Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: S
- SAGE user group: B.1. Sources of Information
- sales information: 1.3.1. Documentation
- samspade tool: A.4. Sources for Tools
- Sanitize privacy scripts: 5.5.1. sanitize
- A.4. Sources for Tools
- satan scanning tool: 11.4. Security Tools
- saving changes in tkined: 7.2.3.6. Caveats
- scaling
- graphs: 8.4.1.1. mrtg configuration file
- scalability vs. raw capacity: 1.3.2.4. Economic considerations
- test networks: 9.2. Network Emulators and Simulators
- scanners, security: 11.4. Security Tools
- scanning tools
- security and politics: 6.6. Politics and Security
- uses: 2.1.7. Scanning Tools
- Windows tools: 2.3. Microsoft Windows
- scheduler in initialization: 2.2.4. Startup Files and Scripts
- scion statistics tool: 8.4. Network-Monitoring Tools
- A.4. Sources for Tools
- scotty management tool
- Microsoft Windows: 6.7.2. Other Tools for Windows
- SNMP usage: 7.2.2. scotty
- source web site: A.4. Sources for Tools
- tkined requirements: 6.5.1.2. Autodiscovery with tkined
- scrambling addresses in data: 5.5.2. tcpdpriv
- screen captures: 11.1.1. Automating Documentation
- 11.5. Microsoft Windows
- script command file output: 5.4.1. Using tcpdump
- 11.1.1. Automating Documentation
- scripts
- books and resources: B.2.8. Scripting
- extensible SNMP agents: 7.2.1.8. Agents and traps
- languages for device discovery: 6.1.2. Discovery and Mapping Tools
- MGEN and: 9.1.2.2. MGEN
- scripting tools
- network management: 6.4. Scripts
- network maps and: 6.5. Mapping or Diagramming
- startup: 2.2.4. Startup Files and Scripts
- secrecy in organizations: 1.3.2.1. Professionalism
- secure HTTP: 8.3.1.2. Web mode
- secure mode in syslog: 11.2.1.2. Remote logging
- secure syslog tool: 11.2.1.2. Remote logging
- A.4. Sources for Tools
- security configuration files: 2.2.5.2. Security files
- security issues
- books and resources: B.2.7. Security
- challenge response systems: 11.1.2. vnc
- compromised ps command: 2.1.7. Scanning Tools
- discovery tools and: 6.6. Politics and Security
- egos and: 1.3.2.2. Ego management
- expn and vrfy telnet commands: 10.1.1. Email
- levels in syslog: 11.2.1.1. Configuring syslog
- network management software: 6.1.1. Characteristics of Management Software
- packet capture and: 5. Packet Capture
- packet capture tools and: 5.7. Dark Side of Packet Capture
- ping and DOS attacks: 3.3.3.1. Security and ICMP
- protecting networks: 5.7.2. Protecting Yourself
- secrecy and: 1.3.2.1. Professionalism
- security tools: 11.4. Security Tools
- cops: 11.4. Security Tools
- iss: 11.4. Security Tools
- nmap: 11.4. Security Tools
- portscan: 11.4. Security Tools
- sanitize: 5.5.1. sanitize
- satan: 11.4. Security Tools
- system integrity checkers: 11.4. Security Tools
- tcpdpriv tool: 5.5.2. tcpdpriv
- tcpwrappers: 11.2.3.1. tcpwrappers
- 11.4. Security Tools
- tripwire: 11.4.1. tripwire
- segmented networks and: 5.2. Access to Traffic
- Smurf attacks: 3.3.3.2. Smurf Attacks
- SNMP security: 7.1. Overview of SNMP
- ssh tools: 11.1.3. ssh
- switches and: 5.7.1. Switch Security
- syslog files: 11.2.1.1. Configuring syslog
- TCP streams and: 5.6.1.1. Using ethereal
- testing firewalls: 12.2.1.1. Firewall testing
- web server configuration: 10.1.2. HTTP
- Windows and packet capture tools: 5.8. Microsoft Windows
