home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


CD HomeThe Networking CDSearch this CD

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: T

T command (sendmail): 10.5.5. Defining Trusted Users (TCP/IP Network Administration)
-t timeout parameter: C. Tunable Parameters (Managing NFS and NIS)
tab as resource record name: 4.4.3. Repeat Last Name (DNS and Bind)
table of counts: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
tables
adding columns: 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
get-bulk operations and: 2.6.3. The get-bulk Operation (Essential SNMP)
ifTable: 2.3.2. Defining OIDs (Essential SNMP)
2.3.2. Defining OIDs (Essential SNMP)
indexes: 2.3.2. Defining OIDs (Essential SNMP)
internal spaces in: 11.3.1. Tables (Essential SNMP)
OpenView agent and: 11.3.1. Tables (Essential SNMP)
integer indexes: 11.3.1. Tables (Essential SNMP)
writing MIB definitions: 11.3.1. Tables (Essential SNMP)
rows in: 2.3.2. Defining OIDs (Essential SNMP)
2.4. Extensions to the SMI in Version 2 (Essential SNMP)
in SNMP objects: 7.2.1.3. snmpgetnext, snmpwalk, and snmptable (Network Troubleshooting Tools)
snmptable: C.3.11. snmptable (Essential SNMP)
updating: 11.3.1. Tables (Essential SNMP)
Tabular Data Stream (TDS): 23.1.4. Tabular Data Stream (TDS) (Building Internet Firewalls)
tabular objects
data collection and: 9.2.3.1. Designing collections (Essential SNMP)
OIDs: 2.6.1. The get Operation (Essential SNMP)
8.4. Error Responses (Essential SNMP)
TACACS: 21.8. TACACS and Friends (Building Internet Firewalls)
tag parameter (gated): B.11. Aggregate Statements (TCP/IP Network Administration)
Tag registry key: 12.4.1.1. Registry keys (Building Internet Firewalls)
talk conferencing system: 13.4.2. One Connection per Session (Building Internet Firewalls)
19.3. talk (Building Internet Firewalls)
tapes, needs for: 10.3.3. What Hardware Configuration? (Building Internet Firewalls)
taps: 1.2.1.3. Information theft (Building Internet Firewalls)
1.2.1.3. Information theft (Building Internet Firewalls)
tar archives: 14.1. Obtaining and Installing Clients (SSH, The Secure Shell)
.tar files: A.1.1. Generic Installs (Network Troubleshooting Tools)
tar files, unpacking: 14.1.6. Install Okhapkin's SSH1 (SSH, The Secure Shell)
.tar.gz file: 4.1.2.1. Extracting the files (SSH, The Secure Shell)
targets (MRTG): 13.1. Using MRTG (Essential SNMP)
13.1. Using MRTG (Essential SNMP)
task (gated): B.4. Trace Statements (TCP/IP Network Administration)
Task Manager (taskmgr.exe): 2.3. Microsoft Windows (Network Troubleshooting Tools)
task-specific troubleshooting strategies: 12.2. Task-Specific Troubleshooting (Network Troubleshooting Tools)
taxonomy of software tools: A.2. Generic Sources (Network Troubleshooting Tools)
Tcl: 5.2. NMS Suites (Essential SNMP)
tclets: 6.4.1. Tcl/Tk and scotty (Network Troubleshooting Tools)
tclsh shell: 6.4.1. Tcl/Tk and scotty (Network Troubleshooting Tools)
Tcl/Tk language: 6.4.1. Tcl/Tk and scotty (Network Troubleshooting Tools)
books and resources: B.2.8. Scripting (Network Troubleshooting Tools)
Microsoft Windows port: 6.7.2. Other Tools for Windows (Network Troubleshooting Tools)
scotty: 6.4.1. Tcl/Tk and scotty (Network Troubleshooting Tools)
7.2.2. scotty (Network Troubleshooting Tools)
source web site: A.4. Sources for Tools (Network Troubleshooting Tools)
Tk extensions: 6.4.1. Tcl/Tk and scotty (Network Troubleshooting Tools)
tkined requirements: 6.5.1.2. Autodiscovery with tkined (Network Troubleshooting Tools)
TCP (see also Transmission Control Protocol)
1.4.1. TCP and UDP (Managing NFS and NIS)
compared to UDP: 2.1. SNMP and UDP (Essential SNMP)
delivery: 1.4.1. TCP and UDP (Managing NFS and NIS)
monitoring segments transmitted: 11.2.2. Added Extensibility for Windows NT (Essential SNMP)
NFS comparison: 7.2.7. NFS over TCP (Managing NFS and NIS)
NFS over: 18.1.4. NFS over TCP is your friend (Managing NFS and NIS)
PC/NFS and: 10.1. PC/NFS today (Managing NFS and NIS)
RARP and: 8.3.1. Reverse ARP requests (Managing NFS and NIS)
retrans mount parameter and: 18.1.2. Timeout period calculation (Managing NFS and NIS)
and RPC: 1.5.1. The client-server model (Managing NFS and NIS)
SNMP over: 2.1. SNMP and UDP (Essential SNMP)
sockets, sending messages across with ndc: 7.1.1. ndc and controls (BIND 8) (DNS and Bind)
specifying for commands (Net-SNMP): C.2. Common Command-Line Arguments (Essential SNMP)
TCP/IP
MIB-II information: 1.4. The Structure of Management Information and MIBS (Essential SNMP)
monitoring ports: 12.6. Port Monitor (Essential SNMP)
protocol suite: 2.1. SNMP and UDP (Essential SNMP)
throughput, bottlenecks and: 16.4.2.2. NFS/TCP versus NFS/UDP (Managing NFS and NIS)
TCP-based applications, enhanced with SSL: 1.6.7. SSL-Enhanced Telnet and FTP (SSH, The Secure Shell)
tcp-clients (named): C.2.5.1. The BIND 9 options statement (TCP/IP Network Administration)
TCP Explicit Congestion Notification support option (Linux kernel configuration): 5.1.3. Linux Kernel Configuration (TCP/IP Network Administration)
tcp option (fstab file): 9.1.3.2. The vfstab and fstab files (TCP/IP Network Administration)
tcp-reduce extraction tool: 5.5.4. tcp-reduce (Network Troubleshooting Tools)
8.3. Point-Monitoring Tools (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
TCP segment header: Appendix g.2. TCP Segment Header (TCP/IP Network Administration)
tcp-summary extraction tool: 5.5.4. tcp-reduce (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
TCP syncookie support option (Linux kernel configuration): 5.1.3. Linux Kernel Configuration (TCP/IP Network Administration)
TCP traffic
ACK packets: 6.2.2. nmap (Network Troubleshooting Tools)
active sessions: 8.3.1.2. Web mode (Network Troubleshooting Tools)
analysis: 5.5.7. tcptrace (Network Troubleshooting Tools)
capturing: 5.5.3. tcpflow (Network Troubleshooting Tools)
displaying service status: 2.1.3. netstat (Network Troubleshooting Tools)
filtering: 5.4.2.4.2. Protocol and port filtering. (Network Troubleshooting Tools)
following streams: 5.6.1.1. Using ethereal (Network Troubleshooting Tools)
generating with nemesis: 9.1.1.2. nemesis (Network Troubleshooting Tools)
headers: 4.2.3.1. ttcp (Network Troubleshooting Tools)
opening connections with NVT ASCII: 10.1. Application-Protocols Tools (Network Troubleshooting Tools)
plotting: 5.5.9. xplot (Network Troubleshooting Tools)
retrieving with tkined: 7.2.3.5. Other commands (Network Troubleshooting Tools)
sending with hping tool: 9.1.1.1. hping (Network Troubleshooting Tools)
TCP (Transmission Control Protocol)
(see also TCP)
4.3.1. TCP (Building Internet Firewalls)
9.2.1. Local Forwarding (SSH, The Secure Shell)
1.6.2. Transmission Control Protocol (TCP/IP Network Administration)
RPC and: 14.1. Remote Procedure Call (RPC) (Building Internet Firewalls)
application gateways and: 11.3.1.2. Application gateways (DNS and Bind)
desynchronization and hijacking attacks: 3.11.2. IP and TCP Attacks (SSH, The Secure Shell)
packet filtering in: 13.4.1. TCP Versus Other Protocols (Building Internet Firewalls)
port-forwarding connections, listing, escape sequence for: 2.3.2. The Escape Character (SSH, The Secure Shell)
proxying in: 13.4.1. TCP Versus Other Protocols (Building Internet Firewalls)
RPC services and: 1.5.3. Internet and RPC server configuration (Managing NFS and NIS)
RST attacks: 3.11.2. IP and TCP Attacks (SSH, The Secure Shell)
sequence numbers: 4.3.1.2. TCP sequence numbers (Building Internet Firewalls)
settings on SSH server, recommended: 10.3.2. /etc/sshd_config (SSH, The Secure Shell)
Virtual Circuits and: 12.3. Option Settings (DNS and Bind)
15.2.5. The _res Structure (DNS and Bind)
TCP window size: 4.2.3.1. ttcp (Network Troubleshooting Tools)
4.2.3.3. iperf (Network Troubleshooting Tools)
TCP Wrapper package: 11.4.1. Using the TCP Wrapper Package to Protect Services (Building Internet Firewalls)
B.6.2. TCP Wrapper (Building Internet Firewalls)
TCP-wrappers: 4.1.5.3. TCP/IP support (SSH, The Secure Shell)
9.4. Forwarding Security: TCP-wrappers and libwrap (SSH, The Secure Shell)
address/mask syntax: 9.4.1. TCP-wrappers Configuration (SSH, The Secure Shell)
configuration: 9.4.1. TCP-wrappers Configuration (SSH, The Secure Shell)
library, ftp source: 4.1.5.3. TCP/IP support (SSH, The Secure Shell)
services: 9.4.1. TCP-wrappers Configuration (SSH, The Secure Shell)
tcpd: 9.4. Forwarding Security: TCP-wrappers and libwrap (SSH, The Secure Shell)
