Shadow Password File
share command
9.1.2.1. The share command
9.1.5. NFS Authentication Server
sharing
directories : 9.1. The Network File System
filesystems : 9.1.2. Sharing Filesystems
common reasons for : 9.1.2. Sharing Filesystems
sharp sign (#) for comments
3.2. The Host Table
5.4. The Internet Daemon
7.7.1.1. A host configuration
9.1.4. NFS Automounter
9.2.1. The printcap File
9.4. A BOOTP Server
A.1.1. The dip Script File
D.3. The dhcpd.conf Configuration File
shell scripts : 12.4.2.1. Checking files
showmount command
4.5.1. File servers
9.1.3. Mounting Remote Filesystems
SIGHUP signal
9.4. A BOOTP Server
11.6.3. Cache corruption
A.2. The PPP Daemon
A.2.1. Signal processing
B.1.1. Signal Processing
C.1.1. Signal Processing
SIGINT signal
11.6.3. Cache corruption
A.2.1. Signal processing
B.1.1. Signal Processing
C.1.1. Signal Processing
signal processing
in gated : B.1.1. Signal Processing
in named : C.1.1. Signal Processing
in pppd : A.2.1. Signal processing
SIGTERM signal
B.1.1. Signal Processing
D.2. The dhcpd Command
silently discarding datagrams : (see datagrams)
SILO overflows : 6.1.5.4. Maximum transmission unit
Simple Gateway Management Protocol (SGMP) : 11.9. Simple Network Management Protocol
Simple Mail Transfer Protocol : (see SMTP)
Simple Network Management ProtocolNMP : (see SNMP)
single threaded mail deliver : E.3.1. define
Slackware 96 : 4.7. netconfig
slattach command : 6.4.1. slattach
slave command : C.2. named.boot Configuration Commands
SLIP (Serial Line IP)
5.2. Linux Kernel Configuration
5.3.1.2. Pseudo-device
6.2.1. The Serial Protocols
installing : 6.4. Installing SLIP
server configuration : 6.4.3. SLIP Server Configuration
SLIP END character : 6.2.1. The Serial Protocols
SLIP ESC character : 6.2.1. The Serial Protocols
slow convergence : 7.4.1.1. Running RIP with routed
SMI (Structure of Management Information) : 11.9. Simple Network Management Protocol
SMTP (Simple Mail Transfer Protocol)
1.7. Application Layer
3.4.1. Simple Mail Transfer Protocol
commands, listed : 3.4.1. Simple Mail Transfer Protocol
ESMTP (Extended SMTP)
3.4.3. Multipurpose Internet Mail Extensions
10.8. Testing sendmail.cf
private extensions to : 3.4.3. Multipurpose Internet Mail Extensions
sendmail and : 10.1. sendmail's Function
service extensions to : 3.4.3. Multipurpose Internet Mail Extensions
standardizing on : 4.5.3. Planning Your Mail System
SNMP (Simple Network Management Protocol) : 11.9. Simple Network Management Protocol
statement (in gated) : B.8.7. The snmp Statement
snoop
11.2. Diagnostic Tools
11.7. Analyzing Protocol Problems
detailed analysis with : 11.3. Testing Basic Connectivity
SOA records
8.3.2. Standard Resource Records
8.3.4. The named.local File
8.3.5. The Reverse Domain File
8.3.6. The named.hosts File
11.6.1. Some systems work, others don't
C.3.1.1. Start of Authority record
socket
1.2. A Data Communications Model
2.7.3. Sockets
pairs : 2.7.3. Sockets
types of : 5.4. The Internet Daemon
SOCKS : 12.7.1. Functions of the firewall
software
keeping updated : 12.3.2. Keep Software Updated
outdated, security problems with : 12.2. User Authentication
removing unnecessary : 12.3.1. Remove Unnecessary Software
Solaris systems
UNIX Versions
2.5. The Routing Table
2.7.1. Protocol Numbers
3.4.3. Multipurpose Internet Mail Extensions
3.5.1. Reverse Address Resolution Protocol
5.1. Kernel Configuration
10.2. Running sendmail as a Daemon
ifconfig command on
6.1.2. Checking the Interface with ifconfig
6.1.5.3. Metric
Line Printer (LP) print service in : 9.2.2. Solaris Line Printer Service
remounting filesystems on : 9.1.3.2. The vfstab and fstab files
sharing directories on : 9.1.2.1. The share command
obtaining information about : 9.1.3. Mounting Remote Filesystems
