Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: S
- S command (sendmail): 10.6.3. The Set Ruleset Command
- SAINT (automated system monitoring): 12.4.3. Automated Monitoring
- Samba
- daemon: 9.3. Using Samba to Share Resources with Windows
- directory sharing: 9.3.1.2. Sharing directories through Samba
- name servers: 9.3.2. NetBIOS Name Service
- overview: 9.3. Using Samba to Share Resources with Windows
- passwords: 9.3.1. Configuring a Samba Server
- printer sharing: 3.5.2. Print Services
- 9.3.1.3. Sharing printers through Samba
- server, configuring: 9.3.1. Configuring a Samba Server
- SANS (System Administration, Networking and Security) Institute web site: 12.1.2.2. Use the network to distribute information
- SARA (automated system monitoring): 12.4.3. Automated Monitoring
- SAY command (chat): A.3. chat
- scalability
- address translation compared to proxy servers: 4.2.1. Obtaining an IP Address
- DNS: 3.3. DNS
- gateway hierarchy: 2.3. Internet Routing Architecture
- host tables: 3.2. The Host Table
- scaninterval (gated): B.6. Interface Statements
- ScoreBoardFile directives (httpd.conf file): 11.3.4. Defining Where Things Are Stored
- scp (secure copy): 12.2.6. Secure Shell
- screened subnet firewall architecture: 12.7. Firewalls
- ScriptAlias directive (httpd.conf file): 11.3.4. Defining Where Things Are Stored
- scripts, system initialization: 5.2.1.1. Understanding /etc/inittab
- search entry (resolv.conf file): 8.2.1. The Resolver Configuration File
- sec= option (vfstab file): 9.1.3.2. The vfstab and fstab files
- secondary servers: 3.3.4. BIND, Resolvers, and named
- secret field (chap-secrets file): 6.3.4. PPP Daemon Security
- secring.gpg file: 12.6.2. Public-Key Encryption Tools
- sec=type option (share command): 9.1.2.1. The share command
- secure servers, bastion hosts: 12.7. Firewalls
- security: A.3. chat
- access control
- language extensions: 12.5.1.3. Optional access control language extensions
- overview: 12.5. Access Control
- shell command: 12.5.1.2. Defining an optional shell command
- tcpd: 12.5.1.1. tcpd access control files
- aclok option (share command): 9.1.2.1. The share command
- address spoofing: 4.2.1. Obtaining an IP Address
- address translation: 4.2.1. Obtaining an IP Address
- applications
- removing unnecessary: 12.3.1. Remove Unnecessary Software
- updating: 12.3.2. Keep Software Updated
- authentication
- shadow password files: 12.2.1. The Shadow Password File
- ssh: 12.2.6. Secure Shell
- chat: A.3. chat
- dedicated connections and: 6.3.1. The PPP Daemon
- distributing responsibility: 12.1.2. Distributed Control
- subnets: 12.1.2.1. Use subnets to distribute control
- encryption: 12.6. Encryption
- public key: 12.6. Encryption
- public key tools: 12.6.2. Public-Key Encryption Tools
- stunnel: 12.6.2.1. stunnel
- symmetric: 12.6.1. When Is Symmetric Encryption Useful?
