Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: N

n class : sendmail, 32.5. Alphabetized Reference
-N database switch : sendmail, 33.3.4.6. -N append a null byte to all keys (V8.1 and above)
n flag : sendmail, 30.8. Alphabetized F= Flags
N line (qf file) : sendmail, 23.9. The qf File Internals
$n macro
sendmail, 10.3. Missing Addresses
sendmail, 24.4.2. The MAILER-DAEMON Alias
sendmail, 31.10. Alphabetized Reference
n option : (see CheckAliases (n) option)
-n switch (sendmail)
sendmail, 18.3.2. The makesendmail Script
sendmail, 24.6. Prevent Aliasing with -n
sendmail, 36.7. Alphabetized Reference
-N switch (makemap) : sendmail, 33.2.1.3. -N append a null byte to all keys
-N switch (sendmail) : sendmail, 36.7. Alphabetized Reference
N= equate : sendmail, 30.4. The Equates
name service
Practical UNIX & Internet Security, 16.2.6. Name Service
Practical UNIX & Internet Security, 16.2.6.2. Other naming services
sendmail, 21.1. Overview
sendmail, 21.5.2. Offsite Servers
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 8. Configuring DNS Name Service
(see also DNS)
addresses : (see addresses)
name server lookups : sendmail, 33.4.3. $[ and $]: A Special Case
process : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
security and : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
troubleshooting
TCP/IP Network Administration, 11.3. Testing Basic Connectivity
TCP/IP Network Administration, 11.6. Checking Name Service
Name Service Switch file (nsswitch.conf) : TCP/IP Network Administration, 9.3.1. The nsswitch.conf file
name-value pairs in BNU UUCP : Practical UNIX & Internet Security, 15.5.1.2. Name-value pairs
named daemon
Building Internet Firewalls, 8.10.5.2. Set up a real DNS
Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
TCP/IP Network Administration, 5.4. The Internet Daemon
TCP/IP Network Administration, 8.1. BIND: UNIX Name Service
booting : TCP/IP Network Administration, 8.3.3. The Cache Initialization File
command : TCP/IP Network Administration, C.1. The named Command
configuring : TCP/IP Network Administration, 8.3. Configuring named
process : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
starting at startup : TCP/IP Network Administration, 8.3.6.1. Starting named
tools reference : TCP/IP Network Administration, C. A named Reference
NAMED_BIND macro : sendmail, 18.8. Alphabetized Reference
named.boot file
Practical UNIX & Internet Security, 17.3.6.1. DNS zone transfers
Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
TCP/IP Network Administration, 8.3.1. The named.boot File
TCP/IP Network Administration, 11.6.3. Cache corruption
TCP/IP Network Administration, C.1. The named Command
configuration commands
TCP/IP Network Administration, C.2. named.boot Configuration Commands
TCP/IP Network Administration, 8.3.1. The named.boot File
named.ca file : TCP/IP Network Administration, 11.6.3. Cache corruption
named.hosts file : TCP/IP Network Administration, 8.3.6. The named.hosts File
named.local file : TCP/IP Network Administration, 8.3.4. The named.local File
named.pid file : TCP/IP Network Administration, 11.6.3. Cache corruption
named.rev file : TCP/IP Network Administration, 8.3.5. The Reverse Domain File
named-xfer program : Practical UNIX & Internet Security, 16.2.6.1. DNS under UNIX
names : TCP/IP Network Administration, 3.1. Names and Addresses
alternative for sendmail : sendmail, 36.1. Alternative argv[0] Names
canonical
sendmail, 7.3.1. The hostname
sendmail, 31.10. Alphabetized Reference
canonicalizing : (see canonicalization)
changing from host to hub : sendmail, 11.6. Handling user@thishost
choosing UUCP : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
classes
sendmail, 12.1. The Class Command
sendmail, 32.2.4. Class Name Hashing Algorithm
computer
Practical UNIX & Internet Security, 16.2.3. Hostnames
Practical UNIX & Internet Security, 16.2.3.1. The /etc/hosts file
controlling terminal : sendmail, 31.10. Alphabetized Reference
DNS : (see DNS)
domain
Practical UNIX & Internet Security, 16.2.3. Hostnames
sendmail, 8.1. A Fictional Network
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 31.10. Alphabetized Reference
TCP/IP Network Administration, 3.3.3. Domain Names
TCP/IP Network Administration, 4. Getting Started
application form : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
full sender : (see $x macro)
fully qualified
sendmail, 4.2. Verbose (-v)
sendmail, 7.3.1. The hostname
sendmail, 8.1. A Fictional Network
sendmail, 21.1. Overview
TCP/IP Network Administration, 3.3.3. Domain Names
(see also $j macro)
headers : sendmail, 35.2. Header Names
hostnames : (see hostnames)
hub, internal : sendmail, 11.4.2. A Word About ${HUB}
local canonical
sendmail, 21.2.1. Determine the Local Canonical Name
sendmail, 31.10. Alphabetized Reference
macros
sendmail, 5.3.2. Macros
sendmail, 7.2. Defining Macros
sendmail, 20.3. Alphabetized V8.8 Subroutines
sendmail, 31.4. Macro Names
in NIS : TCP/IP Network Administration, 9.3. Network Information Service
obtaining : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
options : sendmail, 13.1. Options: An Overview
