home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam    

CD HomeThe Networking CDSearch this CD

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: H

- hyphen: 4.5. Host Name Checking (BIND 4.9.4 and Later Versions) (DNS and Bind)
H command (sendmail): 10.5.7. Defining Mail Headers (TCP/IP Network Administration)
H flag (Linux routing table): 2.4. The Routing Table (TCP/IP Network Administration)
HACK macro (sendmail): E.3. m4 sendmail Macros (TCP/IP Network Administration)
hackers, BIND versions and: 11.2.1. BIND Version (DNS and Bind)
half-duplex mode
identifying line speed: A. Using Input and Output Octets (Essential SNMP)
measurements: A. Using Input and Output Octets (Essential SNMP)
halt command: 7.1.2. rndc and controls (BIND 9) (DNS and Bind)
hand tools, hardware maintenance: 13.2. Diagnostic Tools (TCP/IP Network Administration)
handshaking: 1.5.1. Internet Protocol (TCP/IP Network Administration)
1.6.2. Transmission Control Protocol (TCP/IP Network Administration)
port numbers and: 2.6.3. Sockets (TCP/IP Network Administration)
HANGUP command (chat): A.3. chat (TCP/IP Network Administration)
hard mounts, filesystems: 6.3.5. Hard and soft mounts (Managing NFS and NIS)
hard option (vfstab file): 9.1.3.2. The vfstab and fstab files (TCP/IP Network Administration)
hard suboption: 6.5.2. Rules for mounting replicas (Managing NFS and NIS)
hardening machines: 10.8. Building a Bastion Host (Building Internet Firewalls)
hardware
configuration of: 10.3.3. What Hardware Configuration? (Building Internet Firewalls)
detecting, Solaris reconfigure file and: 5.1.1. Using Dynamically Loadable Modules (TCP/IP Network Administration)
discovering (see device discovery)
distance limitations, subnetting and: 4.2.3. Defining the Subnet Mask (TCP/IP Network Administration)
emulators: 9.2. Network Emulators and Simulators (Network Troubleshooting Tools)
forcing to send traps: 10.3.5. Forcing Your Hardware to Generate Traps (Essential SNMP)
hardware errors: 4.2.4. Traffic Measurements with netstat (Network Troubleshooting Tools)
identifying: 6.3. Device Identification (Network Troubleshooting Tools)
inventories: 1.3.1. Documentation (Network Troubleshooting Tools)
Linux, device driver installation: 5.1.1. Using Dynamically Loadable Modules (TCP/IP Network Administration)
load generator devices: 9.1.2.2. MGEN (Network Troubleshooting Tools)
maintenance tools: 13.2. Diagnostic Tools (TCP/IP Network Administration)
monitoring (see device monitoring)
network interfaces, identifying installed: 5.1.5.3. The device statement (TCP/IP Network Administration)
network partitions: 17.2. Network partitioning hardware (Managing NFS and NIS)
OSI Physical Layer: 1.2. A Data Communications Model (TCP/IP Network Administration)
routers (see routers)
subnetting and: 2.2.2. Subnets (TCP/IP Network Administration)
swapping: 1.1. General Approaches to Troubleshooting (Network Troubleshooting Tools)
hardware considerations
NMSs: 3.1. Hardware Considerations (Essential SNMP)
upgrading: 4.3. Upgrading Your Hardware (Essential SNMP)
hardware parameter (dhcpd): D.3.2. Configuration Parameters (TCP/IP Network Administration)
has-old-clients option (named): C.2.5. The options Statement (TCP/IP Network Administration)
hash functions: 3.2.3. Hash Functions (SSH, The Secure Shell)
3.9.3.1. CRC-32 (SSH, The Secure Shell)
pre-image-resistance: 3.2.3. Hash Functions (SSH, The Secure Shell)
hash mark (#) for comments: 3.2. The Host Table (TCP/IP Network Administration)
hash (sendmail K command value): E.4.5. The sendmail K Command (TCP/IP Network Administration)
hash-tables: 3.3.5. Map files (Managing NFS and NIS)
blocks: 3.3.5. Map files (Managing NFS and NIS)
HAUTH process: 3.5.1.6. Hostbased authentication (SSH, The Secure Shell)
HCLNFSD protocol, PC/NFS and: 10.1. PC/NFS today (Managing NFS and NIS)
HDLC (High-level Data Link Control): 6.2.1. The Serial Protocols (TCP/IP Network Administration)
Header (DNS response packets): 13.6.4. dig: An Alternative to nslookup (TCP/IP Network Administration)
header packet: 4.1. What Does a Packet Look Like? (Building Internet Firewalls)