- segmenting networks: 5.2. Access to Traffic
- selector fields in syslog configuration: 11.2.1.1. Configuring syslog
- send queues, displaying with netstat: 2.1.3. netstat
- sending email with telnet: 10.1.1. Email
- sendmail: B.2.3. Specific Protocols
- (see also email)
- books and resources: B.2.3. Specific Protocols
- configuration files: 2.2.5.1. Application files
- starting with scripts: 2.2.4. Startup Files and Scripts
- testing: 2.1.7. Scanning Tools
- serial connections with crossover cables: 3.2. Testing Adapters
- serial counters in servers: 10.1.4.1. nslookup and dig
- serial numbers of equipment: 1.3.1. Documentation
- servers
- checking email servers: 10.1.1. Email
- checking FTP performance: 10.1.3. FTP and TFTP
- checking HTTP servers: 10.1.2. HTTP
- debugging: 10.1. Application-Protocols Tools
- listing open files: 2.1.4. lsof
- name servers: 10.1.4.1. nslookup and dig
- 10.1.4.2. doc, dnswalk, and lamers
- NFS and: 10.1.6. NFS
- serial counters: 10.1.4.1. nslookup and dig
- stack fingerprinting and: 6.3.1. Stack Fingerprinting
- stratum 1 and 2 servers: 11.3. NTP
- synchronizing clocks on: 11.3. NTP
- troubleshooting name services: 10.1.4.1. nslookup and dig
- vnc servers: 11.1.2. vnc
- 11.1.2. vnc
- zone authority records: 10.1.4.1. nslookup and dig
- 10.1.4.1. nslookup and dig
- service contracts: 1.3.1. Documentation
- 1.3.2.4. Economic considerations
- B.1. Sources of Information
- services
- automatically starting services: 2.1.1. ps
- differential growth and: 12.2.2.3. Capacity planning
- displaying for hosts: 2.1.3. netstat
- filtering traffic: 5.4.2.4.2. Protocol and port filtering.
- protecting with tcpwrappers tool: 11.2.3.1. tcpwrappers
- run levels and: 2.2.4. Startup Files and Scripts
- types of in packets: 5.6.1.1. Using ethereal
- waiting for connection requests: 2.1.3. netstat
- SET_REQUEST messages (SNMP): 7.1. Overview of SNMP
- 7.2.1.1. snmpget
- 7.2.1.4. snmpset
- setting values with scotty (SNMP): 7.2.2. scotty
- setup packets: 5.4.2.4.3. Packet characteristics.
- SFS benchmarking tool: 10.1.6. NFS
- A.4. Sources for Tools
- shell scripts
- dig tool and: 10.1.4.1. nslookup and dig
- sanitize tool: 5.5.1. sanitize
- tclsh tool: 6.4.1. Tcl/Tk and scotty
- tcp-reduce tool: 5.5.4. tcp-reduce
- shutdown scripts: 2.2.4. Startup Files and Scripts
- shutting down interfaces: 2.1.5. ifconfig
- siggen checksum tool: 11.4.1. tripwire
- signatures for devices: 6.3.1. Stack Fingerprinting
- Simple Network Management Protocol (see SNMP)
- Simple Network Time Protocol (SNTP): 11.3. NTP
- simple watcher tool: 11.2.2. Log File Management
- simulations of system performance: 12.2.2. Performance Analysis and Monitoring
- simulators
- animating: 9.2.2. ns and nam
- benefits: 9.2. Network Emulators and Simulators
- ns and nam tools: 9.2.2. ns and nam
- uses: 9.2. Network Emulators and Simulators
- siphon fingerprinting tool: 6.3.1. Stack Fingerprinting
- A.4. Sources for Tools
- SLAC (Stanford Linear Accelerator Center): A.2. Generic Sources
- sl4nt syslog tool: A.4. Sources for Tools
- SMB (System Messaged Blocks): 6.6. Politics and Security
- SMI (Structure of Management Information): 7.1. Overview of SNMP
- SMS (Systems Management Server): 5.8. Microsoft Windows
- SMTP protocol: 10.1.1. Email
- Smurf attacks: 3.3.3.2. Smurf Attacks