tcpd program: 11.4.1. Using the TCP Wrapper Package to Protect Services (Building Internet Firewalls)
tcpd (security): 12.5.1.1. tcpd access control files (TCP/IP Network Administration)
tcpdchk: 9.4.2. Notes About TCP-wrappers (SSH, The Secure Shell)
tcpdchk testing tool: 11.2.3.1. tcpwrappers (Network Troubleshooting Tools)
tcpdmatch testing tool: 11.2.3.1. tcpwrappers (Network Troubleshooting Tools)
tcpdpriv privacy tool: 5.5.2. tcpdpriv (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
tcpdump tool: 5.4. tcpdump (Network Troubleshooting Tools)
analysis tools: 5.4.1. Using tcpdump (Network Troubleshooting Tools)
5.5. Analysis Tools (Network Troubleshooting Tools)
5.6.1. ethereal (Network Troubleshooting Tools)
in bottleneck analysis: 12.2.2.2. Bottleneck analysis (Network Troubleshooting Tools)
capturing RIP updates: 10.1.5. Routing (Network Troubleshooting Tools)
command-line options: 5.4.2. tcpdump Options (Network Troubleshooting Tools)
controlling display fields: 5.4.2.3. Controlling what's displayed (Network Troubleshooting Tools)
controlling information display: 5.4.2.2. Controlling how information is displayed (Network Troubleshooting Tools)
5.4.2.2. Controlling how information is displayed (Network Troubleshooting Tools)
controlling program behavior: 5.4.2.1. Controlling program behavior (Network Troubleshooting Tools)
5.4.2.1. Controlling program behavior (Network Troubleshooting Tools)
filtering options: 5.4.2.4. Filtering (Network Troubleshooting Tools)
Microsoft Windows: 5.8. Microsoft Windows (Network Troubleshooting Tools)
NFS usage: 10.1.6. NFS (Network Troubleshooting Tools)
one-line summaries in files: 5.5.4. tcp-reduce (Network Troubleshooting Tools)
replaying captured data: 5.4.2.1. Controlling program behavior (Network Troubleshooting Tools)
running: 5.4.1. Using tcpdump (Network Troubleshooting Tools)
source web site: A.4. Sources for Tools (Network Troubleshooting Tools)
tcpflow capture tool: 5.5.3. tcpflow (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
TCP/IP: 0.1. Who this book is for (Managing NFS and NIS)
on Windows NT: 12.4.5. Specific Windows NT Services to Disable (Building Internet Firewalls)
12.4.5. Specific Windows NT Services to Disable (Building Internet Firewalls)
architecture: 1.3. TCP/IP Protocol Architecture (TCP/IP Network Administration)
attacks: 3.11.2. IP and TCP Attacks (SSH, The Secure Shell)
books and resources: B.2.2. TCP/IP (Network Troubleshooting Tools)
compile-time configurable features: 4.1.5.3. TCP/IP support (SSH, The Secure Shell)
defined: 1. Overview of TCP/IP (TCP/IP Network Administration)
fiber optics and: 1.1. Networking overview (Managing NFS and NIS)
hardware independence: 1.1.1. TCP/IP Features (TCP/IP Network Administration)
history: 1.1. TCP/IP and the Internet (TCP/IP Network Administration)
ICMP (see ICMP)
ISO model and: 1.1. Networking overview (Managing NFS and NIS)
listening: an interface (SSH, The Secure Shell) 9.2.4.3. Listening on ("binding")
9.2.7. The Listening Port Number (SSH, The Secure Shell)
need for: 1.1.1. TCP/IP Features (TCP/IP Network Administration)
NetBIOS over: 14.3. NetBIOS over TCP/IP (NetBT) (Building Internet Firewalls)
network layer (7-layer model) and: 1.3. Network layer (Managing NFS and NIS)
packet: 4.1.1. TCP/IP/Ethernet Example (Building Internet Firewalls)
"binding" an interface: an interface (SSH, The Secure Shell) 9.2.4.3. Listening on ("binding")
reverse mappings: 5.4.3.7. Reverse IP mappings (SSH, The Secure Shell)
serial lines, overview: 6.2. TCP/IP Over a Serial Line (TCP/IP Network Administration)
stack fingerprinting: 6.3.1. Stack Fingerprinting (Network Troubleshooting Tools)
synchronous serial line: 1.1. Networking overview (Managing NFS and NIS)
weak implementations, exploiting: 4.8.2. Implementation Weaknesses (Building Internet Firewalls)
Windows configuration: 2.3. Microsoft Windows (Network Troubleshooting Tools)
TCP/IP networking option (Linux kernel configuration): 5.1.3. Linux Kernel Configuration (TCP/IP Network Administration)
TCP/IP protocol: Brief History of the Internet (DNS and Bind) 1.1. A (Very)
nslookup and: 12.3. Option Settings (DNS and Bind)
tcpproto.mc file: 10.4.1.1. Building a sendmail.cf with m4 macros (TCP/IP Network Administration)
tcpshow decoding tool: 5.5.5. tcpshow (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
tcpslice extraction tool: 5.5.6. tcpslice (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
tcptrace analysis tool: 5.5.7. tcptrace (Network Troubleshooting Tools)
8.3. Point-Monitoring Tools (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
tcpwrappers permissions tool
configuration: 2.2.5.2. Security files (Network Troubleshooting Tools)
logging in: 8.2. Host-Monitoring Tools (Network Troubleshooting Tools)
11.2.3.1. tcpwrappers (Network Troubleshooting Tools)
as security tool: 11.4. Security Tools (Network Troubleshooting Tools)
source web site: A.4. Sources for Tools (Network Troubleshooting Tools)
TDS (Tabular Data Stream): 23.1.4. Tabular Data Stream (TDS) (Building Internet Firewalls)
teardown packets: 5.4.2.4.3. Packet characteristics. (Network Troubleshooting Tools)
tech-c field (RIPE database): 4.2.1.2. Obtaining an IN-ADDR.ARPA domain (TCP/IP Network Administration)
Technical Specification (TS) standards: 1.1.2. Protocol Standards (TCP/IP Network Administration)
tee command: 5.4.1. Using tcpdump (Network Troubleshooting Tools)
11.1.1. Automating Documentation (Network Troubleshooting Tools)
Telebit NetBlazer: 8.5. Conventions for Packet Filtering Rules (Building Internet Firewalls)
Telnet: 2.5.1. Remote Terminal Access and Command Execution (Building Internet Firewalls)
8.7.1. Outbound Telnet Service (Building Internet Firewalls)
18.1. Terminal Access (Telnet) (Building Internet Firewalls)
configuring, in screened subnet architecture: 24.1.1.3. Telnet (Building Internet Firewalls)
inbound: 8.7.2. Inbound Telnet Service (Building Internet Firewalls)
vs. outbound: 18.1. Terminal Access (Telnet) (Building Internet Firewalls)
outbound: 8.7.1. Outbound Telnet Service (Building Internet Firewalls)
packet filtering characteristics of: 18.1.2. Packet Filtering Characteristics of Telnet (Building Internet Firewalls)
proxy services characteristics of: 18.1.3. Proxying Characteristics of Telnet (Building Internet Firewalls)
proxying with TIS FWTK: 9.6.2. Telnet and rlogin Proxying with TIS FWTK (Building Internet Firewalls)
Telnet commands: 12.6. Port Monitor (Essential SNMP)
telnet, search list and: 6.3.1. Differences in Service Behavior (DNS and Bind)
telnet, security risks of: 1.4.1. Secure Remote Logins (SSH, The Secure Shell)
Telstra: A.1.1. Telstra (Building Internet Firewalls)
temp-races: 6.3.4.1. Access control (SSH, The Secure Shell)
TempFileMode option (sendmail): 10.5.4. Setting Options (TCP/IP Network Administration)
temporary root name servers: 8.6.3. Really Long Outages ( Weeks) (DNS and Bind)
temporary swap files: 8.4. Managing client swap space (Managing NFS and NIS)
teraterm ssh tool: 11.5. Microsoft Windows (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
TERM signal: 7.1.3. Using Signals (DNS and Bind)
terminal, locking: 2.5. The SSH Agent (SSH, The Secure Shell)
terminal servers: 6.6. Terminal Servers and Modem Pools (Building Internet Firewalls)
16.5.1. CPU loading (Managing NFS and NIS)
Terminal Server/Services: 2.5.2. Remote Graphic Interfaces for Microsoft Operating Systems (Building Internet Firewalls)
terminal sessions, remote: 2.2. Remote Terminal Sessions with ssh (SSH, The Secure Shell)
terminated connections: 2.1.3. netstat (Network Troubleshooting Tools)
terminating connections, escape sequence for: 2.3.2. The Escape Character (SSH, The Secure Shell)
terminating ssh-agent: 6.3.2.1. Single-shell method (SSH, The Secure Shell)
termination code (chat): A.3. chat (TCP/IP Network Administration)
termination of SSH connections: 9.2.9. Termination (SSH, The Secure Shell)
termination on cables: 3.1.3.2. Cable testers (Network Troubleshooting Tools)
terminfo file: 9.2.2. Line Printer Service (TCP/IP Network Administration)
terminology, OSI model: 1.2. A Data Communications Model (TCP/IP Network Administration)
test commands (sendmail): 10.8.1. Testing Rewrite Rules (TCP/IP Network Administration)
test mode (dip): 6.3.2. Dial-Up PPP (TCP/IP Network Administration)
test networks: 6.7.1. Laboratory Networks (Building Internet Firewalls)