header section (DNS messages): 12.6.1. Showing the Query and Response Messages (DNS and Bind)
15.2.1. DNS Message Format (DNS and Bind)
A.2.2. Header Section Format (DNS and Bind)
Perl objects for: 15.3.3. Header Objects (DNS and Bind)
HeaderName directive (Apache): 11.3.5. Creating a Fancy Index (TCP/IP Network Administration)
headers
capturing: 5.4.2.1. Controlling program behavior (Network Troubleshooting Tools)
5.6.1.1. Using ethereal (Network Troubleshooting Tools)
datagrams: 1.5.1.1. The datagram (TCP/IP Network Administration)
port numbers: 2.6.2. Port Numbers (TCP/IP Network Administration)
protocol numbers: 2.6.1. Protocol Numbers (TCP/IP Network Administration)
displaying in packets: 5.6.1.1. Using ethereal (Network Troubleshooting Tools)
hping settings: 9.1.1.1. hping (Network Troubleshooting Tools)
ICMP parameter problem: Appendix g.3. ICMP Parameter Problem Message Header (TCP/IP Network Administration)
IP datagrams: Appendix g.1. IP Datagram Header (TCP/IP Network Administration)
MIME: 3.4.4. Multipurpose Internet Mail Extensions (TCP/IP Network Administration)
Content-Transfer-Encoding: 3.4.4. Multipurpose Internet Mail Extensions (TCP/IP Network Administration)
nested IP: 4.6. IP Version 6 (Building Internet Firewalls)
packet filtering: 8.8.4. It Should Allow Rules Based on Any Header or Meta-Packet Criteria (Building Internet Firewalls)
protocol stack: 1.3. TCP/IP Protocol Architecture (TCP/IP Network Administration)
sendmail: E.2. The sendmail Command (TCP/IP Network Administration)
H command: 10.5.7. Defining Mail Headers (TCP/IP Network Administration)
precedence: 10.5.6. Defining Mail Precedence (TCP/IP Network Administration)
structure of: 5.4.2.4.3. Packet characteristics. (Network Troubleshooting Tools)
TCP segment: 1.6.2. Transmission Control Protocol (TCP/IP Network Administration)
Appendix g.2. TCP Segment Header (TCP/IP Network Administration)
heartbeat interval: 16.4.7. Running Authoritative Name Servers over Dial-on-Demand (DNS and Bind)
heartbeat-interval option (named): C.2.5. The options Statement (TCP/IP Network Administration)
heavy debugging, compile-time configuration: 4.1.5.14. Debug output (SSH, The Secure Shell)
Heisenberg's Uncertainty Principle: 16.3. Benchmarking (Managing NFS and NIS)
hello command: 3.4.4. Multipurpose Internet Mail Extensions (TCP/IP Network Administration)
hello (EGP trace option): B.8.5. The egp Statement (TCP/IP Network Administration)
Hello packets (OSPF): 7.4.3. Open Shortest Path First (TCP/IP Network Administration)
Hello protocol, overview: 7.4. Interior Routing Protocols (TCP/IP Network Administration)
help
dip: 6.3.2. Dial-Up PPP (TCP/IP Network Administration)
A.1.1. The dip Script File (TCP/IP Network Administration)
Linux kernel configuration: 5.1.3. Linux Kernel Configuration (TCP/IP Network Administration)
HELP command
ESMTP: 3.4.4. Multipurpose Internet Mail Extensions (TCP/IP Network Administration)
SMTP: 3.4.1. Simple Mail Transfer Protocol (TCP/IP Network Administration)
help for available commands: 7.1.1. ndc and controls (BIND 8) (DNS and Bind)
helpdesks: B.1. Sources of Information (Network Troubleshooting Tools)
h_errno variable: 15.2.4. The Resolver Library Routines (DNS and Bind)
herror routine: 15.2.4. The Resolver Library Routines (DNS and Bind)
Hesiod class: 2.1.3. Resource Records (DNS and Bind)
hesiod (sendmail K command value): E.4.5. The sendmail K Command (TCP/IP Network Administration)
heterogeneous networks: 1.1.2. Protocol Standards (TCP/IP Network Administration)
Hewlett-Packard printers: 17.6.3. Other Printing Systems (Building Internet Firewalls)
hexadecimal capture: 5.4.2.3. Controlling what's displayed (Network Troubleshooting Tools)
5.6.1.1. Using ethereal (Network Troubleshooting Tools)
9.1.1.1. hping (Network Troubleshooting Tools)
hexadecimal values, in SSH configuration files: 5.4.3.1. Port number and network interface (SSH, The Secure Shell)
hexdump analysis tool: 5.4.2.3. Controlling what's displayed (Network Troubleshooting Tools)
hidden transmission points: 4.2.2.2. pathchar (Network Troubleshooting Tools)