- firewalls
- filtering routers: 12.7.2. Filtering Traffic with iptables
- functions of: 12.7.1. Functions of the Firewall
- iptables command: 12.7.2.1. Defining iptables filter rules
- overview: 12.7. Firewalls
- information resources: 12.1.2.2. Use the network to distribute information
- Internet connection considerations: 4.1. Connected and Non-Connected Networks
- passwords
- one-time: 12.2.3. One-Time Passwords
- OPIE: 12.2.4. OPIE
- selecting: 12.2.2. Choosing a Password
- planning, overview: 12.1. Security Planning
- policies, creating: 12.1.3. Writing a Security Policy
- PPP: 6.3.4. PPP Daemon Security
- proxy servers: 4.2.1. Obtaining an IP Address
- r commands (Unix): 12.2.5. Secure the r Commands
- disabling: 12.2.6. Secure Shell
- resources: 12.8. Words to the Wise
- risks: 4.1. Connected and Non-Connected Networks
- types of: 12.1.1. Assessing the Threat
- Samba, encrypted passwords: 9.3.1. Configuring a Samba Server
- ssh: 12.2.6. Secure Shell
- system monitoring: 12.4.1. Know Your System
- find command: 12.4.2.1. Checking files
- intruder detection: 12.4.2. Looking for Trouble
- login activity: 12.4.2.2. Checking login activity
- trusted hosts: 12.2.5. Secure the r Commands
- user authentication: 12.2. User Authentication
- vendors, information mailing lists: 12.1.2.2. Use the network to distribute information
- web servers
- CGI scripts: 11.4.1. The CGI and SSI Threat
- overview: 11.4. Web Server Security
- SSI: 11.4.1. The CGI and SSI Threat
- security parameter (smb.config file): 9.3.1. Configuring a Samba Server
- segment header: Appendix g.2. TCP Segment Header
- segments: 1.3. TCP/IP Protocol Architecture
- format: 1.6.2. Transmission Control Protocol
- TCP headers: 1.6.2. Transmission Control Protocol
- SELECT command (IMAP): 3.4.3. Internet Message Access Protocol
- send command (dip): 6.3.2. Dial-Up PPP
- A.1.1. The dip Script File
- send (gated): B.4. Trace Statements
- sendbuffer parameter (gated): B.8.4. The bgp Statement
- Sender fields (sendmail): 10.5.8. Defining Mailers
- sendmail: 10.1. sendmail's Function
- 10.1. sendmail's Function
- E.1. Compiling sendmail
- aliases, overview: 10.3. sendmail Aliases
- classes
- E: 10.7.1. Modifying Local Information
- M: 10.7.1. Modifying Local Information
- P: 10.7.1. Modifying Local Information
- w: 10.7.1. Modifying Local Information
- command-line arguments: E.2. The sendmail Command
- compiling: E.1. Compiling sendmail
- configuration commands: 10.5. sendmail.cf Configuration Language
- configuration file
- creating with m4 macros: 10.4.1.1. Building a sendmail.cf with m4 macros
- local information: 10.7.1. Modifying Local Information
- modifying: 10.7. Modifying a sendmail.cf File
- Options section: 10.7.2. Modifying Options
- overview: 10.4. The sendmail.cf File
- samples: 10.4.1. Locating a Sample sendmail.cf File
- structure: 10.4.2. General sendmail.cf Structure
- testing: 10.8. Testing sendmail.cf
- testing rewrite rules: 10.8.1. Testing Rewrite Rules
- configuration options: 10.4.1.1. Building a sendmail.cf with m4 macros
- configuring
- define class command: 10.5.3. Defining Classes
- define macro command: 10.5.2. The Define Macro Command
- headers command: 10.5.7. Defining Mail Headers
- mailers command: 10.5.8. Defining Mailers
- overview: 10.5. sendmail.cf Configuration Language
- precedence command: 10.5.6. Defining Mail Precedence
- set option command: 10.5.4. Setting Options
- set ruleset command: 10.6.3. The Set Ruleset Command
- trusted users command: 10.5.5. Defining Trusted Users
- version level command: 10.5.1. The Version Level Command
- as daemon: 10.2. Running sendmail as a Daemon
- databases, address transformation: 10.8.2. Using Key Files in sendmail
- define m4 macro: E.3.1. define
- DOMAIN source file
- DNS features: E.3.4. DOMAIN