parameter : TCP/IP Network Administration, 9.4. A BOOTP Server
RealHostName variable : sendmail, 20.1.2. Global Variables
rule set : sendmail, 29.1.2. Rule-Set Names
symbol, delivery agent : sendmail, 30.2. The Symbolic Name
trailing dot for
sendmail, 15.3. MX Records
sendmail, 17.4. Rule Set 4
sendmail, 29.5.1. Stripping Trailing Dots
unqualified
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 31.10. Alphabetized Reference
user : (see usernames)
nameser.h file : sendmail, B.1. Status file lines
nameserver attacks, DNS : Practical UNIX & Internet Security, 17.3.6.2. DNS nameserver attacks
nameserver cache loading : Practical UNIX & Internet Security, 16.3.2. Security and Nameservice
nameserver entry, in resolv.conf : TCP/IP Network Administration, 8.2.1. The Resolver Configuration File
NAPs (Network Access Points)
TCP/IP Network Administration, 1.1. TCP/IP and the Internet
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
AMES Research Center
NASA (National Aeronautics and Space Agency) : Practical UNIX & Internet Security, F.3.4.23. NASA
National Center for Supercomputer Applications (NCSA)
Practical UNIX & Internet Security, F.2.1. National Computer Security Center
TCP/IP Network Administration, 13.1. The World Wide Web
NCSA HTTPD server
Practical UNIX & Internet Security, 10.3.5. access_log Log File
(see also web servers)
NCSA Mosaic : Building Internet Firewalls, 2.5. The World Wide Web
National Computer Security Center (NCSC) : Practical UNIX & Internet Security, F.2.1. National Computer Security Center
National Institute of Standards and Technology (NIST)
Practical UNIX & Internet Security, F.3.4.26. National Institute of Standards and Technology
TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
TCP/IP Network Administration, 13.1. The World Wide Web
NIST CSRC (Computer Security Resource Clearinghouse) : Building Internet Firewalls, A.5.3. NIST CSRC
National Science Foundation (NSF)
TCP/IP Network Administration, 1.1. TCP/IP and the Internet
TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
NSFNET
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 7.4. Interior Routing Protocols
national security : Practical UNIX & Internet Security, 26.2.2. Federal Jurisdiction
natural disasters
Practical UNIX & Internet Security, 1.1. What Is Computer Security?
Practical UNIX & Internet Security, 7.1.1.1. A taxonomy of computer failures
Practical UNIX & Internet Security, 7.1.6.1. Physical security for backups
Practical UNIX & Internet Security, 12.2.1.1. Fire
(see also physical security)
accidents : Practical UNIX & Internet Security, 12.2.2. Preventing Accidents
earthquakes : Practical UNIX & Internet Security, 12.2.1.4. Earthquake
fires
Practical UNIX & Internet Security, 12.2.1.1. Fire
Practical UNIX & Internet Security, 12.2.1.2. Smoke
lightning
Practical UNIX & Internet Security, 12.2. Protecting Computer Hardware
Practical UNIX & Internet Security, 12.2.1.9. Lightning
natural gas : Practical UNIX & Internet Security, 12.2.1.5. Explosion
natural mask : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
NAVCIRT (Naval Computer Incident Response Team) : Practical UNIX & Internet Security, F.3.4.44. U.S. Department of the Navy
NBMA interfaces
TCP/IP Network Administration, B.6. Interface Statements
TCP/IP Network Administration, B.8.1. The ospf Statement
ncheck command
Practical UNIX & Internet Security, 5.5.4.1. The ncheck command
Practical UNIX & Internet Security, 5.6. Device Files
NCSA (National Center for Supercomputer Applications)
Practical UNIX & Internet Security, F.2.1. National Computer Security Center
TCP/IP Network Administration, 13.1. The World Wide Web
NCSA HTTPD server
Practical UNIX & Internet Security, 10.3.5. access_log Log File
(see also web servers)
NCSA Mosaic : Building Internet Firewalls, 2.5. The World Wide Web
NCSC (National Computer Security Center) : Practical UNIX & Internet Security, F.2.1. National Computer Security Center
ndbm database : sendmail, 33.8. Alphabetized Reference
NDBM macro : sendmail, 18.8. Alphabetized Reference
NEED... macros : sendmail, 18.8. Alphabetized Reference
needexpnhelo (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
needmailhelo (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
needvrfyhelo (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
negative precedence values : sendmail, 14.4. Precedence
neighbors
acquiring : TCP/IP Network Administration, 7.5.1. Exterior Gateway Protocol
allowing
TCP/IP Network Administration, 7.7.1.3. Exterior gateway configuration
TCP/IP Network Administration, B.8.6. The egp Statement
nested
angle brackets
sendmail, 10.4. Nested Angle Brackets
sendmail, 17.1.1.2. Strip to left of <
directories : Practical UNIX & Internet Security, 25.2.2.8. Tree-structure attacks
IP over IP : Building Internet Firewalls, 6.3.3.5. IP over IP
macro conditionals : sendmail, 31.6.1. Conditionals May Nest
net domain : TCP/IP Network Administration, 3.3.1. The Domain Hierarchy
NET... macros : sendmail, 18.8. Alphabetized Reference
Net/Dest value
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