4.2.2.3. bing (Network Troubleshooting Tools)
hide-password option (pppd): A.2. The PPP Daemon (TCP/IP Network Administration)
hierarchical mounts, automounter: 9.5.2. Hierarchical mounts (Managing NFS and NIS)
-hosts map: 9.5.2.1. The -hosts map (Managing NFS and NIS)
hierarchical operation, NIS+ and: 2.2.3. NIS+ (Managing NFS and NIS)
hierarchical realms and Kerberos-4: 11.4.5.1. Kerberos-4 compatibility mode in Kerberos-5 (SSH, The Secure Shell)
hierarchies, domain naming scheme: 4.1.2. Domain names (Managing NFS and NIS)
High-level Data Link Control (HDLC): 6.2.1. The Serial Protocols (TCP/IP Network Administration)
high-volume end-user (organizational type): 4.2.1.1. Obtaining an official network address (TCP/IP Network Administration)
higher-level services, filtering: 5.4.2.4.2. Protocol and port filtering. (Network Troubleshooting Tools)
hijacking: 13.1.5. Hijacking (Building Internet Firewalls)
protecting against: 13.1.10. Protecting Services (Building Internet Firewalls)
with SSH: 18.2.5.5. SSH session hijacking protection (Building Internet Firewalls)
hijacking of connections: 3.10.3. Connection Hijacking (SSH, The Secure Shell)
HINFO (Host Information) records: C.3.1.9. Host Information record (TCP/IP Network Administration)
16.6.1. Host Information (DNS and Bind)
A.1.2. Types (DNS and Bind)
20.1.4.5. Revealing too much information to attackers (Building Internet Firewalls)
query statistics for: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
hint data/hints (see root hints data)
hints (cache initialization file): 8.3.4. The Cache Initialization File (TCP/IP Network Administration)
historic protocols: 1.1.2. Protocol Standards (TCP/IP Network Administration)
HMAC: C.2.3. Integrity Protection (Building Internet Firewalls)
algorithm: C.5.3. Cryptographic Hashes and Message Digests (Building Internet Firewalls)
HMAC-MD5 algorithm: 7.1.2. rndc and controls (BIND 9) (DNS and Bind)
hmac-sha1: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2) (SSH, The Secure Shell)
h2n name server tool: 10.1.4.3. Other tools (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
h2n utility: 4.6. Tools (DNS and Bind)
7.2.5. Generating Zone Data Files from the Host Table (DNS and Bind)
14.3.1. Forgot to Increment Serial Number (DNS and Bind)
transitioning to subdomains and: 9.7. Managing the Transition to Subdomains (DNS and Bind)
holdoff option (pppd): A.2. The PPP Daemon (TCP/IP Network Administration)
holdtime parameter (gated): B.8.4. The bgp Statement (TCP/IP Network Administration)
home directory
permissions: 5.4.2.1. Acceptable permissions for user files (SSH, The Secure Shell)
security: 10.7. Remote Home Directories (NFS, AFS) (SSH, The Secure Shell)
$HOME environment variable: 1.4.1. Secure Remote Logins (SSH, The Secure Shell)
Home map (NNM): 6.1.1. Running NNM (Essential SNMP)
home pages for mrtg graphs: 8.4.1.1. mrtg configuration file (Network Troubleshooting Tools)
home section (smb.conf file): 9.3.1.1. The smb.conf homes section (TCP/IP Network Administration)
homogeneity, choosing hosts and: 8.1.1. Where Do I Put My Name Servers? (DNS and Bind)
honesty in network management: 1.3.2.1. Professionalism (Network Troubleshooting Tools)
hooks in programs: 9.1. Internal Polling (Essential SNMP)
10.3.6. Using Hooks with Your Programs (Essential SNMP)
hop count, routing: 7.4.1. Routing Information Protocol (TCP/IP Network Administration)
hops
limiting number in traceroute: 4.1.1. Options (Network Troubleshooting Tools)
pathchar results: 4.2.2.2. pathchar (Network Troubleshooting Tools)
in route discovery: 4.1. Path Discovery with traceroute (Network Troubleshooting Tools)
in routing tables: 2.1.3. netstat (Network Troubleshooting Tools)
TTL counts and: 3.3.2.2. Interpreting results (Network Troubleshooting Tools)
Host: 7.1.3.3. Configuration file sections (SSH, The Secure Shell)
using to create nicknames for hosts: 7.1.3.5. Making nicknames for hosts (SSH, The Secure Shell)
host addresses: 1.3.2. IP host addresses (Managing NFS and NIS)
2.2. The IP Address (TCP/IP Network Administration)
(see also IP addresses)
