Index

Symbols

/etc/exports
NFS, Configuring NFS
/etc/hosts
name resolution, The host file
/etc/hosts.allow
configuration, Configuration of tcp-wrappers
/etc/hosts.deny
configuration, Configuration of tcp-wrappers
/etc/inetd.conf
security, netstat
/etc/init.d nfs-user-server restart
NFS, Configuring NFS
/etc/init.d/networking restart
network troubleshooting (Debian), Summary
/etc/nsswitch.conf
name resolution, So where to look up the host name?
NIS, Configuration of NIS clients
/etc/rc#.d
service level security, Service level security
/etc/rc.d/init/network restart
network troubleshooting (RedHat), Summary
/etc/rc.d/network restart
network troubleshooting (SuSE), Summary
/etc/rc.init/
service level security, Service level security
/etc/ssh/ssh_host_rsa/
ssh, Sample Session for Verifying a fingerprint
/etc/sysconfig/network-scripts/
RedHat, The loopback interface
/etc/sysconfig/network-scripts/ifcfg-eth0
RedHat, The loopback interface
/etc/sysconfig/network-scripts/ifcfg-eth1
RedHat, The loopback interface
/etc/sysconfig/network/
SuSE, The loopback interface
/etc/sysconfig/network/ifcfg-eth0
SuSE, The loopback interface
/etc/sysconfig/network/ifcfg-eth1
SuSE, The loopback interface

A

Address Resolution Protocol
ARP, ARP and the ARP table
Application layer
OSI model, The OSI Model
TCP/IP model, The Application Layer
ARP
MAC, IP addresses, Transferring information across the Internet
arp
network troubleshooting, Further Troubleshooting with ping and arp
arp -a, What is ARP?
network troubleshooting, Verifying Your Routing Table
ARP table, ARP and the ARP table
TCP/IP stack, Transferring information across the Internet
arp table, Creating and using the ARP table
arping, arping
Asynchronous Transfer Mode
networking types, How do we connect the machines Physically
ATM, Others: Wi-Fi and ATM

C

Carrier Sense Multiple Access Collision Detection
CSMA/CD, Understanding CSMA/CD
chat script
Dial Up, Checklist
CIDR
IP address/subnetmask combination, CIDR
Class A
IP addresses, IP addresses
Class A addresses, The network interfaces that you'll see if you run ifconfig -a
Class B
IP addresses, IP addresses
Class B addresses, The network interfaces that you'll see if you run ifconfig -a
Class C
IP addresses, IP addresses
Class C addresses, The network interfaces that you'll see if you run ifconfig -a
Client/Server technology, Client/Server Technology
collision domain, Broadcast versus collision domains
Cyclic Redundancy Check
TCP/IP model, Overview of how the TCP/IP Model Works

D

datagrams
definition, Packets, frames, bytes, octets and datagrams
default gateway, A default gateway
routing, The loopback interface
dhclient
DHCP request, Explain "dhclient"
DHCP
broadcast domain, Why DHCP is restricted to a broadcast domain
Dial Up lines
analogue, Dial-up lines (analogue and digital (ISDN))
Digital, ISDN , Dial-up lines (analogue and digital (ISDN))
dig
troubleshooting DNS client configuration, Using DIG, Why use DIG? How to use DIG? Examples
DIGINET
Digital Lines, WAN, Digital lines (T1, E1, and ADSL Etc.)
Digital Signature
GPG, Digital signatures
DNS client configuration
troubleshooting, Troubleshooting your DNS client configuration
DNS Name Server, DNS Name Server
DNS records, Types of records in a DNS
DNS server
round robin, Describe round robin DNS servers
Domain Name System
DNS, Domain Naming System
domainname
NIS, Configuration of NIS clients
Dynamic Host Configuration Protocol
DHCP, Dynamic Host Configuration Protocol
the protocol, Understanding the Dynamic Host Configuration Protocol (DHCP)
dynamic IP addressing
DHCP, BOOTP, IP Address Allocation