TCP/IP Network Administration, 6.1.5.5. Point-to-point
netacl program : Building Internet Firewalls, 5.8.3.2. Using netacl to protect services
netconfig : TCP/IP Network Administration, 4.7. netconfig
Netgroup table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
netgroups, NIS
Practical UNIX & Internet Security, 19.4.4. NIS Netgroups
Practical UNIX & Internet Security, 19.4.4.6. NIS is confused about "+"
limiting imported accounts : Practical UNIX & Internet Security, 19.4.4.2. Using netgroups to limit the importing of accounts
NetInfo
Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
Practical UNIX & Internet Security, 16.2.6.2. Other naming services
sendmail, 33.8. Alphabetized Reference
NETINFO macro : sendmail, 18.8. Alphabetized Reference
Netmasks table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
netnews~firewalls : Practical UNIX & Internet Security, 21.4.3. Netnews
.netrc file : Practical UNIX & Internet Security, 10.4.3. Network Setup
Netscape Navigator
Building Internet Firewalls, 2.5. The World Wide Web
TCP/IP Network Administration, 13.1. The World Wide Web
encryption system of : Practical UNIX & Internet Security, 18.4.1. Eavesdropping Over the Wire
random number generator : Practical UNIX & Internet Security, 23.8. Picking a Random Seed
netstat command
Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
Practical UNIX & Internet Security, 24.2.1. Catching One in the Act
Practical UNIX & Internet Security, 24.2.4. Tracing a Connection
-a option : Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
-in command : TCP/IP Network Administration, 6.1.1. Determining the Interface Name
-n option : Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
-ni command : TCP/IP Network Administration, 6.4.4. Troubleshooting Serial Connections
-nr command
TCP/IP Network Administration, 2.5. The Routing Table
TCP/IP Network Administration, 7.3.1. Adding Static Routes
TCP/IP Network Administration, 11.5. Checking Routing
to display routing table : TCP/IP Network Administration, 12.7.2. Routing control
troubleshooting with
TCP/IP Network Administration, 11.2. Diagnostic Tools
TCP/IP Network Administration, 11.3. Testing Basic Connectivity
TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
network services
Building Internet Firewalls, 2. Internet Services
Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
Practical UNIX & Internet Security, 17. TCP/IP Services
Practical UNIX & Internet Security, 17.7. Summary
Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
Practical UNIX & Internet Security, G. Table of IP Services
administration : (see system administration)
booting : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
configuring : Building Internet Firewalls, 8. Configuring Internet Services
contacting providers about incidents : Building Internet Firewalls, 13.1.4.3. Vendors and service providers
default deny stance : Building Internet Firewalls, 3.5.1. Default Deny Stance: That Which Is Not
default permit stance : Building Internet Firewalls, 3.5.2. Default Permit Stance: That Which Is
direct access to : Building Internet Firewalls, 7.1.1.1. Proxy services allow users to access Internet services
disabling those not required : Building Internet Firewalls, 5.8.2. Disabling Nonrequired Services
DNS : (see DNS)
encryption with : (see encryption)
filtering by : Building Internet Firewalls, 6.7. Filtering by Service
finger : (see finger service)
FTP : (see FTP)
inbound : (see inbound, services)
information lookup services : Building Internet Firewalls, 8.8. Information Lookup Services
installing and modifying : Building Internet Firewalls, 5.8.3. Installing and Modifying Services
LAN-oriented : Building Internet Firewalls, 5.6. Selecting Services Provided by the
NFS (Network File System) : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
NNTP : (see NNTP)
NTP : (see NTP)
overloading : Practical UNIX & Internet Security, 25.3.1. Service Overloading
passwords for : (see passwords)
POP : (see POP)
protecting with TCP Wrapper : Building Internet Firewalls, 5.8.3.1. Using the TCP Wrapper package to protect services
proxy : (see proxy servers/services)
r commands : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
real-time conferencing : Building Internet Firewalls, 8.9. Real-Time Conferencing Services
root account with : (see root account/user)
RPC (Remote Procedure Call) : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
securing
Practical UNIX & Internet Security, 17.4. Security Implications of Network Services
Practical UNIX & Internet Security, 19.1. Securing Network Services
(see also security)
selecting for bastion host : Building Internet Firewalls, 5.6. Selecting Services Provided by the
SMTP : (see SMTP)
SNMP : (see SNMP)
spoofing
Practical UNIX & Internet Security, 8.5.3.1. Trusted path
Practical UNIX & Internet Security, 16.3. IP Security
Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
Practical UNIX & Internet Security, 19.4.4.4. Spoofing RPC
Practical UNIX & Internet Security, 19.4.4.5. Spoofing NIS
started by /etc/rc : Building Internet Firewalls, 5.8.2.1. How are services managed?