assigning: 4.2.2. Assigning Host Addresses (TCP/IP Network Administration)
host-based authentication
recommended setting: 10.7.1. NFS Security Risks (SSH, The Secure Shell)
SSH-2: 3.5.1.6. Hostbased authentication (SSH, The Secure Shell)
X Windows: 9.3.5.1. How X authentication works (SSH, The Secure Shell)
host configuration
Microsoft Windows: 2.3. Microsoft Windows (Network Troubleshooting Tools)
system configuration files: 2.2. System Configuration Files (Network Troubleshooting Tools)
utilities: 2.1. Utilities (Network Troubleshooting Tools)
host domain name tool: 10.1.4.1. nslookup and dig (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
Host Information (HINFO) records: C.3.1.9. Host Information record (TCP/IP Network Administration)
host-information queries: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
host keys: 2.3.1. Known Hosts (SSH, The Secure Shell)
3.3. The Architecture of an SSH System (SSH, The Secure Shell)
3.5.2.1. Host keys (SSH, The Secure Shell)
generating: 12.2.3.2. ssh-keygen (SSH, The Secure Shell)
as ordinary user: 5.2.2. Running as an Ordinary User (SSH, The Secure Shell)
for server: 5.4.4. Server Key Generation (SSH, The Secure Shell)
load-balanced servers, problems caused by: 3.5.2.1. Host keys (SSH, The Secure Shell)
multiple keys per name, SSH1: 3.5.2.1. Host keys (SSH, The Secure Shell)
SSH servers vs. hosts, assignment to: 3.1.3. Authentication (SSH, The Secure Shell)
host lists: 3.4.2.3.2. Control file details (SSH, The Secure Shell)
Host Manager, diskless clients and: 8.2. Setting up a diskless client (Managing NFS and NIS)
host names
checking for conformance: 4.5. Host Name Checking (BIND 4.9.4 and Later Versions) (DNS and Bind)
rules for: 4.5. Host Name Checking (BIND 4.9.4 and Later Versions) (DNS and Bind)
host naming, migrating from NIS to DNS: 5.5. Migrating from NIS to DNS for host naming (Managing NFS and NIS)
host numbers, IPv4 addresses: 1.3.3. IPv4 address classes (Managing NFS and NIS)
HOST option (xinetd): 12.5.2. Controlling Access with xinetd (TCP/IP Network Administration)
Host Resources MIB: 1.5. Host Management (Essential SNMP)
2.7. Host Management Revisited (Essential SNMP)
host (sendmail K command value): E.4.5. The sendmail K Command (TCP/IP Network Administration)
host specification: 7.1.3.3. Configuration file sections (SSH, The Secure Shell)
with wildcards: 7.1.3.4. Multiple matches (SSH, The Secure Shell)
host statement (dhcpd): D.3.1. Topology Statements (TCP/IP Network Administration)
host statements (dhcpd.config file): 9.5.1. dhcpd.conf (TCP/IP Network Administration)
host-statistics option (named): C.2.5. The options Statement (TCP/IP Network Administration)
host table aliases: 4.2.6. Address and Alias Records (DNS and Bind)
host tables: 1.2.1. The History of the Domain Name System (DNS and Bind)
3.2. The Host Table (TCP/IP Network Administration)
email destinations and: 5. DNS and Electronic Mail (DNS and Bind)
h2n utility for mapping: 4.6. Tools (DNS and Bind)
limitations of: 3.2. The Host Table (TCP/IP Network Administration)
using instead of DNS: 1.5. Must I Use DNS? (DNS and Bind)
host unreachable codes (see ICMP)
host unreachable message: 6.1.4.1. One name server configured (DNS and Bind)
host utility
obtaining/building: 9.6. Good Parenting (DNS and Bind)
using: 9.6.1. Using host (DNS and Bind)
HOSTALIASES environment variable: 6.3.4. Providing Aliases (DNS and Bind)
host.aliases file: 6.3.4. Providing Aliases (DNS and Bind)
HostDsaKey: 5.4.1.1. Host key files (SSH, The Secure Shell)
HostKey: 5.4.1.1. Host key files (SSH, The Secure Shell)
HostKeyFile: 5.4.1.1. Host key files (SSH, The Secure Shell)
hostkeys directories: 7.4.3. Host Keys and Known-Hosts Databases (SSH, The Secure Shell)
hostkeys map, SSH2: 3.5.2.1. Host keys (SSH, The Secure Shell)
hostmaster as email address: 4.2.4. SOA Records (DNS and Bind)
HostName: 7.1.3.5. Making nicknames for hosts (SSH, The Secure Shell)
hostname command
default domain name, setting with
primary master name server: 4.7.3.1. Set the local domain name (DNS and Bind)
local domain name, setting with: 6.1.1. The Local Domain Name (DNS and Bind)