testing
adapters: 3.2. Testing Adapters (Network Troubleshooting Tools)
cabling: 3.1.3. Testing Cabling (Network Troubleshooting Tools)
chat scripts: 6.3.3. chat (TCP/IP Network Administration)
configuration files: 11.2.3.1. tcpwrappers (Network Troubleshooting Tools)
connectivity (see connectivity testing)
connectivity protocols (see connectivity protocols)
filters: 5.4.2.4.1. Address filtering. (Network Troubleshooting Tools)
firewalls: 8.8.8. It Should Have Good Testing and Validation Capabilities (Building Internet Firewalls)
9.1.1.2. nemesis (Network Troubleshooting Tools)
9.1.1.3. Other tools (Network Troubleshooting Tools)
12.2.1.1. Firewall testing (Network Troubleshooting Tools)
for directory status: 12.3. Throw Core (Essential SNMP)
hypotheses in troubleshooting: 12.1. Generic Troubleshooting (Network Troubleshooting Tools)
IMAP servers: 3.4.3. Internet Message Access Protocol (TCP/IP Network Administration)
IP addresses: 6.2.1. IP Address Management (Network Troubleshooting Tools)
NIS servers: 9.4. Network Information Service (TCP/IP Network Administration)
parameters in performance measurement: 12.2.2.1. General steps (Network Troubleshooting Tools)
performance (see performance measurement)
profiles: B.3. Profiles for Different Users (Essential SNMP)
reload of operating system: 27.5.6. Testing the Reload of the Operating System (Building Internet Firewalls)
routers: 6.7.1. Laboratory Networks (Building Internet Firewalls)
6.1.2. The netmon Process (Essential SNMP)
routing tables: 7.3.1. Adding Static Routes (TCP/IP Network Administration)
sendmail address rewrite rules: E.2. The sendmail Command (TCP/IP Network Administration)
sendmail configuration: E.2. The sendmail Command (TCP/IP Network Administration)
sendmail.cf file: 10.8. Testing sendmail.cf (TCP/IP Network Administration)
rewrite rules: 10.8.1. Testing Rewrite Rules (TCP/IP Network Administration)
software or hardware installations: 12.2.1. Installation Testing (Network Troubleshooting Tools)
thresholds and events: 9.2.3.2. Creating a threshold (Essential SNMP)
trap generation: 10.3.5. Forcing Your Hardware to Generate Traps (Essential SNMP)
tethereal (see ethereal)
tethereal packet capture tool: 5.6.1.1. Using ethereal (Network Troubleshooting Tools)
text
MIME data content type: 3.4.4. Multipurpose Internet Mail Extensions (TCP/IP Network Administration)
sendmail K command value: E.4.5. The sendmail K Command (TCP/IP Network Administration)
text queries: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
Text User Interface (TUI): 7.3.7. APC Symetra (Essential SNMP)
textual conventions
SMIv2: 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
SNMPv3: F.1.4. SNMPv3 Textual Conventions (Essential SNMP)
tftp-boot: 8.3.2. Getting a boot block (Managing NFS and NIS)
TFTP (Trivial File Transport Protocol): 2.4.1. File Transfer (Building Internet Firewalls)
17.2. Trivial File Transfer Protocol (TFTP) (Building Internet Firewalls)
8.3.2. Getting a boot block (Managing NFS and NIS)
15.3. Boot parameter confusion (Managing NFS and NIS)
/tftpboot directory, AdminSuite: 8.2. Setting up a diskless client (Managing NFS and NIS)
TGT (Ticket Granting Tickets), compile-time configuration: 4.1.5.7. Authentication (SSH, The Secure Shell)
TGT forwarding: 11.4.4.4. TGT forwarding (SSH, The Secure Shell)
.tgz files: A.1.1. Generic Installs (Network Troubleshooting Tools)
The Simple Times: 1.7. Getting More Information (Essential SNMP)
D. SNMP RFCs (Essential SNMP)
theft of information (see information theft)
therapy Port: 13.3. Table of Products (SSH, The Secure Shell)
third-level domains, choosing: 3.2.3. Back in the U.S.A. (DNS and Bind)
third-party attacks: 13.1.3. Third-Party Attacks (Building Internet Firewalls)
protecting against: 13.1.10. Protecting Services (Building Internet Firewalls)
threat assessment (security), types of threat: 12.1.1. Assessing the Threat (TCP/IP Network Administration)
three-way handshake: 1.6.2. Transmission Control Protocol (TCP/IP Network Administration)
thresholds
expanding or reducing in SNMPc: 9.2.4. Castle Rock's SNMPc (Essential SNMP)
netmon: 8.6. Microsoft Windows (Network Troubleshooting Tools)
OpenView
creating (NNM): 9.2.3.2. Creating a threshold (Essential SNMP)
data collection: 9.2.3. OpenView Data Collection and Thresholds (Essential SNMP)
events: 9.2.3.2. Creating a threshold (Essential SNMP)
10.2.2.2. Setting event categories (Essential SNMP)
monitoring in data collection: 9.2.3.1. Designing collections (Essential SNMP)
rearm parameter: 9.2.3.2. Creating a threshold (Essential SNMP)
setting with graphic input: 9.2.2. OpenView Graphing (Essential SNMP)
testing: 9.2.3.2. Creating a threshold (Essential SNMP)
polling and: 9. Polling and Thresholds (Essential SNMP)
RMON: 9.1.1. Remote Monitoring (RMON) (Essential SNMP)
8.5. RMON (Network Troubleshooting Tools)
absolute values: 9.1.1.1. RMON configuration (Essential SNMP)
alarms: 9.1.1. Remote Monitoring (RMON) (Essential SNMP)
delta values: 9.1.1.1. RMON configuration (Essential SNMP)
events: 9.1.1. Remote Monitoring (RMON) (Essential SNMP)
falling thresholds: 9.1.1.1. RMON configuration (Essential SNMP)
9.1.1.1. RMON configuration (Essential SNMP)
outbound octets: 9.1.1.1. RMON configuration (Essential SNMP)
rising thresholds: 9.1.1.1. RMON configuration (Essential SNMP)
9.1.1.1. RMON configuration (Essential SNMP)
setting minimums for servers: 12.5. Disk-Space Checker (Essential SNMP)
SNMPc
Automatic Alarms: 9.2.4. Castle Rock's SNMPc (Essential SNMP)
learning periods: 9.2.4. Castle Rock's SNMPc (Essential SNMP)
tkined settings: 7.2.3.1. ICMP monitoring (Network Troubleshooting Tools)
throughput: 4.2.1. Performance Measurements (Network Troubleshooting Tools)
achievable: 4.2.3. Throughput Measurements (Network Troubleshooting Tools)
bing results: 4.2.2.3. bing (Network Troubleshooting Tools)
bottlenecks
NFS writes: 16.4.2.1. NFS writes (NFS Version 2 versus NFS Version 3) (Managing NFS and NIS)
TCP and: 16.4.2.2. NFS/TCP versus NFS/UDP (Managing NFS and NIS)
UDP and: 16.4.2.2. NFS/TCP versus NFS/UDP (Managing NFS and NIS)
of connections: 3.3.2.2. Interpreting results (Network Troubleshooting Tools)
graphing averages: 8.3.1.2. Web mode (Network Troubleshooting Tools)
graphs: 5.5.7. tcptrace (Network Troubleshooting Tools)
measurements: 4.2. Path Performance (Network Troubleshooting Tools)
4.2.3. Throughput Measurements (Network Troubleshooting Tools)
iperf tool: 4.2.3.3. iperf (Network Troubleshooting Tools)
Microsoft Windows: 4.3. Microsoft Windows (Network Troubleshooting Tools)
netperf tool: 4.2.3.2. netperf (Network Troubleshooting Tools)
treno tool: 4.2.3.4. Other related tools (Network Troubleshooting Tools)
ttcp tool: 4.2.3.1. ttcp (Network Troubleshooting Tools)
ntop results: 8.3.1.1. Interactive mode (Network Troubleshooting Tools)
8.3.1.2. Web mode (Network Troubleshooting Tools)
server performance tuning: 16.5.4. Disk and filesystem throughput (Managing NFS and NIS)
throw core script: 12.3. Throw Core (Essential SNMP)
TI-RPC (Transport-Independent RPC): 1.5.3.1. Socket RPC and Transport Independent RPC (Managing NFS and NIS)
13.3.1.3. RPC version numbers (Managing NFS and NIS)
ticket forwarding, enabling in SSH: 10.7.3. AFS Access Problems (SSH, The Secure Shell)
tier-one providers: 1.1. TCP/IP and the Internet (TCP/IP Network Administration)
Tiger auditing package: 11.6. Running a Security Audit (Building Internet Firewalls)
B.2.2. Tiger (Building Internet Firewalls)
time-based passwords: 21.5. Kerberos (Building Internet Firewalls)
time-dependent behavior, bottlenecks and: 12.2.2.2. Bottleneck analysis (Network Troubleshooting Tools)
time sequence graphs: 5.5.7. tcptrace (Network Troubleshooting Tools)
time-series data: 8.4.2. rrd and the Future of mrtg (Network Troubleshooting Tools)
time service: 2.9.4. Time Service (Building Internet Firewalls)
time synchronization: 14.7. Time synchronization (Managing NFS and NIS)
11.3. NTP (Network Troubleshooting Tools)
time synchronization, TSIG and: 11.1.3. Configuring TSIG (DNS and Bind)
time to live (see TTL)
Time-To-Live counts (see TTL counts)
timeo mount parameter: 18.1.2. Timeout period calculation (Managing NFS and NIS)
retransmission rate threshold and: 18.1.3. Retransmission rate thresholds (Managing NFS and NIS)
slow servers and: 18.1.2. Timeout period calculation (Managing NFS and NIS)
timeo= option (vfstab file): 9.1.3.2. The vfstab and fstab files (TCP/IP Network Administration)