E

email
fundamentals, Electronic Mail
retrieving, Retrieving email
Ethernet
network technology, Ethernet

F

Fiber Data Distributed Interface
networking types, How do we connect the machines Physically
finger
daemon/client pair, Configuration of tcp-wrappers
tcp-wrappers, Configuration of tcp-wrappers
fingerprint
ssh, Sample Session for Verifying a fingerprint
forward name resolution, Forward versus reverse name resolution
frames
definition, Packets, frames, bytes, octets and datagrams
FTP
client/server, Fourth example:
remote access, FTP
TCP/IP model, Overview of how the TCP/IP Model Works

G

gateways, Routers and gateways
get
FTP, FTP
GNU Privacy Guard, Back to reality?
GPG, GNU Privacy Guard (GPG)
gpg --gen-key, Back to reality?
gpg -fingerprint, Verifying keys
gpg -import
verifying keys, Verifying keys

H

Host portion
IP addresses, Network and Host Portion
Hubs, Hubs, switches and bridges
Hybrid form / Session Key
GPG, Hybrid form / Session Key

I

ICMP
ping, TCP/IP stack, Lets look at ping from the TCP/IP Stack point of view
ICMP sequence
ping, troubleshooting, Sequence Number
ifconfig, The ifconfig command
ifconfig -a, The network interfaces that you'll see if you run ifconfig -a
IMAP
email, Category 3: Your email resides at an ISP.
in.fingerd
tcp-wrappers, Configuration of tcp-wrappers
inet services
security, netstat
inetd
service level security, Inetd:
Service level security (Debian), Service level security
service restrictions, xinetd and inetd service restrictions
Internet Connection Sharing
router, Explaining routers
IP address
configuring network address, How to put an IP address onto your network card
IP addresses, IP addresses

L

LAN, Briefly on LAN 's and WAN's
networking types, How do we connect the machines Physically
logical network, Logical and physical networks
logical network layout
network structure, Logical versus physical network layout
loopback interface, The loopback interface

M

MAC address
arp, ARP and the ARP table
MAC layer
TCP protocol layers, MAC Layer
TCP/IP model, The MAC Layer
mail transport agent
MTA, MTA and MUA
mail user agent
MUA, MTA and MUA
Master/Slave NIS
redundancy, Master/Slave NIS and redundancy
Maximum Transmission Unit
CSMA/CD, Maximum transmission unit (MTU)
message digest
encrypting, Digital signatures
minicom
Dial Up, Checklist
Multicasts, Broadcasts, Unicasts and Multicasts

N

name resolution process, Describe the name resolution process
NAT
problems with IPv4, Basic explanation - relating NAT to problems with IPv4
security, Basic explanation - relating NAT to problems with IPv4
netstat
routing, Routing and using the "netstat" command
security, netstat
netstat -l
security, netstat, xinetd and inetd service restrictions
service level security, Service level security
netstat -r
network troubleshooting, Verifying Your Routing Table
netstat -rn
routing table, Show how to look at the routing table in Linux
Network File System
definition, What is NFS?
Network Layer
TCP/IP model, The Network Layer
Network portion
IP addresses, Network and Host Portion
network security, Network, System and Service Security
Network Terminating Unit
Digital Lines, WAN, Digital lines (T1, E1, and ADSL Etc.)
NFS
configuring, Configuring NFS
NFS server, How can we use NFS?
NIS, Network Information Service (NIS)
DNS Name Server, NIS
nmap
xinetd, security, Xinetd:
nmblookup
SAMBA, Nmblookup
nslookup
troubleshooting DNS client configuration, Using NSLOOKUP

O

octets
definition, Packets, frames, bytes, octets and datagrams
one-way hashing
GPG, Digital signatures
Open Relays, Open Relays and SPAM
OpenSSH
remote access, SSH
OSI model, The OSI Model