sortlist command, in resolv.conf : 8.2.1. The Resolver Configuration File
Source Code Control System (SCCS) format : 10.4.1.1. Building a sendmail.cf with m4 macros
Source Port number
1.6.1. User Datagram Protocol
1.6.2. Transmission Control Protocol
Source Quench Message : 1.5.2. Internet Control Message Protocol
source routing : 5.2. Linux Kernel Configuration
sourcegateways : B.8.2. The rip Statement
SPF protocol
7.4. Interior Routing Protocols
7.4.3. Open Shortest Path First
calculation : 7.4.3. Open Shortest Path First
split horizon rule : 7.4.1.1. Running RIP with routed
spoofing addresses : (see addresses)
ssh (secure shell) : 12.2.6. Secure Shell
command : 12.2.6. Secure Shell
daemon (sshd) : 12.2.6. Secure Shell
.ssh/identity.pub : 12.2.6. Secure Shell
.ssh/known_hosts file : 12.2.6. Secure Shell
ssh-keygen : 12.2.6. Secure Shell
stack : (see protocol, stack)
staff limitations : 4.2.2. Defining the Subnet Mask
standard resource records (RRs) : 8.3.2. Standard Resource Records
in named : C.3.1. Standard Resource Records
start of authority : (see SOA records)
startup script
7.3.1.1. Installing static routes at startup
8.3.6.1. Starting named
static
assignment of addresses : 4.2.1.1. Assigning host addresses
circumstances favoring : 4.3. Planning Routing
routing
4.3. Planning Routing
7.1. Common Routing Configurations
12.7.2. Routing control
adding routes : 7.3.1. Adding Static Routes
building tale for : 7.3. Building a Static Routing Table
installing routes at startup : 7.3.1.1. Installing static routes at startup
statements (in gated) : B.9. static Statements
status monitor daemon : 9.1.1. NFS Daemons
store and forward protocols : 3.4.1. Simple Mail Transfer Protocol
stream : 1.3. TCP/IP Protocol Architecture
sockets : 5.4. The Internet Daemon
string values, in printcap parameters : 9.2.1. The printcap File
Structure of Management Information (SMI) : 11.9. Simple Network Management Protocol
stub areas
7.4.3. Open Shortest Path First
B.8.1. The ospf Statement
subdomains
3.3.2. Creating Domains and Subdomains
8.3.5. The Reverse Domain File
subnets
2.3. Subnets
3.3.2. Creating Domains and Subdomains
administration of : 12.1.2.1. Use subnets to distribute control
enterprise : (see enterprise)
for distributing control : 12.1.2.1. Use subnets to distribute control
mask (sm)
2.3. Subnets
4. Getting Started
6.1. The ifconfig Command
assigning
6.1.3. Assigning a Subnet Mask
A.1.1. The dip Script File
defining : 4.2.2. Defining the Subnet Mask
misconfigured : 11.4.1. Troubleshooting with the ifconfig Command
parameter : 9.4. A BOOTP Server
movement among : 3.6.1. Dynamic Host Configuration Protocol
reasons for : 4.2.2. Defining the Subnet Mask
statements, in dhcpd : 9.5.1. dhcpd.conf
subscribing : 13.5. Mailing Lists
subtypes : 3.4.3. Multipurpose Internet Mail Extensions
Sun Microsystems
UNIX Versions
3.3.5. Network Information Service
3.7.1. File Sharing
9.3. Network Information Service
10.6.1. Pattern Matching
NIS+ on : 9.3.2. NIS+
supernetting : 2.2.2. Classless IP Addresses
superuser privileges
8.3.3. The Cache Initialization File
9.3. Network Information Service
B.1. The gated Command
switches
1.7. Application Layer
(see also packet)
asymmetric : 11.4.4. Subdividing an Ethernet
symmetric encryption : 12.6. Encryption
SYN (synchronize sequence numbers) bit : 1.6.2. Transmission Control Protocol
synchronization : 1.6.2. Transmission Control Protocol
synchronize sequence numbers (SYN) bit : 1.6.2. Transmission Control Protocol
synchronous modems : (see modems)
synchronous PPP, support for : 5.3.1.2. Pseudo-device
syslogd
3.2. The Host Table
A.2. The PPP Daemon
A.3. chat
system : (see network)
system file : 5.1. Kernel Configuration
Systems file : 9.2.2. Solaris Line Printer Service


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.