store-and-forward
Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
TCP/IP Network Administration, 3.4.1. Simple Mail Transfer Protocol
systat service : Practical UNIX & Internet Security, 17.3.1. systat (TCP Port 11)
Telnet : (see Telnet service)
TFTP : (see TFTP)
UUCP : (see UUCP)
networks and networking
Practical UNIX & Internet Security, 16. TCP/IP Networks
Practical UNIX & Internet Security, 16.5. Summary
sendmail, 3.3. Role in Network Transport
10Base-T : Practical UNIX & Internet Security, 12.3.1.2. Eavesdropping by Ethernet and 10Base-T
access
access layer, TCP/IP : Building Internet Firewalls, C.4. Network Access Layer
balancing against computer security : TCP/IP Network Administration, 12. Network Security
troubleshooting : TCP/IP Network Administration, 11.4. Troubleshooting Network Access
address translation (NAT) : TCP/IP Network Administration, 4.2.1. Obtaining an IP Address
avoiding problems
TCP/IP Network Administration, 11.4.2.1. ARP problem case study
TCP/IP Network Administration, 11.9. Simple Network Management Protocol
decentralized : TCP/IP Network Administration, 2.3. Subnets
defined
TCP/IP Network Administration, 1. Overview of TCP/IP
TCP/IP Network Administration, 11. Troubleshooting TCP/IP
developing feel for : TCP/IP Network Administration, 12.4.1. Know Your System
need for information about : TCP/IP Network Administration, Preface
security responsibilites of : TCP/IP Network Administration, 12.1.3. Writing a Security Policy
simplifying : TCP/IP Network Administration, 4.2.2. Defining the Subnet Mask
allowing threats from : Practical UNIX & Internet Security, 11.4. Entry
AppleTalk : sendmail, 3.3.3. Other Protocols
architecture : (see firewalls, architecture of)
ARPANET
Practical UNIX & Internet Security, 16.1.1. The InternetWe recommend that readers
TCP/IP Network Administration, 1.1. TCP/IP and the Internet
TCP/IP Network Administration, 1.5.1.1. The datagram
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 6.2. TCP/IP Over a Serial Line
backing up
Practical UNIX & Internet Security, 7.2.2. Small Network of Workstations and a Server
Practical UNIX & Internet Security, 7.2.4. Large Service-Based Networks with Large Budgets
Practical UNIX & Internet Security, 7.4.5. Backups Across the Net
break-ins, increasing : TCP/IP Network Administration, 12. Network Security
building : TCP/IP Network Administration, Foreword from the First Edition
cables for : (see cables)
checking connectivity of : (see ping command)
checklist for
Practical UNIX & Internet Security, A.1.1.15. Chapter 16: TCP/IP Networks
Practical UNIX & Internet Security, A.1.1.16. Chapter 17: TCP/IP Services
computer networks : Practical UNIX & Internet Security, 1.4.3. Add-On Functionality Breeds Problems
configuration files : Practical UNIX & Internet Security, 10.4.3. Network Setup
connected or not connected to Internet : TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
connections : Practical UNIX & Internet Security, 17.3.3. TELNET (TCP Port 23)
connectors for : Practical UNIX & Internet Security, 12.2.4.3. Network connectors
databases, network : Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
DECnet
Practical UNIX & Internet Security, 16.4.3. DECnet
sendmail, 3.3.3. Other Protocols
$C macro : sendmail, 31.10. Alphabetized Reference
denial of service on : (see denial of service)
diameter
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 7.4.1.1. Running RIP with routed
disabling physically : Practical UNIX & Internet Security, 25.3.3. Signal Grounding
disconnecting, after incident
Building Internet Firewalls, 13.1.2. Disconnect or Shut Down, as
Building Internet Firewalls, 13.4.3. Planning for Disconnecting or
encryption : Building Internet Firewalls, 10.5. Network-Level Encryption
File System : (see NFS)
forwarding over
sendmail, 29.6.6. Forwarding over the Network
TCP/IP Network Administration, 1.5.1.4. Passing datagrams to the transport layer
loops : sendmail, 25.7.2. Forwarding Loops
Resent- headers : sendmail, 35.7. Forwarding with Resent-Headers
hardware
TCP/IP Network Administration, 1.7. Application Layer
(see also physical network)
with built-in diagnostic software : TCP/IP Network Administration, 11.3.1. The ping Command
problems with
TCP/IP Network Administration, 11.3.1. The ping Command
TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
TCP/IP Network Administration, 11.4.4.1. Network hardware problems