- snapshots of traffic data: 5.5.8. trafshow
- SNMP for Perl 5 package: A.4. Sources for Tools
- SNMP Manager tool: 6.1.2. Discovery and Mapping Tools
- SNMP (Simple Network Management Protocol)
- basic operation and structures: 7.1. Overview of SNMP
- books and resources: B.2.3. Specific Protocols
- in bottleneck analysis: 12.2.2.2. Bottleneck analysis
- community strings: 6.6. Politics and Security
- 7.1. Overview of SNMP
- devices lacking support for: 7.2.3.1. ICMP monitoring
- examining MIBs with tkined: 7.2.3.3. Examining MIBs
- graphing objects: 8.6.2. getif revisited
- managers and agents: 7.1. Overview of SNMP
- Microsoft Windows: 7.4. Microsoft Windows
- mrtg usage of: 8.4.1. mrtg
- NET SNMP tool: 7.2. SNMP-Based Management Tools
- objects: 7.1. Overview of SNMP
- performance measurements: 8.4. Network-Monitoring Tools
- ports: 6.3. Device Identification
- RMON extensions: 8.5. RMON
- scotty tool: 7.2.2. scotty
- security issues: 7.1. Overview of SNMP
- SNMP Manager: 6.1.2. Discovery and Mapping Tools
- snmp.conf file: 7.2.1.2. Configuration and options
- SNMPv3: 7.1. Overview of SNMP
- SNMPv2 Classic, v2*, v2c, and v2u: 7.1. Overview of SNMP
- tkined tool: 7.2.3. tkined
- toasters controlled by: 7.2.1.4. snmpset
- traps: 7.2.3.2. SNMP traps
- troubleshooting routing tables: 10.1.5. Routing
- versions: 7.1. Overview of SNMP
- 7.2.1. NET SNMP (UCD SNMP)
- snmp.conf file: 7.2.1.2. Configuration and options
- snmpd agent: 7.2.1.8. Agents and traps
- snmpd.conf file: 7.2.1.8. Agents and traps
- snmpget utility: 7.2.1.1. snmpget
- snmpgetnext utility: 7.2.1.1. snmpget
- 7.2.1.3. snmpgetnext, snmpwalk, and snmptable
- snmpnetstat utility: 7.2.1.6. snmpnetstat
- SNMP_Session.pm extension: 6.4. Scripts
- snmpset utility: 7.2.1.1. snmpget
- 7.2.1.4. snmpset
- snmpstatus utility: 7.2.1.7. snmpstatus
- snmptable utility: 7.2.1.3. snmpgetnext, snmpwalk, and snmptable
- snmptranslate utility: 7.2.1.5. snmptranslate
- 8.5. RMON
- snmptrap utility: 7.2.1.8. Agents and traps
- snmptrapd daemon: 7.2.1.8. Agents and traps
- snmpwalk utility: 7.2.1.3. snmpgetnext, snmpwalk, and snmptable
- snoop tool: 5.5.10. Other Packet Capture Programs
- SNTP (Simple Network Time Protocol): 11.3. NTP
- sntpd clock tools: 11.3. NTP
- sock traffic tool: 9.1.1.3. Other tools
- A.4. Sources for Tools
- socket TCP tool: 9.1.1.3. Other tools
- A.4. Sources for Tools
- sockets
- buffer size: 4.2.3.3. iperf
- displaying for connections: 2.1.3. netstat
- snmpnetstat results: 7.2.1.6. snmpnetstat
- software
- connectivity: 3.3. Software Testing with ping
- installation troubleshooting: 12.2.1. Installation Testing
- tools (see tools, names of specific tools)
- Solaris systems
- changing kernel parameters: 2.2.3. Kernel
- configuration files: 2.2.1. Basic Configuration Files
- installing packages: A.1.2. Solaris Packages
- kernel directives: 2.2.3. Kernel
- packet capture: 5.5.10. Other Packet Capture Programs
- ping tools: 3.3.2.1. Simple examples
- Solstice AdminSuite tool: 2.2.2. Configuration Programs
- solutions in troubleshooting: 12.1. Generic Troubleshooting
- 12.2.2.2. Bottleneck analysis
- sorting ntop results: 8.3.1.1. Interactive mode
- 8.3.1.2. Web mode
- source addresses
- arbitrary addresses in hping: 9.1.1.1. hping
- filtering: 5.4.2.4.1. Address filtering.