timeout command (dip): A.1.1. The dip Script File (TCP/IP Network Administration)
Timeout directive (Apache): 11.3.7. Performance Tuning Directives (TCP/IP Network Administration)
TIMEOUT keyword (chat): A.3. chat (TCP/IP Network Administration)
timeout option: 6.1.6. The options Directive (DNS and Bind)
timeout option (resolv.conf file): 8.2.1. The Resolver Configuration File (TCP/IP Network Administration)
Timeout settings (NNM): 6.1.3. Configuring Polling Intervals (Essential SNMP)
timeout, Solaris PPP: 6.3.6. Solaris PPP (TCP/IP Network Administration)
timeout values, sendmail: E.4.3. sendmail Options (TCP/IP Network Administration)
Timeout.queuereturn option (sendmail): 10.5.4. Setting Options (TCP/IP Network Administration)
timeouts
agent: 11.3. OpenView's Extensible Agent (Essential SNMP)
attribute: 6.3.3. Mount options (Managing NFS and NIS)
automounter and: 9.2.4. Tuning timeout values (Managing NFS and NIS)
calculating: 18.1.2. Timeout period calculation (Managing NFS and NIS)
errors: 3.4. Trace of a key match (Managing NFS and NIS)
major: 18.1.2. Timeout period calculation (Managing NFS and NIS)
minor: 18.1.2. Timeout period calculation (Managing NFS and NIS)
NFS and: 10.1.6. NFS (Network Troubleshooting Tools)
nslookup and: 12.1.2. Timeouts (DNS and Bind)
12.3. Option Settings (DNS and Bind)
resolver queries and: 6.1.4.1. One name server configured (DNS and Bind)
RPC procedures: 7.2.3. Request retransmission (Managing NFS and NIS)
SNMP options: 7.2.1.2. Configuration and options (Network Troubleshooting Tools)
in traceroute: 4.1.1. Options (Network Troubleshooting Tools)
timer (gated): B.4. Trace Statements (TCP/IP Network Administration)
times
DateAndTime convention: 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
encrypted: 21.1.2. Something You Know (Building Internet Firewalls)
including in traps: 10.3.4. Sending Traps with Net-SNMP (Essential SNMP)
TimeInterval convention: 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
TimeStamp convention: 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
units in polling intervals: 9.2.3.1. Designing collections (Essential SNMP)
timestamps
empty files: 4.2.3. Map file dependencies (Managing NFS and NIS)
extracting traffic data by: 5.5.6. tcpslice (Network Troubleshooting Tools)
in packets: 3.3.2.3. Options (Network Troubleshooting Tools)
5.5.1. sanitize (Network Troubleshooting Tools)
maps, modification: 3.3.7. Map structure (Managing NFS and NIS)
Net-SNMP options: C.3.7. snmpdelta (Essential SNMP)
synchronizing clocks: 11.3. NTP (Network Troubleshooting Tools)
tcpdump tool: 5.4.2.2. Controlling how information is displayed (Network Troubleshooting Tools)
TimeStamp textual convention: 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
in traps: 10.3. Sending Traps (Essential SNMP)
10.3.1. Sending Traps with OpenView (Essential SNMP)
troubleshooting printouts: 11.1.1. Automating Documentation (Network Troubleshooting Tools)
TIME_WAIT: 9.2.9.1. The TIME_WAIT problem (SSH, The Secure Shell)
11.2.5.3. FTP with the default data ports (SSH, The Secure Shell)
11.5.3. Another Approach: SSH-in-SSH(Port Forwarding) (SSH, The Secure Shell)
TIS Internet Firewalls Toolkit (TIS FWTK): B.1.1. TIS Internet Firewall Toolkit (FWTK) (Building Internet Firewalls)
11.3.1.2. Application gateways (DNS and Bind)
authentication server: 21.4.1. The TIS FWTK Authentication Server (Building Internet Firewalls)
ftp-gw-proxy server: 24.1.1.5. FTP (Building Internet Firewalls)
FTP proxy server: 17.1.2. Proxying Characteristics of FTP (Building Internet Firewalls)
HTTP proxying on, in screened subnet architecture: 24.1.1.1. HTTP and HTTPS (Building Internet Firewalls)
for proxying: 9.6. Using the TIS Internet Firewall Toolkit for Proxying (Building Internet Firewalls)
TIS (Trusted Information Systems): 5.5.1.8. TIS authentication (SSH, The Secure Shell)
compile-time configuration: 4.1.5.7. Authentication (SSH, The Secure Shell)
password authentication: 3.4.2.5. One-time passwords (SSH, The Secure Shell)
TIS Authentication: 5.5.1.8. TIS authentication (SSH, The Secure Shell)
Tivoli Netview: 5.2. NMS Suites (Essential SNMP)
tjping packet tool: 3.4. Microsoft Windows (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
Tk extensions: 6.4.1. Tcl/Tk and scotty (Network Troubleshooting Tools)
6.5.1.2. Autodiscovery with tkined (Network Troubleshooting Tools)
6.5.1.2. Autodiscovery with tkined (Network Troubleshooting Tools)
6.7.2. Other Tools for Windows (Network Troubleshooting Tools)
tkey-dhkey (named): C.2.5.1. The BIND 9 options statement (TCP/IP Network Administration)
tkey-domain (named): C.2.5.1. The BIND 9 options statement (TCP/IP Network Administration)
tkined management tool: 6.4. Scripts (Network Troubleshooting Tools)
6.4.1. Tcl/Tk and scotty (Network Troubleshooting Tools)
autodiscovery: 6.5.1.2. Autodiscovery with tkined (Network Troubleshooting Tools)
caveats: 7.2.3.6. Caveats (Network Troubleshooting Tools)
changing monitoring options: 7.2.3.1. ICMP monitoring (Network Troubleshooting Tools)
community strings and: 7.2.3.6. Caveats (Network Troubleshooting Tools)
examining MIBs: 7.2.3.3. Examining MIBs (Network Troubleshooting Tools)
ICMP monitoring: 7.2.3.1. ICMP monitoring (Network Troubleshooting Tools)
manually drawing maps: 6.5.1.1. Drawing maps with tkined (Network Troubleshooting Tools)
mapping networks: 6.5.1. tkined (Network Troubleshooting Tools)
Microsoft Windows: 6.7.2. Other Tools for Windows (Network Troubleshooting Tools)
7.4.2. SNMP Tools (Network Troubleshooting Tools)
monitoring SNMP objects: 7.2.3.4. Monitoring SNMP objects (Network Troubleshooting Tools)
performance measurements: 8.4. Network-Monitoring Tools (Network Troubleshooting Tools)
polling devices: 7.2.3.5. Other commands (Network Troubleshooting Tools)
reports: 7.2.3.5. Other commands (Network Troubleshooting Tools)
requirements: 6.5.1.2. Autodiscovery with tkined (Network Troubleshooting Tools)
saving changes in: 7.2.3.6. Caveats (Network Troubleshooting Tools)
SNMP traps: 7.2.3.2. SNMP traps (Network Troubleshooting Tools)
SNMP usage: 7.2.3. tkined (Network Troubleshooting Tools)
source web site: A.4. Sources for Tools (Network Troubleshooting Tools)
trouble menu information: 7.2.3.5. Other commands (Network Troubleshooting Tools)
Tkined suite: 5.2. NMS Suites (Essential SNMP)
TLAs (Top-Level Aggregators): 10.14. The ABCs of IPv6 Addressing (DNS and Bind)
TLDs (see top-level domains)
TLS (Transport Layer Security): and Secure Socket Layer (SSL) (Building Internet Firewalls) 14.7. Transport Layer Security (TLS)
Protocol (SSH, The Secure Shell) 1.6.6. Secure Socket Layer (SSL)
email and: 16.2.2. TLS/SSL, SSMTP, and STARTTLS (Building Internet Firewalls)
tmetric bandwidth tool: 4.2.2.2. pathchar (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
/tmp partitions, monitoring: 9.2.3.2. Creating a threshold (Essential SNMP)
TNG Framework: 5.2. NMS Suites (Essential SNMP)
tnm extensions (scotty): 6.4.1. Tcl/Tk and scotty (Network Troubleshooting Tools)
6.7.2. Other Tools for Windows (Network Troubleshooting Tools)
toasters controlled by SNMP: 7.2.1.4. snmpset (Network Troubleshooting Tools)
too many open files message: 7.6.1. Common Syslog Messages (DNS and Bind)
14.5.3. Name Server Reports "Too Many Open Files" (DNS and Bind)
Tool Command Language (see Tcl/Tk language)
tools: 6.1.2. Discovery and Mapping Tools (Network Troubleshooting Tools)
(see also specific types of tools, i.e., packet capture)
characteristics of management software: 6.1.1. Characteristics of Management Software (Network Troubleshooting Tools)
datestamping and versions: 1.3.1. Documentation (Network Troubleshooting Tools)
for firewalls: B. Tools (Building Internet Firewalls)
installing: A.1. Installing Software (Network Troubleshooting Tools)
inventories of contents: 1.3.1. Documentation (Network Troubleshooting Tools)
legal and ethical considerations: 1.3.2.3. Legal and ethical considerations (Network Troubleshooting Tools)
licenses: A.3. Licenses (Network Troubleshooting Tools)
network management tools in troubleshooting: 6.1. Troubleshooting Versus Management (Network Troubleshooting Tools)
preparing for problems: 1.2. Need for Troubleshooting Tools (Network Troubleshooting Tools)
for security incidents: 27.5.5. Keeping a Cache of Tools and Supplies (Building Internet Firewalls)