heterogeneous : TCP/IP Network Administration, 1.1.2. Protocol Standards
insecure : Building Internet Firewalls, 4.4.2. Insecure Networks
interfaces : TCP/IP Network Administration, 3.1. Names and Addresses
enabling or disabling : TCP/IP Network Administration, 6.1.5.1. Enabling and disabling the interface
information need for : TCP/IP Network Administration, 6.1. The ifconfig Command
Internet : (see Internet)
joint : Building Internet Firewalls, 4.4.4. Joint Venture Firewalls
lab/test : Building Internet Firewalls, 4.4.1. Laboratory Networks
LANs : (see LANs)
location of bastion host on : Building Internet Firewalls, 5.5. Locating the Bastion Host on the Network
logging
Practical UNIX & Internet Security, 10.5.2.2. Logging across the network
Practical UNIX & Internet Security, 10.3.6. Logging Network Services
(see also logs/logging)
management services : Building Internet Firewalls, 2.10. Network Management Services
configuring : Building Internet Firewalls, 8.12. Network Management Services
MANs : Practical UNIX & Internet Security, 16.1. Networking
maps drawn by monitors : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
mask
TCP/IP Network Administration, 7.4.2. RIP Version 2
TCP/IP Network Administration, 2.5. The Routing Table
mobile computing : Practical UNIX & Internet Security, 8.7. One-Time Passwords
monitoring
Building Internet Firewalls, 5.9.2. Consider Writing Software to Automate Monitoring
TCP/IP Network Administration, 11.7. Analyzing Protocol Problems
netstat : Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
news : (see Usenet news)
NFSNET
Practical UNIX & Internet Security, 16.1.1. The InternetWe recommend that readers
TCP/IP Network Administration, 1.1. TCP/IP and the Internet
numbers
TCP/IP Network Administration, 2.2.1. Address Classes
TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
packet switching
Practical UNIX & Internet Security, 16.2. IPv4: The Internet Protocol Version 4
Practical UNIX & Internet Security, 16.3. IP Security
TCP/IP Network Administration, 1.5.1.1. The datagram
TCP/IP Network Administration, 1.7. Application Layer
perimeter
Building Internet Firewalls, 4.1. Some Firewall Definitions
Building Internet Firewalls, 4.2.3.1. Perimeter network
problems, how to approach : TCP/IP Network Administration, 11. Troubleshooting TCP/IP
processes : TCP/IP Network Administration, 8.2. Configuring the Resolver
protecting internally : Building Internet Firewalls, 4.4. Internal Firewalls
providers : (see ISPs)
resources, controlling : TCP/IP Network Administration, 12.1.3. Writing a Security Policy
saturated : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
scanning : Practical UNIX & Internet Security, 17.6. Network Scanning
security : (see security)
servers
TCP/IP Network Administration, 2.7.2. Port Numbers
TCP/IP Network Administration, 9. Configuring Network Servers
services : (see network services)
shared media : TCP/IP Network Administration, 11.4.4. Subdividing an Ethernet
SOCKS for : (see SOCKS package)
spoofing
Practical UNIX & Internet Security, 8.5.3.1. Trusted path
Practical UNIX & Internet Security, 16.3. IP Security
Practical UNIX & Internet Security, 17.5. Monitoring Your Network with netstat
Practical UNIX & Internet Security, 19.4.4.5. Spoofing NIS
Practical UNIX & Internet Security, 19.4.4.4. Spoofing RPC
subdividing : TCP/IP Network Administration, 11.4.3. Checking the Interface with netstat
subnetted : TCP/IP Network Administration, 4.2.1.1. Assigning host addresses
support : sendmail, 18.8. Alphabetized Reference
taps : Building Internet Firewalls, 1.2.1.3. Information Theft
TCP/IP : (see TCP/IP services)
Time Protocol : (see NTP)
topology of : TCP/IP Network Administration, 2.2.2. Classless IP Addresses
transferring information across : (see packet filtering)
underlying : TCP/IP Network Administration, 1.4. Network Access Layer
UNIX and : Practical UNIX & Internet Security, 16.1.2. Networking and UNIX
unreliable : TCP/IP Network Administration, 11.3.1. The ping Command
unusual activity on : TCP/IP Network Administration, 12.4.1. Know Your System
usage, monitoring : TCP/IP Network Administration, 5.2. Linux Kernel Configuration
UUCP over
Practical UNIX & Internet Security, 15.8. UUCP Over Networks
(see also UUCP)
X.25 : TCP/IP Network Administration, 1.5.1.3. Fragmenting datagrams
WANs : Practical UNIX & Internet Security, 16.1. Networking
weaving : Practical UNIX & Internet Security, 16.1.1.1. Who is on the Internet?