P

packets
definition, Packets, frames, bytes, octets and datagrams
Physical Layer
TCP/IP model, The Physical Layer
physical network, Logical and physical networks
physical network layout
network structure, Logical versus physical network layout
ping
flooding, Flooding with PING
network troubleshooting, Further Troubleshooting with ping and arp, PING
TCP/IP stack, Lets look at ping from the TCP/IP Stack point of view
testing connectivity, Test the network with Ping
plumbing a device, Plumbing a device
plumbing a network card
IP addressing, Plumbing a network card
POP3
email, Category 3: Your email resides at an ISP.
ports, listening
Security, Checking on listening ports.
Presentation layer
OSI model, The OSI Model
Private Keys
GPG, Public and Private Keys
Public Keys
GPG, Public and Private Keys
pump
DHCP request, Explain "dhclient"
put
FTP, FTP

S

SAMBA, SAMBA
service security, Network, System and Service Security
Session layer
OSI model, The OSI Model
SFTP
Secure FTP Session, SSH
SIGHUP
xinetd, security, Xinetd:
smbclient
ftp-like service, Using smbclient
SAMBA, Using smbclient
smbmount
SAMBA, Smbmount/smbumount
smbtar
SAMBA, Smbtar
smbumount
SAMBA, Smbmount/smbumount
SMTP
email, SMTP
SMTP server
email, Open Relays and SPAM
SSH
remote access, SSH
ssh agent, Sample Session Using ssh agent
ssh-keygeb -t rsa -b 1024
generating key for ssh, Sample Session for Generating a key
static IP addressing, IP Address Allocation
sub-netting
IP addresses, Why use sub-netting
subnetmask
configuring network address, How to put an IP address onto your network card
Summary
ping, troubleshooting, Summary
switches, Hubs, switches and bridges
building bridging tables, Switches and building bridging tables
Symmetric Keys
GPG, Symmetric Keys
system security, Network, System and Service Security

T

TCP
connection orientated protocol, The Transport Layer
TCP protocol layers, The Transport Layer
TCP/IP model, Introducing the TCP/IP Model
Transmission Control Protocol, The Transport Layer
transport layer protocol, The Transport Layer
TCP wrappers
security, TCP Wrappers
tcp-wrappers
configuration, Configuration of tcp-wrappers
troubleshooting, Troubleshooting TCP-wrappers
tcp-wrappers, configuration
daemon/client pair, Configuration of tcp-wrappers
TCP/IP, Network Administration Fundamentals
TCP/IP stack, Summary - TCP/IP Stack
tcpchk -v
troubleshooting tcp-wrappers, Troubleshooting TCP-wrappers
telnet
remote access, Inherent problems with telnet
TIME
ping, troubleshooting, Time
Token Ring, Overview of how the TCP/IP Model Works
network technology, Token Ring
networking types, How do we connect the machines Physically
Transport layer
OSI model, The OSI Model
TCP protocol layers, The Transport Layer
TCP/IP model, The Transport Layer
TTL
ping, troubleshooting, TTL

U

UDP
connectionless protocol, The Transport Layer, The Transport Layer
TCP protocol layers, The Transport Layer
TCP/IP model, Introducing the TCP/IP Model
transport layer protocol, The Transport Layer
User Datagram Protocol, The Transport Layer
Unicast services
ftp, Services that are UNICAST (ssh/telnet/ftp) and broadcast (DHCP/BOOTP/ARP)
ssh, Services that are UNICAST (ssh/telnet/ftp) and broadcast (DHCP/BOOTP/ARP)
telnet, Services that are UNICAST (ssh/telnet/ftp) and broadcast (DHCP/BOOTP/ARP)
Unicasts, Broadcasts, Unicasts and Multicasts
update-rc.d <servicename> <setting>
service level security, Service level security
update-rc.d apmd remove
service level security, Service level security

V

Verifying keys
GPG, Verifying keys

X

xinetd
security, Xinetd:
Service level security (SuSE, RedHat), Service level security
service restrictions, xinetd and inetd service restrictions