- DNS macros: E.3.4. DOMAIN
- FEATURE macro: E.3.2. FEATURE
- forwarding: 10.3.1. Personal Mail Forwarding
- installing: E.1. Compiling sendmail
- internal classes: E.4.2. sendmail Classes
- K command: E.4.5. The sendmail K Command
- m4 macros: E.3. m4 sendmail Macros
- macros, conditionals: 10.5.2.1. Conditionals
- mailer definitions: 10.5.8.1. Some common mailer definitions
- mailer flags: E.4.4. sendmail Mailer Flags
- MAILER source file: E.3.5. MAILER
- masquerading features: E.3.4. DOMAIN
- masquerading macros: E.3.4. DOMAIN
- options: E.4.3. sendmail Options
- OSTYPE macro: E.3.3. OSTYPE
- overview: 10.1. sendmail's Function
- queue processing time: 10.2. Running sendmail as a Daemon
- relay features: E.3.4. DOMAIN
- rewrite rules: 10.6. Rewriting the Mail Address
- pattern matching: 10.6.1. Pattern Matching
- transformation fields: 10.6.2. Transforming the Address
- transformation with database: 10.6.2.1. Transforming with a database
- SMTP, receiving: 10.2. Running sendmail as a Daemon
- source code distribution web site: 10.4.1. Locating a Sample sendmail.cf File
- spam macros: E.3.4. DOMAIN
- test commands: 10.8.1. Testing Rewrite Rules
- sendmail.cf file
- configuring: E.4. More sendmail.cf
- creating with m4 macros: 10.4.1.1. Building a sendmail.cf with m4 macros
- modifying
- local information: 10.7.1. Modifying Local Information
- Options section: 10.7.2. Modifying Options
- overview: 10.7. Modifying a sendmail.cf File
- overview: 10.4. The sendmail.cf File
- samples: 10.4.1. Locating a Sample sendmail.cf File
- structure: 10.4.2. General sendmail.cf Structure
- testing: 10.8. Testing sendmail.cf
- testing rewrite rules: 10.8.1. Testing Rewrite Rules
- Sequence Number field, TCP headers: 1.6.2. Transmission Control Protocol
- sequence (sendmail K command value): E.4.5. The sendmail K Command
- Serial Line IP protocol, BSD Unix support: 5.1.5.2. The pseudo-device statement
- serial lines
- connections, troubleshooting: 6.3.7. Troubleshooting Serial Connections
- overview: 6.2. TCP/IP Over a Serial Line
- protocols, SLIP: 6.2.1. The Serial Protocols
- serial ports, troubleshooting: 6.3.7. Troubleshooting Serial Connections
- serial-queries option (named): C.2.5. The options Statement
- server field
- chap-secrets file: 6.3.4. PPP Daemon Security
- inet.conf file: 5.3. The Internet Daemon
- server-identifier parameter (dhcpd): D.3.2. Configuration Parameters
- Server Message Block (SMB): 3.5.1. File Sharing
- server-name parameter (dhcpd): D.3.2. Configuration Parameters
- Server Selection (SRV) records: C.3.1.11. Server Selection record
- server setting (smb.config file): 9.3.1. Configuring a Samba Server
- Server Side Includes (see SSI)
- server statement (named.conf file): C.2.4. The server Statement
- server string parameter (smb.config file): 9.3.1. Configuring a Samba Server
- ServerAdmin defines (httpd.conf file): 11.3.2. Basic Configuration Directives
- ServerAdmin values (Apache), changing (Solaris): 11.2.1. Configuring Apache on Solaris
- ServerName (httpd.conf file): 11.3.2. Basic Configuration Directives
- ServerRoot directive (httpd.conf file): 11.3.2. Basic Configuration Directives
- servers: 11. Configuring Apache
- (see also Apache; web servers)
- caching-only: 8.1.1. BIND Configurations
- configuration: 8.3.1.1. A caching-only server configuration
- configuration: 3.6. Configuration Servers
- DHCP: 3.6.2. Dynamic Host Configuration Protocol
- RARP: 3.6.1. Reverse Address Resolution Protocol
- distributed, management: 9.6. Managing Distributed Servers
- DNS, authoritative: 3.3. DNS
- IMAP
- configuring: 9.7.2. IMAP Server
- testing: 3.4.3. Internet Message Access Protocol
- mail: 4.5.3. Planning Your Mail System
- master name: 8.1.1. BIND Configurations
- configuration: 8.3.1.2. Master and slave server configurations