Network Access Layer
TCP/IP Network Administration, 1.3. TCP/IP Protocol Architecture
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
protocols : TCP/IP Network Administration, 3.6. Bootstrap Protocol
Network Access Points (NAPs)
TCP/IP Network Administration, 1.1. TCP/IP and the Internet
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
Network Control protocols : TCP/IP Network Administration, 6.2.1. The Serial Protocols
Network File System : (see NFS)
Network Information Center (NIC)
Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
handle : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
Network Information Service : (see NIS)
Network Layer
TCP/IP Network Administration, 1.2. A Data Communications Model
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
Network Management Station (NMS) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
Network News Transfer Protocol (NNTP)
Building Internet Firewalls, 2.4. Usenet News
Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP) (TCP Port
TCP/IP Network Administration, 13.5.1. Newsgroups
(see also Usenet news)
configuring
Building Internet Firewalls, 8.5. Network News Transfer Protocol
Building Internet Firewalls, 9.1.1.4. NNTP
Building Internet Firewalls, 9.2.1.4. NNTP
Network Terminal Protocol (TELNET) : TCP/IP Network Administration, 1.7. Application Layer
Network Time Protocol
Building Internet Firewalls, 2.11. Time Service
Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
configuring : Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
Secure RPC and : Practical UNIX & Internet Security, 19.3.1.3. Setting the window
network unreachable error message
TCP/IP Network Administration, 11.3. Testing Basic Connectivity
TCP/IP Network Administration, 11.5. Checking Routing
(see also ICMP)
Network/Destination value
TCP/IP Network Administration, 6.1.1. Determining the Interface Name
TCP/IP Network Administration, 6.1.5.5. Point-to-point
networks file
TCP/IP Network Administration, 3.2. The Host Table
TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
TCP/IP Network Administration, 7.3. Building a Static Routing Table
TCP/IP Network Administration, 9.3. Network Information Service
as maps : TCP/IP Network Administration, 3.3.5. Network Information Service
Networks table (NIS+) : Practical UNIX & Internet Security, 19.5.3. NIS+ Tables
Neumann, Peter : Practical UNIX & Internet Security, 1.3. History of UNIX
newaliases command
sendmail, 4.1.3. Rebuild Aliases Mode (-bi)
sendmail, 24.5.3. Prevent Simultaneous Rebuilds
sendmail, 36.1.3. newaliases
NEWDB macro : sendmail, 18.8. Alphabetized Reference
newgrp command : Practical UNIX & Internet Security, 4.1.3.2. Groups and older AT&T UNIX
newkey -u command
Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
Practical UNIX & Internet Security, 19.5.4.2. When a user's passwords don't match
newlines : (see whitespace)
newly registered hosts : TCP/IP Network Administration, 3.2. The Host Table
news (Usenet)
Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP) (TCP Port
Practical UNIX & Internet Security, E.2. Usenet Groups
TCP/IP Network Administration, 13.5.1. Newsgroups
TCP/IP Network Administration, E.3.5. MAILER
(see also NNTP)
cleanup scripts : Practical UNIX & Internet Security, 11.5.3. Abusing Automatic Mechanisms
encryption for : (see ROT13 algorithm)
message subtype : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
mailing list gateways to : sendmail, 25.5.2. Gateway Lists to News
news user : Practical UNIX & Internet Security, 4.1. Users and Groups
newsgroups
Building Internet Firewalls, 2.4. Usenet News
TCP/IP Network Administration, 13.5.1. Newsgroups
defamation/harassment via : Practical UNIX & Internet Security, 26.4.7. Harassment, Threatening Communication, and Defamation
keeping current : Building Internet Firewalls, 12.3.1.2. Newsgroups
for security information : TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
security resources via : Building Internet Firewalls, A.4. Newsgroups
using
TCP/IP Network Administration, 4.1.1. Network Contacts
TCP/IP Network Administration, 13.5.1. Newsgroups
posting breakins to : Practical UNIX & Internet Security, 24.6. Resuming Operation
reporting security holes on : Practical UNIX & Internet Security, 2.5.1. Going Public
next hop
Building Internet Firewalls, C.11. The Routing Table
TCP/IP Network Administration, 7.4.3. Open Shortest Path First
specifying : TCP/IP Network Administration, 7.3. Building a Static Routing Table
in RIP-2 : TCP/IP Network Administration, 7.4.2. RIP Version 2
NEXTSTEP Window Server (NSWS) : Practical UNIX & Internet Security, 17.3.16. NEXTSTEP Window Server
nf files : sendmail, 23.2.4. The ID Creation File (obsolete as of V5.62): nf
NFS (Network File System)
Building Internet Firewalls, 2.12. Network File Systems
Practical UNIX & Internet Security, 5.5.5. Turning Off SUID and SGID in Mounted Filesystems
Practical UNIX & Internet Security, 19. RPC, NIS, NIS+, and Kerberos