setting default domain name with
slave name servers: 4.8.1. Setup (DNS and Bind)
hostname configuration tool: 2.3. Microsoft Windows (Network Troubleshooting Tools)
hostname field, NFS client netgroups map: 3.3.2. Netgroups (Managing NFS and NIS)
hostname file (Solaris): 6.1.3. Assigning an Address (TCP/IP Network Administration)
hostname links: 2.7.3. Hostname Links (SSH, The Secure Shell)
4.5.1. The /usr/hosts Directory (SSH, The Secure Shell)
hostname option (share command): 9.1.2.1. The share command (TCP/IP Network Administration)
HostnameLookups directive (Apache): 11.3.7. Performance Tuning Directives (TCP/IP Network Administration)
hostnames: 3.1. Names and Addresses (TCP/IP Network Administration)
aliases: 3.2. The Host Table (TCP/IP Network Administration)
canonical names: 8.3.7. The Forward-Mapping Zone File (TCP/IP Network Administration)
formats, netgroups: 3.3.3. Hostname formats in netgroups (Managing NFS and NIS)
locating host tables: 3.2. The Host Table (TCP/IP Network Administration)
netgroups: 12.1.3. Using netgroups (Managing NFS and NIS)
NIS/DNS: 5.2.2. Run NIS on client, enable DNS on NIS server (Managing NFS and NIS)
qualified: 5.3. Fully qualified and unqualified hostnames (Managing NFS and NIS)
selecting: 4.4.3. Choosing a Hostname (TCP/IP Network Administration)
sendmail, class w: 10.7.1. Modifying Local Information (TCP/IP Network Administration)
share command and: 9.1.2.1. The share command (TCP/IP Network Administration)
umountall and: 14.1. NFS administration tools (Managing NFS and NIS)
unqualified: 5.3. Fully qualified and unqualified hostnames (Managing NFS and NIS)
username and: 12.1.2. Enabling transparent access (Managing NFS and NIS)
hostresorder directive: 6.4.6. Silicon Graphics' IRIX (DNS and Bind)
HOSTRESORDER environment variable: 6.4.6. Silicon Graphics' IRIX (DNS and Bind)
hosts: 2.1.2. Domains (DNS and Bind)
adding/deleting: 7.2.1. Adding and Deleting Hosts (DNS and Bind)
14.3.4. Added Name to Zone Data File but Forgot to Add PTR Record (DNS and Bind)
addresses: 1.3.2. IP host addresses (Managing NFS and NIS)
NFS: 1. Networking Fundamentals (Managing NFS and NIS)
bastion: 5.1. Some Firewall Definitions (Building Internet Firewalls)
12.7. Firewalls (TCP/IP Network Administration)
choosing: 8.1.1. Where Do I Put My Name Servers? (DNS and Bind)
configuration (see host configuration)
configuring: 6. Configuring Hosts (DNS and Bind)
consequences of: 6.3. Minimizing Pain and Suffering (DNS and Bind)
vendor-specific resolver configurations: 6.4. Vendor -Specific Options (DNS and Bind)
connectivity: 3.3.2.4. Using ping (Network Troubleshooting Tools)
CPU utilization and: 8.1.2. Capacity Planning (DNS and Bind)
determining aliases of: 16.1.6. Finding Out a Host's Aliases (DNS and Bind)
disambiguating: 6.3.3. Updating .rhosts, hosts.equiv, etc. (DNS and Bind)
displaying remote X Windows sessions on: 11.1.2. vnc (Network Troubleshooting Tools)
domain names for: 1.3. The Domain Name System in a Nutshell (DNS and Bind)
domains, binding: 3.3.8. NIS domains (Managing NFS and NIS)
dual-homed (see dual-homed hosts)
files: 3.3. Files managed under NIS (Managing NFS and NIS)
gated configuration: 7.7.1.1. A host configuration (TCP/IP Network Administration)
grouping, dhcpd.conf file: 9.5.1. dhcpd.conf (TCP/IP Network Administration)
host authentication: 11.1.3. ssh (Network Troubleshooting Tools)
host-monitoring tools: 8.1. What, When, and Where (Network Troubleshooting Tools)
8.2. Host-Monitoring Tools (Network Troubleshooting Tools)
8.6. Microsoft Windows (Network Troubleshooting Tools)
identification: 2.3.1. Known Hosts (SSH, The Secure Shell)
information mismatch, ifconfig: 13.2.1.4. Mismatched host information (Managing NFS and NIS)
information records (see HINFO records)
link-level addresses: 3.3.3. Problems with ping (Network Troubleshooting Tools)
listing information with nslookup: 10.1.4.1. nslookup and dig (Network Troubleshooting Tools)
local domain name, setting for: 4.7.3.1. Set the local domain name (DNS and Bind)
location of, listed in TXT records: 7.2.4.1. General text information (DNS and Bind)