- nemesis settings: 9.1.1.2. nemesis
- source code
- comments in: B.1. Sources of Information
- downloading: A.1.1. Generic Installs
- source routing: 4.1. Path Discovery with traceroute
- 4.1.2. Complications with traceroute
- sources for tools: A.4. Sources for Tools
- sources of information: B.1. Sources of Information
- spanning ports: 5.2. Access to Traffic
- spanning tree protocols: 5.4.2.3. Controlling what's displayed
- SPEC SFS tool: 10.1.6. NFS
- speeds of interfaces: 8.4.1.1. mrtg configuration file
- spidermap scanning scripts: 6.4. Scripts
- A.4. Sources for Tools
- spoofed addresses: 6.2.2. nmap
- hping settings: 9.1.1.1. hping
- 9.1.1.1. hping
- nmap settings: 6.2.2. nmap
- preventing with ssh: 11.1.3. ssh
- in Smurf attacks: 3.3.3.2. Smurf Attacks
- 3.3.3.2. Smurf Attacks
- source routing and: 4.1.2. Complications with traceroute
- spoofing syslog messages: 11.2.1.2. Remote logging
- spray packet tool: 4.2.4. Traffic Measurements with netstat
- 9.1.2.1. spray
- 12.2.2.2. Bottleneck analysis
- A.4. Sources for Tools
- SQL databases, logging data to: 8.3.1.2. Web mode
- ssh tools: 11.1.3. ssh
- A.4. Sources for Tools
- books and resources: B.2.3. Specific Protocols
- extensions: A.4. Sources for Tools
- Microsoft Windows: 11.5. Microsoft Windows
- monitoring devices with: 7.3. Non-SNMP Approaches
- remote probing with: 5.2. Access to Traffic
- source web site: A.4. Sources for Tools
- A.4. Sources for Tools
- vnc in ssh sessions: 11.1.2. vnc
- ssyslog log tool: 11.2.1.2. Remote logging
- A.4. Sources for Tools
- stack fingerprinting
- nmap tool: 6.2.2. nmap
- 6.3.3. nmap Revisited
- passive fingerprinting: 6.3.1. Stack Fingerprinting
- queso tool: 6.3.2. queso
- uses: 6.3.1. Stack Fingerprinting
- standard configuration files: 2.2.1. Basic Configuration Files
- Stanford Linear Accelerator Center (SLCA): A.2. Generic Sources
- starting ports for traceroute: 4.1.1. Options
- startup files: 2.2.4. Startup Files and Scripts
- states, booting into: 2.2.4. Startup Files and Scripts
- static entries
- in ARP tables: 2.1.6. arp
- in routing tables: 2.1.3. netstat
- static IP addresses: 6.2.1. IP Address Management
- status lights: 3.1.3.1. Link lights
- stealth port scanners: 2.1.7. Scanning Tools
- 6.2.2. nmap
- stealth scanning: 6.7. Microsoft Windows
- step size in packets: 4.2.2.2. pathchar
- steps in troubleshooting (see strategies for troubleshooting)
- store-and-forward switches: 4.2.2.2. pathchar
- 4.2.2.2. pathchar
- storing log files: 11.2.2. Log File Management
- strategies for troubleshooting
- generic troubleshooting: 12.1. Generic Troubleshooting
- installation practices and: 12.2.1. Installation Testing
- task-specific strategies: 12.2. Task-Specific Troubleshooting
- stratum 1 and 2 servers: 11.3. NTP
- streams
- capturing: 5.5.3. tcpflow
- following: 5.6.1.1. Using ethereal
- stress-testing networks: 4.2.4. Traffic Measurements with netstat
- 9.1. Packet Injection Tools
- strict source routing: 4.1.2. Complications with traceroute
- strings analysis tool: 5.4.2.3. Controlling what's displayed
- stripcharts in tkined: 7.2.3.1. ICMP monitoring
- strobe port tool: 2.1.7. Scanning Tools
- A.4. Sources for Tools
- Structure of Management Information (SMI): 7.1. Overview of SNMP
- subnet masks
- address masks in interfaces: 2.1.5. ifconfig
- in ARP tables: 2.1.6. arp
- packet headers: 5.4.2.4.3. Packet characteristics.
- 5.4.2.4.3. Packet characteristics.