- name, classifications: 3.3.4. BIND, Resolvers, and named
- NFS: 9.1. The Network File System
- POP, configuring: 9.7.1. POP Server
- PPP, configuring: 6.3.5. PPP Server Configuration
- root: 3.3.1. The Domain Hierarchy
- cache initialization files: 8.3.4. The Cache Initialization File
- Samba, configuring: 9.3.1. Configuring a Samba Server
- slave: 8.1.1. BIND Configurations
- configuration: 8.3.1.2. Master and slave server configurations
- TCP/IP networks compared to PC LAN servers: 3. Network Services
- ServerType directive (httpd.conf file): 11.3.2. Basic Configuration Directives
- service extensions, SMTP: 3.4.4. Multipurpose Internet Mail Extensions
- services file, NIS map: 9.4. Network Information Service
- Session Layer (OSI Model): 1.2. A Data Communications Model
- 1.2. A Data Communications Model
- set option command (sendmail): 10.5.4. Setting Options
- SetEnvIf directive (Apache): 11.4.5. Using Encryption
- setgid files, share command and: 9.1.2.1. The share command
- setuid files, share command and: 9.1.2.1. The share command
- sftp (secure shell): 12.2.6. Secure Shell
- shadow password files: 12.2.1. The Shadow Password File
- share command
- options: 9.1.2.1. The share command
- persistence: 9.1.2.1. The share command
- share setting (smb.config file): 9.3.1. Configuring a Samba Server
- shared media networks: 13.4.4. Subdividing an Ethernet
- shared-network statement (dhcpd): D.3.1. Topology Statements
- sharp sign (#)
- automounter comments: 9.1.4. NFS Automounter
- comments: 3.2. The Host Table
- comments in host table: 3.2. The Host Table
- inittab file: 5.2.1.1. Understanding /etc/inittab
- shell command
- dip: A.1.1. The dip Script File
- security: 12.5.1.2. Defining an optional shell command
- shell files, security considerations: 12.4.2. Looking for Trouble
- show-password option (pppd): A.2. The PPP Daemon
- showmount command: 9.1.3. Mounting Remote Filesystems
- showwarnings parameter (gated): B.8.4. The bgp Statement
- sig-validity-interval (named): C.2.5.1. The BIND 9 options statement
- SIGHUP
- gated signal processing: B.1.1. Signal Processing
- named signal processing: C.1.1. Signal Processing
- pppd signal processing: A.2.1. Signal Processing
- SIGILL (named signal processing): C.1.1. Signal Processing
- SIGINT
- gated signal processing: B.1.1. Signal Processing
- named signal processing: C.1.1. Signal Processing
- pppd signal processing: A.2.1. Signal Processing
- SIGKILL (gated signal processing): B.1.1. Signal Processing
- signal processing
- gated: B.1.1. Signal Processing
- named command: C.1.1. Signal Processing
- pppd: A.2.1. Signal Processing
- SIGSYS (named signal processing): C.1.1. Signal Processing
- SIGTERM
- gated signal processing: B.1.1. Signal Processing
- named signal processing: C.1.1. Signal Processing
- SIGUSR2
- named signal processing: C.1.1. Signal Processing
- pppd signal processing: A.2.1. Signal Processing
- SIGUSR2 (gated signal processing): B.1.1. Signal Processing
- SIGWINCH (named signal processing): C.1.1. Signal Processing
- silent option (pppd): A.2. The PPP Daemon
- Simple Mail Transfer Protocol (see SMTP)
- 3.4.1. Simple Mail Transfer Protocol
- simplex (gated): B.6. Interface Statements
- SITE macro (sendmail): E.3. m4 sendmail Macros
- SITECONFIG macro (sendmail): E.3. m4 sendmail Macros
- size bytes (gated): B.4. Trace Statements
- size field (lsmod command): 5.1.1. Using Dynamically Loadable Modules
- skey command (dip): A.1.1. The dip Script File
- slave servers: 3.3.4. BIND, Resolvers, and named
- 8.1.1. BIND Configurations
- configuring: 8.3.1.2. Master and slave server configurations
- 8.3.5. The named.local File
- sleep 2 command (dip): 6.3.2. Dial-Up PPP
- sleep command (dip): A.1.1. The dip Script File
- SLIP END character: 6.2.1. The Serial Protocols