loopback addresses: 9.2.4.2. Access control and the loopback address (SSH, The Secure Shell)
MAC addresses: 1.2.2. Ethernet addresses (Managing NFS and NIS)
multi-homed: 1.5.1.2. Routing datagrams (TCP/IP Network Administration)
multihomed (see multihomed hosts)
multiple: 10.6.1. Multiple Services or Multiple Hosts? (Building Internet Firewalls)
name collisions and: 1.2.1. The History of the Domain Name System (DNS and Bind)
names, and netgroups: 3.3.2. Netgroups (Managing NFS and NIS)
network interface interval for: 10.12.3.2. Interface interval (DNS and Bind)
ntop results: 8.3.1.1. Interactive mode (Network Troubleshooting Tools)
8.3.1.2. Web mode (Network Troubleshooting Tools)
peers: 3. Network Services (TCP/IP Network Administration)
pinging multiple hosts: 3.3.4.1. fping (Network Troubleshooting Tools)
relationships, trusted users and hosts: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
routing tables: 2.4. The Routing Table (TCP/IP Network Administration)
RP record for: 7.2.4.2. Responsible Person (DNS and Bind)
screened (see screened hosts)
security of: 1.4.3. Host Security (Building Internet Firewalls)
sorting traffic display by: 8.3.1.2. Web mode (Network Troubleshooting Tools)
speed of: 10.3.2. How Fast a Machine? (Building Internet Firewalls)
statistics for: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
traffic capture and: 5.2. Access to Traffic (Network Troubleshooting Tools)
trusted: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
12.2.5. Secure the r Commands (TCP/IP Network Administration)
values, exports file: 9.1.2.2. The /etc/exports file (TCP/IP Network Administration)
victim (see victim hosts)
views and: 10.6. Views (DNS and Bind)
virtual (Apache): 11.3.11. Defining Virtual Hosts (TCP/IP Network Administration)
HOSTS = (Distfiles): 9.6.2. rdist (TCP/IP Network Administration)
hosts and host management: 1.5. Host Management (Essential SNMP)
2.7. Host Management Revisited (Essential SNMP)
host OIDs: 2.7. Host Management Revisited (Essential SNMP)
polling
Net-SNMP: 8.1.2. Using Net-SNMP (Essential SNMP)
OpenView: 8.1.1. Using HP OpenView to Retrieve Values (Essential SNMP)
9.2.3.1. Designing collections (Essential SNMP)
Perl: 8.1. Retrieving a Single MIB Value (Essential SNMP)
8.2. Retrieving Multiple MIB Values (Essential SNMP)
in protocol stack: 2.1. SNMP and UDP (Essential SNMP)
querying: C.3.8. snmpdf (Essential SNMP)
retrieving hostnames in Perl: 8.1. Retrieving a Single MIB Value (Essential SNMP)
sending traps: 10.3. Sending Traps (Essential SNMP)
hosts database, directory services and: 2.1.1. The hosts database (Managing NFS and NIS)
hosts file: 3.2. The Host Table (TCP/IP Network Administration)
3.2. The Host Table (TCP/IP Network Administration)
bypassing, client: 3.1. Masters, slaves, and clients (Managing NFS and NIS)
empty: 6.4.1.3. Ignoring NIS (DNS and Bind)
ifconfig command and: 6.1. The ifconfig Command (TCP/IP Network Administration)
mask values, storing: 6.1.4. Assigning a Subnet Mask (TCP/IP Network Administration)
modifying, master server: 3.1. Masters, slaves, and clients (Managing NFS and NIS)
nicknames: 3.3.7. Map structure (Managing NFS and NIS)
NIS: 1. Networking Fundamentals (Managing NFS and NIS)
map: 3.1. Masters, slaves, and clients (Managing NFS and NIS)
NIS maps: 3.3.5. Network Information Service (TCP/IP Network Administration)
9.4. Network Information Service (TCP/IP Network Administration)
outages and: 8.6.2. Longer Outages (Days) (DNS and Bind)
hosts map
domains: 4.4. Managing multiple domains (Managing NFS and NIS)
qualified names: 5.3. Fully qualified and unqualified hostnames (Managing NFS and NIS)
RARP server and: 8.3.1. Reverse ARP requests (Managing NFS and NIS)
-hosts map, hierarchical mounts and: 9.5.2.1. The -hosts map (Managing NFS and NIS)
hosts.allow: 9.4. Forwarding Security: TCP-wrappers and libwrap (SSH, The Secure Shell)
9.4.1. TCP-wrappers Configuration (SSH, The Secure Shell)
9.4.2. Notes About TCP-wrappers (SSH, The Secure Shell)
12.5.1.1. tcpd access control files (TCP/IP Network Administration)
hosts.deny: 9.4. Forwarding Security: TCP-wrappers and libwrap (SSH, The Secure Shell)