sources for: A.2. Generic Sources (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
taxonomy of: A.2. Generic Sources (Network Troubleshooting Tools)
ToolTalk: 14.6. ToolTalk (Building Internet Firewalls)
Top Gun SSH: 13.3. Table of Products (SSH, The Secure Shell)
Top-Level Aggregators (TLAs): 10.14. The ABCs of IPv6 Addressing (DNS and Bind)
top-level domains (TLDs): 2.1.2. Domains (DNS and Bind)
3.3.1. The Domain Hierarchy (TCP/IP Network Administration)
2.1.2. Domains (DNS and Bind)
2.2.1. Top-Level Domains (DNS and Bind)
choosing: 3.2.2. Where in the World Do I Fit? (DNS and Bind)
for international domains: 3.2.2. Where in the World Do I Fit? (DNS and Bind)
for U.S.domains: 3.2.3. Back in the U.S.A. (DNS and Bind)
examining structure of with nslookup: 3.2.2. Where in the World Do I Fit? (DNS and Bind)
generic (see gTLDs)
list of: D. Top-Level Domains (DNS and Bind)
subdomain names and: 9.3. What to Name Your Children (DNS and Bind)
top process display tool: 2.1.2. top (Network Troubleshooting Tools)
8.3.1. ntop (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
top utility: 8.1.2. Capacity Planning (DNS and Bind)
topology: 2.1. Addressing, Routing, and Multiplexing (TCP/IP Network Administration)
option (named): C.2.5. The options Statement (TCP/IP Network Administration)
problems, using maps to resolve: 6.5. Mapping or Diagramming (Network Troubleshooting Tools)
name server preferences and: 10.9. Preferring Name Servers on Certain Networks (DNS and Bind)
statements (dhcpd): D.3.1. Topology Statements (TCP/IP Network Administration)
trace command: 7.1.1. ndc and controls (BIND 8) (DNS and Bind)
trace files: 9.2.3.2. Creating a threshold (Essential SNMP)
trace_file (gated): B.4. Trace Statements (TCP/IP Network Administration)
trace_options (gated): B.4. Trace Statements (TCP/IP Network Administration)
traceoptions parameter
gated isis statement: B.8.3. The isis Statement (TCP/IP Network Administration)
gated ospf statement: B.8.1. The ospf Statement (TCP/IP Network Administration)
gated rip statement: B.8.2. The rip Statement (TCP/IP Network Administration)
gated smux statement: B.8.6. The smux Statement (TCP/IP Network Administration)
traceroute: 13.5.1. Tracing Routes (TCP/IP Network Administration)
diagnostic troubleshooting: 13.2. Diagnostic Tools (TCP/IP Network Administration)
2.9.3. Network Diagnostics (Building Internet Firewalls)
22.4.2. traceroute (Building Internet Firewalls)
complications: 4.1.2. Complications with traceroute (Network Troubleshooting Tools)
cyberkit suite: 6.7.1. Cyberkit (Network Troubleshooting Tools)
getif and: 7.4.2. SNMP Tools (Network Troubleshooting Tools)
identifying address ranges: 6.5. Mapping or Diagramming (Network Troubleshooting Tools)
loose source routing: 4.1.2. Complications with traceroute (Network Troubleshooting Tools)
options: 4.1.1. Options (Network Troubleshooting Tools)
path discovery with: 4.1. Path Discovery with traceroute (Network Troubleshooting Tools)
source web site: A.4. Sources for Tools (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
tracert tool: 4.3. Microsoft Windows (Network Troubleshooting Tools)
using with tkined: 6.5.1.2. Autodiscovery with tkined (Network Troubleshooting Tools)
tracert (see also traceroute program)
tracert routing tool: 4.1.2. Complications with traceroute (Network Troubleshooting Tools)
4.3. Microsoft Windows (Network Troubleshooting Tools)
tracing protocols, gated: B.1. The gated Command (TCP/IP Network Administration)
tracking
changes to systems with tripwire: 11.4.1. tripwire (Network Troubleshooting Tools)
FTP transfers: 2.1.4. lsof (Network Troubleshooting Tools)
IP addresses: 6.2.1. IP Address Management (Network Troubleshooting Tools)
log files: 11.2.2. Log File Management (Network Troubleshooting Tools)
open files on systems: 2.1.4. lsof (Network Troubleshooting Tools)
software installations: 1.3.1. Documentation (Network Troubleshooting Tools)
trade shows: B.1. Sources of Information (Network Troubleshooting Tools)
traffic: 8.1.2. Capacity Planning (DNS and Bind)
ethereal/tethereal: 14.4.1. ethereal / tethereal (Managing NFS and NIS)
filters and: 6.1.5. Using OpenView Filters (Essential SNMP)
generated by pathchar: 4.2.2.2. pathchar (Network Troubleshooting Tools)
graphing with MRTG: 13.2. Viewing Graphs (Essential SNMP)
internal polling and: 9.1. Internal Polling (Essential SNMP)
on lines, measuring (If%util): A. Using Input and Output Octets (Essential SNMP)
root name servers and: 2.6.1. Root Name Servers (DNS and Bind)
saturation points: A. Using Input and Output Octets (Essential SNMP)
setting thresholds for: 9. Polling and Thresholds (Essential SNMP)
snoop and: 13.5.1. snoop (Managing NFS and NIS)
affecting SRI-NIC host: 1.2.1. The History of the Domain Name System (DNS and Bind)
throughput improvements and: 4.2.3. Throughput Measurements (Network Troubleshooting Tools)
understanding current behavior: 1.2. Need for Troubleshooting Tools (Network Troubleshooting Tools)
volume: 16.1. Characterization of NFS behavior (Managing NFS and NIS)
traffic analysis attacks: 3.11.3. Traffic Analysis (SSH, The Secure Shell)
traffic capture tools: 5.1. Traffic Capture Tools (Network Troubleshooting Tools)
access to traffic: 5.2. Access to Traffic (Network Troubleshooting Tools)
analysis tools: 5.5. Analysis Tools (Network Troubleshooting Tools)
duplicating traffic on ports: 5.2. Access to Traffic (Network Troubleshooting Tools)
ethereal tool: 5.6.1.1. Using ethereal (Network Troubleshooting Tools)
filters: 5.4.2.4. Filtering (Network Troubleshooting Tools)
getif tool: 8.6.2. getif revisited (Network Troubleshooting Tools)
methods of capturing data: 5.3. Capturing Data (Network Troubleshooting Tools)
network-monitoring tools: 8.1. What, When, and Where (Network Troubleshooting Tools)
sanitizing captures: 5.5.1. sanitize (Network Troubleshooting Tools)
security issues: 5.7. Dark Side of Packet Capture (Network Troubleshooting Tools)
snapshots of data: 5.5.8. trafshow (Network Troubleshooting Tools)
snoop tool: 5.5.10. Other Packet Capture Programs (Network Troubleshooting Tools)
tcpdump tool: 5.4. tcpdump (Network Troubleshooting Tools)
traffic control configuration files: 2.2.5.2. Security files (Network Troubleshooting Tools)
traffic load generation (see load generators)
traffic measurement tools: 4.2. Path Performance (Network Troubleshooting Tools)
4.2.4. Traffic Measurements with netstat (Network Troubleshooting Tools)
busy hours and: 8.1. What, When, and Where (Network Troubleshooting Tools)
8.4.1. mrtg (Network Troubleshooting Tools)
as first step in performance measurement: 8.1. What, When, and Where (Network Troubleshooting Tools)
host-monitoring tools: 8.1. What, When, and Where (Network Troubleshooting Tools)
8.2. Host-Monitoring Tools (Network Troubleshooting Tools)
load generators (see load generators)
local vs. remote traffic: 8.3.1.2. Web mode (Network Troubleshooting Tools)
Microsoft Windows: 4.3. Microsoft Windows (Network Troubleshooting Tools)
network-monitoring tools: 8.4. Network-Monitoring Tools (Network Troubleshooting Tools)
point-monitoring tools: 8.1. What, When, and Where (Network Troubleshooting Tools)
8.3. Point-Monitoring Tools (Network Troubleshooting Tools)
traffic intervals and locations: 8.1. What, When, and Where (Network Troubleshooting Tools)
traffic monitors (see traffic capture tools)
trafshow capture tool: 5.5.8. trafshow (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
trailing dot (.): 4.2.4. SOA Records (DNS and Bind)
6.1.2. The Search List (DNS and Bind)
in domain names: 14.3.6. Missing Dot at the End of a Domain Name in a Zone Data File (DNS and Bind)
A.1. Master File Format (DNS and Bind)
importance of not omitting: 4.4.1. Appending Domain Names (DNS and Bind)
local domain name written without: 6.1.1. The Local Domain Name (DNS and Bind)
trailing spaces, BIND resolver and: 6.1.1. The Local Domain Name (DNS and Bind)
training costs: 1.3.2.4. Economic considerations (Network Troubleshooting Tools)
training courses: B.1. Sources of Information (Network Troubleshooting Tools)
transaction signatures (see TSIG)
transfer-format option (named): C.2.5. The options Statement (TCP/IP Network Administration)
transfer-format substatement: 10.12.1.6. More efficient zone transfers (DNS and Bind)
transfer-map NIS RPC call: 4.3.2. Changing NIS master servers (Managing NFS and NIS)
transfer rates in ttcp tool: 4.2.3.1. ttcp (Network Troubleshooting Tools)