- SLIP ESC character: 6.2.1. The Serial Protocols
- SLIP (Serial Line IP): 6.2.1. The Serial Protocols
- limitations: 6.2.1. The Serial Protocols
- SMB (Server Message Block): 3.5.1. File Sharing
- smb.conf file: 9.3.1. Configuring a Samba Server
- directory sharing: 9.3.1.2. Sharing directories through Samba
- global section: 9.3.1. Configuring a Samba Server
- home section: 9.3.1.1. The smb.conf homes section
- name server configuration: 9.3.2. NetBIOS Name Service
- printer sharing: 9.3.1.3. Sharing printers through Samba
- smbd command: 9.3. Using Samba to Share Resources with Windows
- smbpasswd file: 9.3.1. Configuring a Samba Server
- smtp8 mailer: 10.4.1.1. Building a sendmail.cf with m4 macros
- SMTP (Simple Mail Transfer Protocol): 1.7. Application Layer
- 3.4.1. Simple Mail Transfer Protocol
- commands: 3.4.1. Simple Mail Transfer Protocol
- source code: 3.4.1. Simple Mail Transfer Protocol
- viewing: E.2. The sendmail Command
- ESMTP (Extended SMTP): 3.4.4. Multipurpose Internet Mail Extensions
- private extensions to: 3.4.4. Multipurpose Internet Mail Extensions
- sendmail: 10.2. Running sendmail as a Daemon
- required macros: 10.4.1.1. Building a sendmail.cf with m4 macros
- service extensions: 3.4.4. Multipurpose Internet Mail Extensions
- 3.4.4. Multipurpose Internet Mail Extensions
- smux statement (gated): B.8.6. The smux Statement
- snoop
- diagnostic troubleshooting: 13.2. Diagnostic Tools
- troubleshooting protocols: 13.7.1. Packet Filters
- ftp failure: 13.8. Protocol Case Study
- Snort (automated system monitoring): 12.4.3. Automated Monitoring
- SOA (Start of Authority) records: C.3.1.1. Start of Authority record
- forward-mapping zone files: 8.3.7. The Forward-Mapping Zone File
- named.local file: 8.3.5. The named.local File
- reverse zone files: 8.3.6. The Reverse Zone File
- socket options parameter (smb.config file): 9.3.1. Configuring a Samba Server
- sockets: 1.2. A Data Communications Model
- 2.6.3. Sockets
- soft option (vfstab file): 9.1.3.2. The vfstab and fstab files
- Solaris
- AddModule directive, modules referenced: 11.3.1. Loading Dynamic Shared Objects
- Apache
- configuring: 11.2.1. Configuring Apache on Solaris
- Directory containers: 11.3.4. Defining Where Things Are Stored
- bootup: 5.1. Kernel Configuration
- broadcast addresses, setting: 6.1.5. Setting the Broadcast Address
- configuration files
- command-line option to override location: 11.3.2. Basic Configuration Directives
- syslog.conf: 3.2. The Host Table
- device drivers, installing: 5.1.1. Using Dynamically Loadable Modules
- dmesg command: 6.1.1. The Interface Name
- DSO modules: 11.3.1. Loading Dynamic Shared Objects
- dynamically loadable modules: 5.1.1. Using Dynamically Loadable Modules
- Ethernet, ifconfig command: 6.1. The ifconfig Command
- filesystem type, specifying: 9.1.3.1. The mount command
- hostname file: 6.1.3. Assigning an Address
- httpd.conf file: F. Solaris httpd.conf File
- configuration directives: 11.3.2. Basic Configuration Directives
- location: 11.2. Configuring the Apache Server
- ifconfig command, syntax: 6.1. The ifconfig Command
- IndexOptions directive (Apache): 11.3.5. Creating a Fancy Index
- kernel configuration: 5.1. Kernel Configuration
- loghost alias: 3.2. The Host Table
- mountall command: 9.1.3.2. The vfstab and fstab files
- named command, running: 8.3.8. Controlling the named Process
- netmasks file: 6.1.4. Assigning a Subnet Mask
- network interfaces, checking status: 6.1.2. Checking the Interface with ifconfig
- NFS, daemon locations: 9.1.1. NFS Daemons
- physical network address: 3.6.1. Reverse Address Resolution Protocol
- ping command option: 13.3.1. The ping Command
- point-to-point connections, defining: 6.1.6.6. Point-to-point
- PPP, configuring: 6.3.6. Solaris PPP
- printers, configuring: 9.2.2. Line Printer Service