12.5.1.1. tcpd access control files (TCP/IP Network Administration)
hosts.equiv: 3.3.1. Working with the maps (Managing NFS and NIS)
3.4.2.3.1. Trusted-host access files (SSH, The Secure Shell)
5.5.2.4. shosts access control (SSH, The Secure Shell)
recommended setup: 10.3.1. Disable Other Means of Access (SSH, The Secure Shell)
security considerations: 12.2.5. Secure the r Commands (TCP/IP Network Administration)
12.4.2. Looking for Trouble (TCP/IP Network Administration)
syntax: 3.4.2.3.2. Control file details (SSH, The Secure Shell)
updating: 6.3.3. Updating .rhosts, hosts.equiv, etc. (DNS and Bind)
hosts.lpd file, security considerations: 12.4.2. Looking for Trouble (TCP/IP Network Administration)
hosts.txt: 2.2.1. Directory Name Service (DNS) (Managing NFS and NIS)
HOSTS.TXT file: 1.2.1. The History of the Domain Name System (DNS and Bind)
network names and numbers and: 16.5. Network Names and Numbers (DNS and Bind)
hot fixes, and services: 12.5. Installing and Modifying Services (Building Internet Firewalls)
hourly charts of traffic: 8.4.3. cricket (Network Troubleshooting Tools)
housekeeping: 10.12.3. Maintenance Intervals (DNS and Bind)
26.1. Housekeeping (Building Internet Firewalls)
HP Extensible SNMP Agent: 5.1. SNMP Agents (Essential SNMP)
HP OpenView (see OpenView)
HP OpenView NNM (see OpenView Network Node Manager)
HP-UX operating system
agent software: 5.1. SNMP Agents (Essential SNMP)
configuring resolvers for: 6.4.3. HP's HP-UX (DNS and Bind)
NMS suites: 5.2. NMS Suites (Essential SNMP)
5.2. NMS Suites (Essential SNMP)
OpenView and: 7.3.3. HP OpenView Agent for HP-UX and Solaris (Essential SNMP)
supporting software: 5.5. Supporting Software (Essential SNMP)
trend-analysis software: 5.4. Trend Analysis (Essential SNMP)
vendor-specific software: 5.3. Element Managers (Vendor-Specific Management) (Essential SNMP)
hping packet tool
custom packet generation: 9.1.1. Custom Packets Generators (Network Troubleshooting Tools)
source web site: A.4. Sources for Tools (Network Troubleshooting Tools)
testing connectivity with: 9.1.1.1. hping (Network Troubleshooting Tools)
testing firewalls with: 12.2.1.1. Firewall testing (Network Troubleshooting Tools)
HS (Hesiod) class: 2.1.3. Resource Records (DNS and Bind)
htdocs directory (Solaris): 11.2.1. Configuring Apache on Solaris (TCP/IP Network Administration)
HTML: 2.2. The World Wide Web (Building Internet Firewalls)
form for sending messages: B.4. Using NNM for Communications (Essential SNMP)
in MRTG output: 13.1. Using MRTG (Essential SNMP)
13.2. Viewing Graphs (Essential SNMP)
paths for files: 13.2. Viewing Graphs (Essential SNMP)
titles on pages: 13.2. Viewing Graphs (Essential SNMP)
HTML pages of traffic patterns: 8.4.1. mrtg (Network Troubleshooting Tools)
http-gw proxy: 9.6.4. Other TIS FWTK Proxies (Building Internet Firewalls)
HTTP (Hypertext Transfer Protocol): 2.2. The World Wide Web (Building Internet Firewalls)
15. The World Wide Web (Building Internet Firewalls)
15.3.6. Securing HTTP (Building Internet Firewalls)
1.7. Application Layer (TCP/IP Network Administration)
client security: 15.2. HTTP Client Security (Building Internet Firewalls)
configuring: 24.2.1.1. HTTP and HTTPS (Building Internet Firewalls)
in screened subnet architecture: 24.1.1.1. HTTP and HTTPS (Building Internet Firewalls)
discovering support for (SNMPc): 6.2.2. Discovery and Filters (Essential SNMP)
MIME data subtype: 3.4.4. Multipurpose Internet Mail Extensions (TCP/IP Network Administration)
monitoring devices with HTTP servers: 7.3. Non-SNMP Approaches (Network Troubleshooting Tools)
network address translation in: 15.3.5. Network Address Translation Characteristics of HTTP (Building Internet Firewalls)
ntop traffic results: 8.3.1.2. Web mode (Network Troubleshooting Tools)
packet filtering in: 15.3.3. Packet Filtering Characteristics of HTTP (Building Internet Firewalls)
performance and security problems: 10.1.2. HTTP (Network Troubleshooting Tools)
ports: 6.2.2. nmap (Network Troubleshooting Tools)
6.3. Device Identification (Network Troubleshooting Tools)