transfer size, NFS version 3: 7.2.6. NFS Version 3 (Managing NFS and NIS)
transfer-source option (named): C.2.5. The options Statement (TCP/IP Network Administration)
transfer-source substatement: 10.15.1. Configuring the IPv4 Transport (DNS and Bind)
transfer-source-v6 substatement: 10.15.2. Configuring the IPv6 Transport (DNS and Bind)
10.15.2. Configuring the IPv6 Transport (DNS and Bind)
TransferOption field, NFS log record: 14.6. NFS server logging (Managing NFS and NIS)
transferring files (see files, transferring)
transferring maps
servers, existing: 4.3.2. Changing NIS master servers (Managing NFS and NIS)
ypxfr tool: 4.2.2. Regular map transfers (Managing NFS and NIS)
transfers-in option (named): C.2.5. The options Statement (TCP/IP Network Administration)
transfers-in substatement: 10.12.1.2. Limiting the total number of zone transfers requested (DNS and Bind)
E.2.11.1. limit transfers-in (DNS and Bind)
transfers-out option (named): C.2.5. The options Statement (TCP/IP Network Administration)
transfers-per-ns option (named): C.2.5. The options Statement (TCP/IP Network Administration)
transfers-per-ns substatement: 10.12.1.1. Limiting transfers requested per name server (DNS and Bind)
E.2.11.1. limit transfers-in (DNS and Bind)
E.2.11.2. limit transfers-per-ns (DNS and Bind)
TransferSize field, NFS log record: 14.6. NFS server logging (Managing NFS and NIS)
transformation field (sendmail rewrite rules): 10.6.2. Transforming the Address (TCP/IP Network Administration)
transformation metasymbols (sendmail): 10.6.2. Transforming the Address (TCP/IP Network Administration)
transforming addresses, sendmail: 10.6.2. Transforming the Address (TCP/IP Network Administration)
creating databases: 10.8.2. Using Key Files in sendmail (TCP/IP Network Administration)
databases: 10.6.2.1. Transforming with a database (TCP/IP Network Administration)
transitive mounts: 6.3.6. Resolving mount problems (Managing NFS and NIS)
translating (see mapping)
translating OID numbers to names: 7.2.1.5. snmptranslate (Network Troubleshooting Tools)
translation, IP addresses: 2.5. Address Resolution (TCP/IP Network Administration)
Transmission Control Protocol (see TCP)
2.1. SNMP and UDP (Essential SNMP)
0.10. Acknowledgments (SSH, The Secure Shell)
Transmission Control Protocol (TCP): 1.6.2. Transmission Control Protocol (TCP/IP Network Administration)
Transmission Control Protocol/Internet Protocol (see TCP/IP protocol)
transmission delays or times: 4.2.1. Performance Measurements (Network Troubleshooting Tools)
transmission order: A.2.5. Data Transmission Order (DNS and Bind)
transmission points, hidden or unknown: 4.2.2.2. pathchar (Network Troubleshooting Tools)
4.2.2.3. bing (Network Troubleshooting Tools)
transmission rates: 4.2.1. Performance Measurements (Network Troubleshooting Tools)
transmit lights: 3.1.3.1. Link lights (Network Troubleshooting Tools)
transparency: 5.3. Proxy Services (Building Internet Firewalls)
0. Preface (Managing NFS and NIS)
7. Network File System Design and Operation (Managing NFS and NIS)
9. Port Forwarding and X Forwarding (SSH, The Secure Shell)
of client changes for proxying: 9.2.1. Using Proxy-Aware Application Software for Proxying (Building Internet Firewalls)
transparent access, enabling: 12.1.2. Enabling transparent access (Managing NFS and NIS)
transparent proxying (see routers, proxy-aware)
transport endpoint, nfsd daemon and: 7.3.1. nfsd and NFS server threads (Managing NFS and NIS)
Transport-Independent RPC (TI-RPC): 1.5.3.1. Socket RPC and Transport Independent RPC (Managing NFS and NIS)
Transport Layer: 1.2. A Data Communications Model (TCP/IP Network Administration)
1.6. Transport Layer (TCP/IP Network Administration)
TCP: 1.6.2. Transmission Control Protocol (TCP/IP Network Administration)
UDP: 1.6.1. User Datagram Protocol (TCP/IP Network Administration)
transport layer (7-layer model): 1.4. Transport layer (Managing NFS and NIS)
Transport Layer (OSI Model): 1.2. A Data Communications Model (TCP/IP Network Administration)
Transport Layer Protocol: 3.5.1. Protocol Differences (SSH-1 Versus SSH-2) (SSH, The Secure Shell)
Transport Layer Security (see TLS)
transport-level protocols (see names of specific protocols)
transport-level services: 5.4.2.4.2. Protocol and port filtering. (Network Troubleshooting Tools)
transport services: 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
Trap Generator (Network Computing Technologies): 10.3.3. Sending Traps with Network Computing Technologies Trap Generator (Essential SNMP)
TRAP message (SNMP): 7.1. Overview of SNMP (Network Troubleshooting Tools)
Trap Receiver (Network Computing Technologies): 10.2.8. Using the Network Computing Technologies Trap Receiver (Essential SNMP)
TRAP-TYPE objects: 10. Traps (Essential SNMP)
10.1.1. SNMPv2 Traps (Essential SNMP)
10.3.5. Forcing Your Hardware to Generate Traps (Essential SNMP)
traps: 1.3. Managers and Agents (Essential SNMP)
2.6.6. SNMP Traps (Essential SNMP)
10.1.1. SNMPv2 Traps (Essential SNMP)
10.1.1. SNMPv2 Traps (Essential SNMP)
7.1. Overview of SNMP (Network Troubleshooting Tools)
acknowledging receipt: 2.6.8. SNMP inform (Essential SNMP)
C.3.14. snmpinform (Essential SNMP)
alerts for network problems: 7.1. Overview of SNMP (Network Troubleshooting Tools)
authentication-failure (see authentication-failure traps)
average numbers of: 10.2.2.4. Log messages, notifications, and automatic actions (Essential SNMP)
categories of: 10.1. Understanding Traps (Essential SNMP)
destinations, configuration of: 2.6.6. SNMP Traps (Essential SNMP)
Cisco: 7.3.6.1. Simple configuration (Essential SNMP)
Net-SNMP: 7.3.4.2. Creating a configuration by hand (Essential SNMP)
OpenView: 7.3.3.1. Simple configuration (Essential SNMP)
SystemEDGE: 7.3.5.1. Simple configuration (Essential SNMP)
UPS: 7.3.7. APC Symetra (Essential SNMP)
Windows agent: 7.3.1. Windows 95/98 Agent (Essential SNMP)
7.3.2. Windows NT 4.0 and Windows 2000 Agent (Essential SNMP)
displaying with Perl: 10.2.7. Monitoring Traps with Perl (Essential SNMP)
enterprise-specific: 2.6.6. SNMP Traps (Essential SNMP)
10.1.1. SNMPv2 Traps (Essential SNMP)
environmental monitor traps (Cisco): 7.3.6.2. Advanced configuration (Essential SNMP)
generating: 7.2.1.8. Agents and traps (Network Troubleshooting Tools)
generating with logins: 12.2. Who's Logging into My Machine? (I-Am-in) (Essential SNMP)
generic numbers: 2.6.6. SNMP Traps (Essential SNMP)
10.1.1. SNMPv2 Traps (Essential SNMP)
including times in (Net-SNMP): 10.3.4. Sending Traps with Net-SNMP (Essential SNMP)
inform mechanism: 2.6.8. SNMP inform (Essential SNMP)
C.3.14. snmpinform (Essential SNMP)
Microsoft Windows: 7.4.1. Windows SNMP Setup (Network Troubleshooting Tools)
monitoring applications with: 5.1. SNMP Agents (Essential SNMP)
OpenView
ignoring: 10.2.5. The Alarm Browser (Essential SNMP)
limiting sources: 10.2.2.1. Selecting event sources (Essential SNMP)
ÒLog onlyÓ option: 10.2.2.2. Setting event categories (Essential SNMP)
logging: 10.2.1. HP OpenView (Essential SNMP)
Òno formatÓ traps: 10.2.6. Creating Events Within OpenView (Essential SNMP)
ports: 2.1. SNMP and UDP (Essential SNMP)
receiving: 10.2. Receiving Traps (Essential SNMP)
Net-SNMP: 10.2.9. Receiving Traps Using Net-SNMP (Essential SNMP)
OpenView: 10.2.1. HP OpenView (Essential SNMP)
Perl: 10.2.7. Monitoring Traps with Perl (Essential SNMP)
SNMPv3: F.1.2. SNMPv3 Applications (Essential SNMP)
testing reception: 10.3.5. Forcing Your Hardware to Generate Traps (Essential SNMP)
Trap Receiver: 10.2.8. Using the Network Computing Technologies Trap Receiver (Essential SNMP)
redundant: 12.5. Disk-Space Checker (Essential SNMP)
RMON: 8.5. RMON (Network Troubleshooting Tools)
alarms and events: 9.1.1. Remote Monitoring (RMON) (Essential SNMP)
falling threshold alarms: 9.1.1. Remote Monitoring (RMON) (Essential SNMP)
9.1.1.1. RMON configuration (Essential SNMP)
9.1.1.1. RMON configuration (Essential SNMP)
logging: 9.1.1.1. RMON configuration (Essential SNMP)
rising threshold alarms: 9.1.1. Remote Monitoring (RMON) (Essential SNMP)
9.1.1.1. RMON configuration (Essential SNMP)
9.1.1.1. RMON configuration (Essential SNMP)
unidirectional traps: 9.1.1. Remote Monitoring (RMON) (Essential SNMP)
scotty trap handlers: 7.2.2. scotty (Network Troubleshooting Tools)
sending: 10.3. Sending Traps (Essential SNMP)
Cisco devices: 7.3.6. Cisco Devices (Essential SNMP)