- rc.script files: 6.1.6.7. Putting ifconfig in the startup scripts
- routed command, running: 7.4.1.1. Running RIP with routed
- routing metric, changing: 6.1.6.4. Metric
- routing tables: 2.4. The Routing Table
- runlevels: 5.2.1.1. Understanding /etc/inittab
- sendmail: 10.2. Running sendmail as a Daemon
- serial ports, troubleshooting: 6.3.7. Troubleshooting Serial Connections
- shadow password files: 12.2.1. The Shadow Password File
- share command: 9.1.2.1. The share command
- SMTP extensions: 3.4.4. Multipurpose Internet Mail Extensions
- static routing, adding to startup scripts: 7.3.1.1. Installing static routes at startup
- System V startup: 5.2.1.1. Understanding /etc/inittab
- vfstab files, options: 9.1.3.2. The vfstab and fstab files
- sortlist command: 8.2.1. The Resolver Configuration File
- sortlist entry (resolv.conf file): 8.2.1. The Resolver Configuration File
- sortlist option (named): C.2.5. The options Statement
- source field (RIPE database): 4.2.1.2. Obtaining an IN-ADDR.ARPA domain
- Source Port: 1.6.2. Transmission Control Protocol
- Source Port numbers (UDP): 1.6.1. User Datagram Protocol
- Source Quench Message (ICMP): 1.5.2. Internet Control Message Protocol
- sourcegateways parameter (gated): B.8.2. The rip Statement
- sourcenet parameter (gated): B.8.5. The egp Statement
- spam
- preventing (sendmail features): E.3.2. FEATURE
- sendmail macros: E.3.4. DOMAIN
- speed command (dip): 6.3.2. Dial-Up PPP
- A.1.1. The dip Script File
- SPF (Dijkstra Shortest Path First) algorithm: 7.4.3. Open Shortest Path First
- spf-interval parameter (gated): B.8.3. The isis Statement
- spoofing IP addresses: 4.2.1. Obtaining an IP Address
- squash entries (exports file): 9.1.2.2. The /etc/exports file
- srm.conf (Apache configuration file): 11.2. Configuring the Apache Server
- SRV (Server Selection) records: C.3.1.11. Server Selection record
- ssh-keygen (secure shell): 12.2.6. Secure Shell
- ssh (secure shell): 12.2.6. Secure Shell
- sshd (secure shell daemon): 12.2.6. Secure Shell
- SSI (Server Side Includes), security considerations: 11.4.1. The CGI and SSI Threat
- ssl CA certFile parameter (smb.config file): 9.3.1. Configuring a Samba Server
- SSL (Secure Sockets Layer)
- Apache: 11.4.5. Using Encryption
- certificates, creating: 11.4.5. Using Encryption
- SSLCertificateFile directive (Apache): 11.4.5. Using Encryption
- SSLCertificateKeyFile directive (Apache): 11.4.5. Using Encryption
- SSLEngine directive (Apache): 11.4.5. Using Encryption
- SSLOptions directive (Apache): 11.4.5. Using Encryption
- stab (sendmail K command value): E.4.5. The sendmail K Command
- stack (protocol): 1.2. A Data Communications Model
- headers: 1.3. TCP/IP Protocol Architecture
- stacksize option (named): C.2.5. The options Statement
- standard resource records: C.3.1. Standard Resource Records
- standards
- categories of: 1.1.2. Protocol Standards
- protocols: 1.1.1. TCP/IP Features
- 1.1.2. Protocol Standards
- standards track RFCs, maturity levels: 1.1.2. Protocol Standards
- start argument (sendmail): 10.2. Running sendmail as a Daemon
- Start of Authority (see SOA records)
- StartServers directive (Apache): 11.3.3. Managing the Swarm
- startup files: 7.3.1.1. Installing static routes at startup
- (see also bootup)
- gated: 7.7.2.1. Running gated at startup
- ifconfig command: 6.1.6.7. Putting ifconfig in the startup scripts
- inetd: 5.2.1.1. Understanding /etc/inittab
- mountall command: 9.1.3.2. The vfstab and fstab files
- sendmail: 10.2. Running sendmail as a Daemon
- static routing: 7.3.1.1. Installing static routes at startup
- Unix configuration: 5.2. Startup Files
- xinetd: 5.4. The Extended Internet Daemon
- STAT command (POP): 3.4.2. Post Office Protocol
- statd command: 9.1.1. NFS Daemons