TCP/IP Network Administration, 1.7. Application Layer
TCP/IP Network Administration, 3.7.1. File Sharing
TCP/IP Network Administration, 9.1. The Network File System
TCP/IP Network Administration, 9.6. Managing Distributed Servers
authentication and
Practical UNIX & Internet Security, 19.2.2. RPC Authentication
Practical UNIX & Internet Security, 19.2.2.4. AUTH_KERB
benefits of : TCP/IP Network Administration, 9.1. The Network File System
checklist for : Practical UNIX & Internet Security, A.1.1.19. Chapter 20: NFS
configuring : Building Internet Firewalls, 8.14. Network File System
exporting news via : Building Internet Firewalls, 8.5.3.3. Exporting news to clients via
file permissions : Practical UNIX & Internet Security, 5.1.7. File Permissions in Detail
find command on : Practical UNIX & Internet Security, 5.5.4. Finding All of the SUID and SGID Files
-local option : Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
MOUNT : Practical UNIX & Internet Security, 20.1.1. NFS History
Secure NFS : (see Secure NFS)
server, and UUCP : Practical UNIX & Internet Security, 15.3. UUCP and Security
services of : Building Internet Firewalls, 5.8.2.4. Which services should you disable?
technical description of : Practical UNIX & Internet Security, 20.1.1. NFS History
trusted hosts and : Practical UNIX & Internet Security, 17.3.18.2. The problem with trusted hosts
-xdev option : Practical UNIX & Internet Security, 11.6.1.2. Writable system files and directories
NFS-based print services : TCP/IP Network Administration, 9.1.5.1. NFS print services
nfs.client script : TCP/IP Network Administration, 9.1.1. NFS Daemons
nfs.server script : TCP/IP Network Administration, 9.1.1. NFS Daemons
nfsd (NFS daemon) : TCP/IP Network Administration, 9.1.1. NFS Daemons
NFSNET backbone : TCP/IP Network Administration, 1.1. TCP/IP and the Internet
NIC (Network Information Center)
Practical UNIX & Internet Security, 24.2.4.2. How to contact the system administrator of a computer
TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
handle : TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
nice command : Practical UNIX & Internet Security, 25.2.1.2. System overload attacks
nice numbers : Practical UNIX & Internet Security, C.1.3.3. Process priority and niceness
niceness, delivery agent : sendmail, 30.4. The Equates
NIS (Network Information Service)
Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
Practical UNIX & Internet Security, 3.4. Changing Your Password
Practical UNIX & Internet Security, 19. RPC, NIS, NIS+, and Kerberos
Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
Practical UNIX & Internet Security, 19.4.5. Unintended Disclosure of Site Information with NIS
TCP/IP Network Administration, 3.3.5. Network Information Service
TCP/IP Network Administration, 9.3. Network Information Service
+ in
Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
Practical UNIX & Internet Security, 19.4.4.6. NIS is confused about "+"
clients : Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
domains : Practical UNIX & Internet Security, 19.4.3. NIS Domains
maps
Practical UNIX & Internet Security, 19.4. Sun's Network Information Service (NIS)
TCP/IP Network Administration, 3.3.5. Network Information Service
TCP/IP Network Administration, 6.1.3. Assigning a Subnet Mask
TCP/IP Network Administration, 10.6.1. Pattern Matching
netgroups
Practical UNIX & Internet Security, 19.4.4. NIS Netgroups
Practical UNIX & Internet Security, 19.4.4.6. NIS is confused about "+"
limiting imported accounts : Practical UNIX & Internet Security, 19.4.4.2. Using netgroups to limit the importing of accounts
Secure RPC with
Practical UNIX & Internet Security, 19.3.2. Setting Up Secure RPC with NIS
Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
spoofing : Practical UNIX & Internet Security, 19.4.4.5. Spoofing NIS
UDP : Practical UNIX & Internet Security, 16.2.4.3. UDP
Yellow Pages : Practical UNIX & Internet Security, 16.2.6.2. Other naming services
nis database class : sendmail, 33.8. Alphabetized Reference
NIS macro : sendmail, 18.8. Alphabetized Reference
NIS+
Building Internet Firewalls, 8.15. Network Information Service/Yellow
Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
Practical UNIX & Internet Security, 3.4. Changing Your Password
Practical UNIX & Internet Security, 16.2.6.2. Other naming services
Practical UNIX & Internet Security, 19.5. Sun's NIS+
Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
TCP/IP Network Administration, 9.3.2. NIS+
integrity-checking software for : Practical UNIX & Internet Security, 19.5.5. NIS+ Limitations
principals : Practical UNIX & Internet Security, 19.5.1. What NIS+ Does
Secure RPC with
Practical UNIX & Internet Security, 19.3.2. Setting Up Secure RPC with NIS
Practical UNIX & Internet Security, 19.3.4. Limitations of Secure RPC
NIS/YP (Network Information Service)
Building Internet Firewalls, 2.9. Name Service
Building Internet Firewalls, 5.8.2.4. Which services should you disable?