proxying in: 15.3.4. Proxying Characteristics of HTTP (Building Internet Firewalls)
with TIS FWTK: 9.6.4. Other TIS FWTK Proxies (Building Internet Firewalls)
secure HTTP: 8.3.1.2. Web mode (Network Troubleshooting Tools)
server: 15.3.2. Special HTTP Servers (Building Internet Firewalls)
security of: 15. The World Wide Web (Building Internet Firewalls)
stack fingerprinting ports and: 6.3.2. queso (Network Troubleshooting Tools)
troubleshooting: 10.1.2. HTTP (Network Troubleshooting Tools)
tunneling: 15.3.1. HTTP Tunneling (Building Internet Firewalls)
using with databases: 23.1.1.4. Using a custom protocol to connect to a perimeter web server (Building Internet Firewalls)
web-based NMSs and: 3.3. A Look Ahead (Essential SNMP)
http_core.c (DSO module): 11.3.1. Loading Dynamic Shared Objects (TCP/IP Network Administration)
httpd processes, managing: 11.3.3. Managing the Swarm (TCP/IP Network Administration)
httpd.conf (Apache configuration file): 11.2. Configuring the Apache Server (TCP/IP Network Administration)
F. Solaris httpd.conf File (TCP/IP Network Administration)
access controls
document level controls: 11.4.4.4. Setting document-level access controls (TCP/IP Network Administration)
file level controls: 11.4.4.3. Setting file-level access controls (TCP/IP Network Administration)
overview: 11.4.4. Defining Access Controls (TCP/IP Network Administration)
user authentication: 11.4.4.1. Requiring user authentication (TCP/IP Network Administration)
configuration directives: 11.3.2. Basic Configuration Directives (TCP/IP Network Administration)
directives
configuration: 11.3.1. Loading Dynamic Shared Objects (TCP/IP Network Administration)
MIME file types: 11.3.6. Defining File Types (TCP/IP Network Administration)
dynamically loadable modules: 11.3.1. Loading Dynamic Shared Objects (TCP/IP Network Administration)
location of: 11.2. Configuring the Apache Server (TCP/IP Network Administration)
overview: 11.3. Understanding an httpd.conf File (TCP/IP Network Administration)
server options, controlling: 11.4.2. Controlling Server Options (TCP/IP Network Administration)
Solaris configuration: 11.2.1. Configuring Apache on Solaris (TCP/IP Network Administration)
web server document locations: 11.3.4. Defining Where Things Are Stored (TCP/IP Network Administration)
HTTPS: 15.3.6. Securing HTTP (Building Internet Firewalls)
configuring: 24.2.1.1. HTTP and HTTPS (Building Internet Firewalls)
in screened subnet architecture: 24.1.1.1. HTTP and HTTPS (Building Internet Firewalls)
hubs
compared to switches: 5.2. Access to Traffic (Network Troubleshooting Tools)
Ethernet vs Fast Ethernet: 17.2. Network partitioning hardware (Managing NFS and NIS)
networks: 17.2. Network partitioning hardware (Managing NFS and NIS)
point-monitoring tools and: 8.3. Point-Monitoring Tools (Network Troubleshooting Tools)
security and: 5.7.1. Switch Security (Network Troubleshooting Tools)
traffic capture and: 5.2. Access to Traffic (Network Troubleshooting Tools)
unmanaged hubs: 6.5. Mapping or Diagramming (Network Troubleshooting Tools)
human-readable object names (see OIDs)
HUP command, using with snmpd: 7.2.1.8. Agents and traps (Network Troubleshooting Tools)
HUP signals: 11.1. Net-SNMP (Essential SNMP)
7.1.3. Using Signals (DNS and Bind)
11.3. OpenView's Extensible Agent (Essential SNMP)
F.2.2.1. Using snmpusm to manage users (Essential SNMP)
hybrid NMS architectures: 3.2. NMS Architectures (Essential SNMP)
hybrid proxying (see routers, proxy-aware)
Hypertext Markup Language (HTML): 2.2. The World Wide Web (Building Internet Firewalls)
Hypertext Transfer Protocol (HTTP): 2.2. The World Wide Web (Building Internet Firewalls)
1.7. Application Layer (TCP/IP Network Administration)
HyperText Transport Protocol (see HTTP)
hyphen (-) in host names: 4.5. Host Name Checking (BIND 4.9.4 and Later Versions) (DNS and Bind)
hypotheses in troubleshooting: 12.1. Generic Troubleshooting (Network Troubleshooting Tools)


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Library Navigation Links

Copyright © 2002 O'Reilly & Associates, Inc. All Rights Reserved.







??????????????@Mail.ru