- state (gated): B.4. Trace Statements
- static address assignment: 4.2.2. Assigning Host Addresses
- static routing: 7.1. Common Routing Configurations
- startup files: 7.3.1.1. Installing static routes at startup
- tables: 4.3. Planning Routing
- adding routes: 7.3.1. Adding Static Routes
- creating: 7.3. Building a Static Routing Table
- static statements (gated): B.9. static Statements
- statistics-file option (named): C.2.5. The options Statement
- statistics-interval option (named): C.2.5. The options Statement
- STDs (standards RFCs): 1.1.2. Protocol Standards
- stopbits command (dip): A.1.1. The dip Script File
- store and forward protocols: 3.4.1. Simple Mail Transfer Protocol
- STORE command (IMAP): 3.4.3. Internet Message Access Protocol
- stream field (inet.conf file): 5.3. The Internet Daemon
- streams: 1.3. TCP/IP Protocol Architecture
- strictinterfaces (gated): B.6. Interface Statements
- String value (dhcpd option statement): D.3.3. DHCP Options
- string values (printcap file): 9.2.1.1. The printcap file
- stub areas (OSPF hierarchy): 7.4.3. Open Shortest Path First
- stubhosts parameter (gated): B.8.1. The ospf Statement
- stunnel (public key encryption): 12.6.2.1. stunnel
- subdirectories, share command and: 9.1.2.1. The share command
- subdividing Ethernet segments: 13.4.4. Subdividing an Ethernet
- subdomains: 3.3.2. Creating Domains and Subdomains
- subject (DSN error code): 10.6.2. Transforming the Address
- subnet addresses: 2.2.2. Subnets
- subnet masks
- assigning, ifconfig command: 6.1.4. Assigning a Subnet Mask
- creating: 2.2.2. Subnets
- defining: 4.2.3. Defining the Subnet Mask
- 4.2.3. Defining the Subnet Mask
- distributing: 4.2.3. Defining the Subnet Mask
- RFCs: 2.2.2. Subnets
- system configuration: 4. Getting Started
- subnet security, distributing responsibility: 12.1.2.1. Use subnets to distribute control
- subnet statement (dhcpd): 9.5.1. dhcpd.conf
- D.3.1. Topology Statements
- subnetting
- need for: 4.2.2. Assigning Host Addresses
- organization purposes for: 4.2.3. Defining the Subnet Mask
- plans, RFCs: 4.2.1.1. Obtaining an official network address
- topological reasons for: 4.2.3. Defining the Subnet Mask
- summary-filter parameter (gated): B.8.3. The isis Statement
- summary-originate parameter (gated): B.8.3. The isis Statement
- switch (sendmail K command value): E.4.5. The sendmail K Command
- symbols
- gated trace statements: B.4. Trace Statements
- sendmail pattern matching: 10.6.1. Pattern Matching
- SymLinksIfOwnerMatch (Options directive setting): 11.4.2. Controlling Server Options
- symmetric encryption: 12.6. Encryption
- 12.6.1. When Is Symmetric Encryption Useful?
- SYN bit, TCP headers: 1.6.2. Transmission Control Protocol
- sync option (pppd): A.2. The PPP Daemon
- synchronization, TCP byte numbering: 1.6.2. Transmission Control Protocol
- sys value (share command): 9.1.2.1. The share command
- syslog (gated): B.5. Options Statements
- syslog parameter (gated): B.8.1. The ospf Statement
- syslog.conf configuration file: 3.2. The Host Table
- system administration
- defined: 1. Overview of TCP/IP
- distributed servers, managing: 9.6. Managing Distributed Servers
- system configuration
- end users, distributing to: 4.6. Informing the Users
- initialization scripts: 5.2.1.1. Understanding /etc/inittab
- planning: 4. Getting Started
- system file, Solaris configuration: 5.1.1. Using Dynamically Loadable Modules
- System V
- Line Printer configuration: 9.2.2. Line Printer Service
- vfstab files, options: 9.1.3.2. The vfstab and fstab files
- System V startup model: 5.2. Startup Files
- inittab file: 5.2.1.1. Understanding /etc/inittab
- runlevels: 5.2.1. Startup Runlevels
- systemid systemid parameter (gated): B.8.3. The isis Statement
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.
|