- port scanning and: 6.2.2. nmap
- in routing tables: 2.1.3. netstat
- stack fingerprinting: 6.3.2. queso
- wildcards in (*): 6.2.2. nmap
- subnets
- collapsing in diagrams: 6.5.1.1. Drawing maps with tkined
- emulators: 9.2. Network Emulators and Simulators
- ntop results and: 8.3.1.2. Web mode
- substituting subsystems: 1.1. General Approaches to Troubleshooting
- subsystems
- identifying in troubleshooting: 12.1. Generic Troubleshooting
- substituting: 1.1. General Approaches to Troubleshooting
- subtrees in MIBs: 7.1. Overview of SNMP
- displaying with getif: 7.4.2. SNMP Tools
- displaying with snmptranslate: 7.2.1.5. snmptranslate
- examining with tkined: 7.2.3.3. Examining MIBs
- retrieving with scotty: 7.2.2. scotty
- retrieving with SNMP: 7.2.1.3. snmpgetnext, snmpwalk, and snmptable
- summarizing
- connection-by-connection statistics: 5.5.7. tcptrace
- data in ethereal: 5.6.1.1. Using ethereal
- mrtg results: 8.4.1. mrtg
- packet captures: 5.5.4. tcp-reduce
- summary web pages of mrtg results: 8.4.1. mrtg
- suppressing graph display in mrtg: 8.4.1.1. mrtg configuration file
- suspending jobs in tkined: 7.2.3.1. ICMP monitoring
- swap command (ntop): 8.3.1.1. Interactive mode
- swapper in initialization: 2.2.4. Startup Files and Scripts
- swapping
- adapters: 3.2. Testing Adapters
- cables: 3.1.3.3. Other cable tests
- components: 1.1. General Approaches to Troubleshooting
- swatch log tool: 11.2.2. Log File Management
- A.4. Sources for Tools
- switches
- compared to hubs: 5.2. Access to Traffic
- cut-through: 4.2.2.2. pathchar
- 4.2.2.2. pathchar
- point-monitoring tools and: 8.3. Point-Monitoring Tools
- port aliasing: 5.2. Access to Traffic
- security and: 5.7.1. Switch Security
- static addresses and: 6.2.1. IP Address Management
- store-and-forward: 4.2.2.2. pathchar
- 4.2.2.2. pathchar
- traffic capture and: 5.2. Access to Traffic
- traffic monitoring and: 8.1. What, When, and Where
- types of: 4.2.2.2. pathchar
- unmanaged switches: 6.5. Mapping or Diagramming
- symbolic form in SNMP output: 7.2.1.5. snmptranslate
- symptoms
- identifying: 12.1. Generic Troubleshooting
- system failures: 1.1. General Approaches to Troubleshooting
- SYN packets, blocking: 6.2.2. nmap
- synchronizing clocks: 11.3. NTP
- sysctl command: 2.2.3. Kernel
- syslog command (scotty): 6.4.1. Tcl/Tk and scotty
- syslog-ng tool: 11.2.1.2. Remote logging
- A.4. Sources for Tools
- syslog tool: 11.2.1. syslog
- arpwatch data logging: 6.2.3. arpwatch
- configuring: 11.2.1.1. Configuring syslog
- Microsoft Windows: 11.5. Microsoft Windows
- modular syslog: 11.2.1.2. Remote logging
- remote logging: 11.2.1.2. Remote logging
- secure syslog: 11.2.1.2. Remote logging
- security holes: 11.2.1.1. Configuring syslog
- syslog-ng tool: 11.2.1.2. Remote logging
- A.4. Sources for Tools
- syslog.conf file: 11.2.1.1. Configuring syslog
- syslogd daemon: 11.2.1. syslog
- system clocks, synchronizing: 11.3. NTP
- system configuration files: 2.2. System Configuration Files
- application files: 2.2.5.1. Application files
- configuration programs: 2.2.2. Configuration Programs
- kernel configuration: 2.2.3. Kernel
- log files: 2.2.5.3. Log files
- mrtg: 8.4.1.1. mrtg configuration file
- security files: 2.2.5.2. Security files
- startup files and scripts: 2.2.4. Startup Files and Scripts
- testing: 11.2.3.1. tcpwrappers
- system failures: 1.1. General Approaches to Troubleshooting
- 1.1. General Approaches to Troubleshooting
- 1.1. General Approaches to Troubleshooting
- system integrity checkers: 11.4. Security Tools
- system management: B.2.1. System Management
- (see also network management)
- books and resources: B.2.1. System Management
- System Messaged Blocks (SMB): 6.6. Politics and Security
- System Monitor tool: 7.4.3. Other Options
- system performance (see performance monitoring)
- System Policy Editor tool: 7.4.3. Other Options
- System V systems: 2.2.4. Startup Files and Scripts
- Systems Management Server (SMS): 5.8. Microsoft Windows
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.
|