forcing: 10.3.5. Forcing Your Hardware to Generate Traps (Essential SNMP)
hooks in programs: 10.3.6. Using Hooks with Your Programs (Essential SNMP)
Net-SNMP: 10.3.4. Sending Traps with Net-SNMP (Essential SNMP)
C.3.6. snmptrap (Essential SNMP)
F.2.2.3. Sending SNMPv3 traps with Net-SNMP (Essential SNMP)
OpenView: 10.3.1. Sending Traps with OpenView (Essential SNMP)
12.1. General Trap-Generation Program (Essential SNMP)
Perl: 10.3.2. Sending Traps with Perl (Essential SNMP)
12.1. General Trap-Generation Program (Essential SNMP)
E.2.5. snmptrap( ) (Essential SNMP)
SNMPv3: F.1.2. SNMPv3 Applications (Essential SNMP)
F.2.2.3. Sending SNMPv3 traps with Net-SNMP (Essential SNMP)
testing generation: 10.3.5. Forcing Your Hardware to Generate Traps (Essential SNMP)
Trap Generator: 10.3.3. Sending Traps with Network Computing Technologies Trap Generator (Essential SNMP)
sending messages with: B.4. Using NNM for Communications (Essential SNMP)
sequence of events in: 2.6.6. SNMP Traps (Essential SNMP)
server thresholds: 12.5. Disk-Space Checker (Essential SNMP)
SMIv2 extensions to: 2.4. Extensions to the SMI in Version 2 (Essential SNMP)
SNMP agents and: 7.2.1.8. Agents and traps (Network Troubleshooting Tools)
SNMP compatibility and: 4.1. What Does SNMP-Compatible Really Mean? (Essential SNMP)
snmptrap arguments: 10.3. Sending Traps (Essential SNMP)
snmptrap utility: 7.2.1.8. Agents and traps (Network Troubleshooting Tools)
snmptrapd utility: 7.2.1.8. Agents and traps (Network Troubleshooting Tools)
SNMPv3: 10.1.1. SNMPv2 Traps (Essential SNMP)
F.1.2. SNMPv3 Applications (Essential SNMP)
F.2.2.3. Sending SNMPv3 traps with Net-SNMP (Essential SNMP)
SNMPv1 and v2: 10.1.1. SNMPv2 Traps (Essential SNMP)
10.3.4. Sending Traps with Net-SNMP (Essential SNMP)
specific numbers: 10.3. Sending Traps (Essential SNMP)
timestamps: 10.3. Sending Traps (Essential SNMP)
tkined usage: 7.2.3.2. SNMP traps (Network Troubleshooting Tools)
trap-directed polling: 3.2. NMS Architectures (Essential SNMP)
UDP (see UDP)
unreceived traps: 2.1. SNMP and UDP (Essential SNMP)
2.6.6. SNMP Traps (Essential SNMP)
10.1. Understanding Traps (Essential SNMP)
12.5. Disk-Space Checker (Essential SNMP)
variable bindings: 2.6.6. SNMP Traps (Essential SNMP)
10.3. Sending Traps (Essential SNMP)
10.3.1. Sending Traps with OpenView (Essential SNMP)
10.3.2. Sending Traps with Perl (Essential SNMP)
trayping packet tool: 3.4. Microsoft Windows (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
treat-cr-as-space option (named): C.2.5. The options Statement (TCP/IP Network Administration)
trees, DNS: 20.1.3. DNS Data (Building Internet Firewalls)
trend analysis: 6.1.1. Characteristics of Management Software (Network Troubleshooting Tools)
8.5. RMON (Network Troubleshooting Tools)
12.2.2.3. Capacity planning (Network Troubleshooting Tools)
12.2.2.3. Capacity planning (Network Troubleshooting Tools)
trend-analysis software: 5.4. Trend Analysis (Essential SNMP)
treno bulk transfer tool: 4.2.3.4. Other related tools (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
triggered updates (routing): 7.4.1.1. Running RIP with routed (TCP/IP Network Administration)
trimlog program: B.6.10. trimlog (Building Internet Firewalls)
Trinagy TREND: 5.4. Trend Analysis (Essential SNMP)
Triple A server: 21. Authentication and Auditing Services (Building Internet Firewalls)
Triple-DES: 3.9.2.3. Triple-DES (SSH, The Secure Shell)
Triple DES algorithm: C.5.1. Encryption Algorithms (Building Internet Firewalls)
Tripwire (automated system monitoring): 12.4.3. Automated Monitoring (TCP/IP Network Administration)
tripwire integrity tool: 2. Host Configurations (Network Troubleshooting Tools)
11.4.1. tripwire (Network Troubleshooting Tools)
11.5. Microsoft Windows (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
Tripwire package: 11.6. Running a Security Audit (Building Internet Firewalls)
B.2.3. Tripwire (Building Internet Firewalls)
Trivial File Transport Protocol (see TFTP)
Trojan horse attacks, ICMP and: 22.4. ICMP and Network Diagnostics (Building Internet Firewalls)
Trojnara, Micha: 1.6.8. stunnel (SSH, The Secure Shell)
troubleshooting: 12.7. Troubleshooting nslookup Problems (DNS and Bind)
14. Troubleshooting DNS and BIND (DNS and Bind)
12. Troubleshooting and FAQ (SSH, The Secure Shell)
13.6. Checking Name Service (TCP/IP Network Administration)
basic ideas: 13.1.1. Troubleshooting Hints (TCP/IP Network Administration)
BIND 8/9 and: 14.4. Transition Problems (DNS and Bind)
books and resources: B.2.5. Troubleshooting (Network Troubleshooting Tools)
cache corruption: 13.6.3. Cache Corruption (TCP/IP Network Administration)
checking delegation: 9.6. Good Parenting (DNS and Bind)
connection closes after password prompt: 12.2.2.1. General authentication problems (SSH, The Secure Shell)
corrupted cache: 14.7.7. Can't Get Rid of Old Data (DNS and Bind)
data collection: 1. Network Management and Troubleshooting (Network Troubleshooting Tools)
debugging output and (see debugging)
diagnosing problems
breaking problems into pieces: 1.1. General Approaches to Troubleshooting (Network Troubleshooting Tools)
changes to systems: 1.1. General Approaches to Troubleshooting (Network Troubleshooting Tools)
data collection: 1. Network Management and Troubleshooting (Network Troubleshooting Tools)
general approaches: 1.1. General Approaches to Troubleshooting (Network Troubleshooting Tools)
dig debugging tool: 13.6.4. dig: An Alternative to nslookup (TCP/IP Network Administration)
dig utility: 12.9.1. dig's Output Format (DNS and Bind)
diskless clients: 8.6. Troubleshooting (Managing NFS and NIS)
documenting networks: 1.3.1. Documentation (Network Troubleshooting Tools)
documenting steps in: 11.1.1. Automating Documentation (Network Troubleshooting Tools)
effect on by setting ifconfig values: 6.1.3. Assigning an Address (TCP/IP Network Administration)
empty passwords refused: 12.2.2.2. Password authentication (SSH, The Secure Shell)
file locking: 11.3. Troubleshooting locking problems (Managing NFS and NIS)
firewall installation: 12.2.1.1. Firewall testing (Network Troubleshooting Tools)
installation: 12.2.1. Installation Testing (Network Troubleshooting Tools)
interoperability problems: 14.5. Interoperability and Version Problems (DNS and Bind)
logging telnet sessions: 11.1.1. Automating Documentation (Network Troubleshooting Tools)
management practices: 1.3. Troubleshooting and Management (Network Troubleshooting Tools)
name servers: 13.6. Checking Name Service (TCP/IP Network Administration)
cache corruption: 13.6.3. Cache Corruption (TCP/IP Network Administration)
slave servers: 13.6.2. The Data Is Here and the Server Can't Find It! (TCP/IP Network Administration)
spotty service: 13.6.1. Some Systems Work, Others Don't (TCP/IP Network Administration)
network access
arp command: 13.4.2. Troubleshooting with the arp Command (TCP/IP Network Administration)
ifconfig command: 13.4.1. Troubleshooting with the ifconfig Command (TCP/IP Network Administration)
netstat command: 13.4.3. Checking the Interface with netstat (TCP/IP Network Administration)
vs. network management: 6.1. Troubleshooting Versus Management (Network Troubleshooting Tools)
NFS client: B.2. NFS client problems (Managing NFS and NIS)
NFS server: B.1. NFS server problems (Managing NFS and NIS)
NIS problems: 14.1. Is NIS Really Your Problem? (DNS and Bind)
nslookup: 12.7. Troubleshooting nslookup Problems (DNS and Bind)
8.4. Using nslookup (TCP/IP Network Administration)
overview: 13.1. Approaching a Problem (TCP/IP Network Administration)
password authentication fails: 12.2.2.2. Password authentication (SSH, The Secure Shell)
ping command and: 13.3. Testing Basic Connectivity (TCP/IP Network Administration)
implementing: 13.3.1. The ping Command (TCP/IP Network Administration)
potential problems (list): 14.3. Potential Problem List (DNS and Bind)
preparing for problems: 1.2. Need for Troubleshooting Tools (Network Troubleshooting Tools)
preventing and handling disasters: 8.5. Planning for Disasters (DNS and Bind)
proactive nature of: 0. Preface (Network Troubleshooting Tools)
problem symptoms and: 14.7. Problem Symptoms (DNS and Bind)
protocols
ftp failure: 13.8. Protocol Case Study (TCP/IP Network Administration)
overview: 13.7. Analyzing Protocol Problems (TCP/IP Network Administration)
snoop: 13.7.1. Packet Filters (TCP/IP Network Administration)
recording command line sequences: 11.1.1. Automating Documentation (Network Troubleshooting Tools)
remote administrators, contacting: 13.5.2. Locating an Administrator (TCP/IP Network Administration)
RequiredAuthentications fails: 12.2.2.1. General authentication problems (SSH, The Secure Shell)
routing: 13.5. Checking Routing (TCP/IP Network Administration)
traceroute command: 13.5.1. Tracing Routes (TCP/IP Network Administration)
serial connections: 6.3.7. Troubleshooting Serial Connections (TCP/IP Network Administration)
SilentDeny: 12.2.2.1. General authentication problems (SSH, The Secure Shell)
slave servers: 13.6.2. The Data Is Here and the Server Can't Find It! (TCP/IP Network Administration)
spotty service: 13.6.1. Some Systems Work, Others Don't (TCP/IP Network Administration)
strategies
generic troubleshooting: 12.1. Generic Troubleshooting (Network Troubleshooting Tools)
task-specific strategies: 12.2. Task-Specific Troubleshooting (Network Troubleshooting Tools)
system configuration files: 2.2. System Configuration Files (Network Troubleshooting Tools)
tools (see tools)
A. Software Sources (Network Troubleshooting Tools)
tools and techniques for: 14.2. Troubleshooting Tools and Techniques (DNS and Bind)
TSIG errors: 14.6. TSIG Errors (DNS and Bind)
Tru64 Unix configuring resolvers for: 6.4.5. Compaq's Tru64 Unix and Digital Unix (DNS and Bind)
truncated packets: 12.3. Option Settings (DNS and Bind)
truncating packets: 5.4.2.1. Controlling program behavior (Network Troubleshooting Tools)
trunking: 13.2.1.3. Multiple interfaces (Managing NFS and NIS)
17.3.1. Switched networks (Managing NFS and NIS)
trust relationships: 2.2.1. Basic Configuration Files (Network Troubleshooting Tools)
2.2.5.2. Security files (Network Troubleshooting Tools)
TRUST_AUTH_MECH macro (sendmail): E.3. m4 sendmail Macros (TCP/IP Network Administration)
trusted host access, denying to specified hosts: 5.5.2.4. shosts access control (SSH, The Secure Shell)
trusted-host authentication: 5.5.1.4. Stronger trusted-host authentication (SSH, The Secure Shell)
batch and cron jobs: 11.1.3. Trusted-Host Authentication (SSH, The Secure Shell)
troubleshooting: 12.1.2. Server Debugging (SSH, The Secure Shell)
12.2.2.3. Trusted-host authentication (SSH, The Secure Shell)
trusted hosts: 12.2.5. Secure the r Commands (TCP/IP Network Administration)
client-to-client relationships: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
client-to-server relationships: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
server-to-client relationships: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
server-to-server relationships: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
Trusted Information Systems (see TIS)
0.10. Acknowledgments (SSH, The Secure Shell)
trusted-keys statement (named.conf file): C.2.3. The trusted-keys Statement (TCP/IP Network Administration)
trusted third parties: 3.5.1.3. Key/identity binding (SSH, The Secure Shell)
trusted users
client-to-client relationships: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
client-to-server relationships: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
server-to-client relationships: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
server-to-server relationships: 12.1.1. Trusted hosts and trusted users (Managing NFS and NIS)
trusted users command (sendmail): 10.5.5. Defining Trusted Users (TCP/IP Network Administration)
Trusted Users (generic-linux.cf section): 10.4.2. General sendmail.cf Structure (TCP/IP Network Administration)
trustedgateways parameter (gated): B.8.2. The rip Statement (TCP/IP Network Administration)
TRYAGAIN condition: 6.4.2. Sun's Solaris 2.x (DNS and Bind)
/tryflags command (sendmail): 10.8.1. Testing Rewrite Rules (TCP/IP Network Administration)
TS (Technical Specification) standards: 1.1.2. Protocol Standards (TCP/IP Network Administration)
TSIG record: 11.1.2. The TSIG Record (DNS and Bind)
TSIG-signed dynamic update: 10.2.4. TSIG-Signed Updates (DNS and Bind)
Windows2000 and: 16.8.3. Secure Dynamic Update (DNS and Bind)
TSIG (transaction signatures): 11.1. TSIG (DNS and Bind)
configuring: 11.1.3. Configuring TSIG (DNS and Bind)
troubleshooting: 14.6. TSIG Errors (DNS and Bind)
using: 11.1.4. Using TSIG (DNS and Bind)
ttcp load testing tool
generating loads with: 9.1.2. Load Generators (Network Troubleshooting Tools)
Microsoft Windows: 4.3. Microsoft Windows (Network Troubleshooting Tools)
source web site: A.4. Sources for Tools (Network Troubleshooting Tools)
uses: 4.2.3.1. ttcp (Network Troubleshooting Tools)
$TTL directive (zone files): 8.3.3.1. The $TTL directive (TCP/IP Network Administration)
C.3. Zone File Records (TCP/IP Network Administration)
TTL field: 3.3.2.2. Interpreting results (Network Troubleshooting Tools)
3.3.2.2. Interpreting results (Network Troubleshooting Tools)
4.1. Path Discovery with traceroute (Network Troubleshooting Tools)
9.1.1.1. hping (Network Troubleshooting Tools)
ttl field (resource records): C.3.1. Standard Resource Records (TCP/IP Network Administration)
ttl parameter
gated bgp statement: B.8.4. The bgp Statement (TCP/IP Network Administration)
gated egp statement: B.8.5. The egp Statement (TCP/IP Network Administration)
TTL (time to live): 2.7.1. Time to Live (DNS and Bind)
changing: 8.4. Changing TTLs (DNS and Bind)
configuring limits for: 10.12.4. TTLs (DNS and Bind)
default: 8.4. Changing TTLs (DNS and Bind)
8.4.1. Changing Other SOA Values (DNS and Bind)
BIND 8/9 and: 14.5.8. TTL Not Set (DNS and Bind)
setting for zones: 4.2.3. Setting the Zone's Default TTL (DNS and Bind)
lame: 10.12.4. TTLs (DNS and Bind)
minimum: 8.4.1. Changing Other SOA Values (DNS and Bind)
negative caching TTL value: 4.8.3. SOA Values (DNS and Bind)
root hints data and: 4.2.10. The Root Hints Data (DNS and Bind)
round robin load distribution and: 10.7. Round Robin Load Distribution (DNS and Bind)
ttl value (DNS resource records): 8.3.2. Standard Resource Records (TCP/IP Network Administration)
TTSSH: 13.3. Table of Products (SSH, The Secure Shell)
ttssh ssh extensions: 11.5. Microsoft Windows (Network Troubleshooting Tools)
A.4. Sources for Tools (Network Troubleshooting Tools)
tty
interactive vs. noninteractive connections: 8.2.9. Disabling TTY Allocation (SSH, The Secure Shell)
SSH_TTY: 8.2.9. Disabling TTY Allocation (SSH, The Secure Shell)
tty allocation: 7.4.5.5. Pseudo-terminal allocation (TTY/PTY/PTTY) (SSH, The Secure Shell)
disabling: 8.2.9. Disabling TTY Allocation (SSH, The Secure Shell)
TUI (Text User Interface): 7.3.7. APC Symetra (Essential SNMP)
tunable parameters: C. Tunable Parameters (Managing NFS and NIS)
tuning networks: 8.1. What, When, and Where (Network Troubleshooting Tools)
tunnel: 0.10. Acknowledgments (SSH, The Secure Shell)
1.4.6. Port Forwarding (SSH, The Secure Shell)
3.1.5. Forwarding ( Tunneling) (SSH, The Secure Shell)
creating: 9.2.1. Local Forwarding (SSH, The Secure Shell)
tunneling
HTTP: 15.3.1. HTTP Tunneling (Building Internet Firewalls)
multicast: 19.6. Multicast and the Multicast Backbone (MBONE) (Building Internet Firewalls)
SSH, of X Window System: 18.3.1. X11 Window System (Building Internet Firewalls)
tunneling option (Linux kernel configuration): 5.1.3. Linux Kernel Configuration (TCP/IP Network Administration)
turnkey network systems: 1.2. Need for Troubleshooting Tools (Network Troubleshooting Tools)
twisted pair cable: 3.2. Testing Adapters (Network Troubleshooting Tools)
Twofish algorithm: 3.9.2.6. Twofish (SSH, The Secure Shell)
TXT records: 7.2.4.1. General text information (DNS and Bind)
A.1.2. Types (DNS and Bind)
20.1.4.5. Revealing too much information to attackers (Building Internet Firewalls)
C.3.1.8. Text record (TCP/IP Network Administration)
query statistics for: 7.6.2.1. BIND 4.9 and 8 statistics (DNS and Bind)
secure_zone records and: 11.2.2.2. Restricting queries in a particular zone (DNS and Bind)
type field
inet.conf file: 5.3. The Internet Daemon (TCP/IP Network Administration)
resource records: C.3.1. Standard Resource Records (TCP/IP Network Administration)
Type field (sendmail): 10.5.8. Defining Mailers (TCP/IP Network Administration)
Type registry key: 12.4.1.1. Registry keys (Building Internet Firewalls)
type value (DNS resource records): 8.3.2. Standard Resource Records (TCP/IP Network Administration)


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Library Navigation Links

Copyright © 2002 O'Reilly & Associates, Inc. All Rights Reserved.