Building Internet Firewalls, 8.10. Domain Name System
configuring : Building Internet Firewalls, 8.15. Network Information Service/Yellow
nisaddcred command : Practical UNIX & Internet Security, 19.3.1.1. Proving your identity
niscat command : Practical UNIX & Internet Security, 3.2.2. The /etc/passwd File
nischown command : Practical UNIX & Internet Security, 19.5.4. Using NIS+
nispasswd command
Practical UNIX & Internet Security, 3.4. Changing Your Password
Practical UNIX & Internet Security, 19.5.4. Using NIS+
Practical UNIX & Internet Security, 19.5.4.2. When a user's passwords don't match
nisplus database class : sendmail, 33.8. Alphabetized Reference
NISPLUS macro : sendmail, 18.8. Alphabetized Reference
NIST (National Institute of Standards and Technology)
Practical UNIX & Internet Security, F.2.1. National Computer Security Center
Practical UNIX & Internet Security, F.3.4.26. National Institute of Standards and Technology
TCP/IP Network Administration, 12.1.2.2. Use mailing lists to distribute information
TCP/IP Network Administration, 13.1. The World Wide Web
NIST CSRC (Computer Security Resource Clearinghouse) : Building Internet Firewalls, A.5.3. NIST CSRC
NMS (Network Management Station) : TCP/IP Network Administration, 11.9. Simple Network Management Protocol
NNTP (Network News Transfer Protocol)
Building Internet Firewalls, 2.4. Usenet News
Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
Practical UNIX & Internet Security, 17.3.13. Network News Transport Protocol (NNTP) (TCP Port
TCP/IP Network Administration, 13.5.1. Newsgroups
(see also Usenet news)
configuring
Building Internet Firewalls, 8.5. Network News Transfer Protocol
Building Internet Firewalls, 9.1.1.4. NNTP
Building Internet Firewalls, 9.2.1.4. NNTP
NNTPSERVER variable : sendmail, 31.2.1. Syntax of the Command-Line Macro's Text
no answer error message : TCP/IP Network Administration, 11.3. Testing Basic Connectivity
NO_GROUP_SET macro : sendmail, 18.8. Alphabetized Reference
"No local mailer defined" message : sendmail, 6.2.1. Testing the client.cf File
"no mailer in parsed address" error : sendmail, 29.6. Rule Set 0
"no more data from sender" (FIN) bit : TCP/IP Network Administration, 1.6.2. Transmission Control Protocol
"No such file or directory" error : sendmail, 12.2. The File Form of Class
nobody user
Practical UNIX & Internet Security, 4.1. Users and Groups
Practical UNIX & Internet Security, 19.3.2.1. Creating passwords for users
sendmail, 22.8.3.1. The DefaultUser option
TCP/IP Network Administration, 5.4. The Internet Daemon
TCP/IP Network Administration, 9.1.2.1. The share command
nocanonify feature : sendmail, 19.6. Alphabetized m4 Macros
nodns feature
sendmail, 19.6. Alphabetized m4 Macros
sendmail, 21.1.2. Make sendmail DNS Aware
noexpn (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
noise, electrical : Practical UNIX & Internet Security, 12.2.1.8. Electrical noise
nonadaptive modems : (see modems)
nonauthoritative servers : TCP/IP Network Administration, 3.3.4. BIND, resolver, and named
nonblocking systems : Practical UNIX & Internet Security, 19.2. Sun's Remote Procedure Call (RPC)
nonbroadcast multi-access (NBMA) interfaces
TCP/IP Network Administration, B.6. Interface Statements
TCP/IP Network Administration, B.8.1. The ospf Statement
nonce : Practical UNIX & Internet Security, 23.3. Tips on Writing Network Programs
non-connected network : TCP/IP Network Administration, 4.1. Connected and Non-Connected Networks
non-encoded binary data : TCP/IP Network Administration, 3.4.3. Multipurpose Internet Mail Extensions
non-Internet sites, delivering mail to : TCP/IP Network Administration, C.3.1.4. Mail exchanger record
nonrecursive queries : TCP/IP Network Administration, 3.3.2. Creating Domains and Subdomains
nonrepudiation : Practical UNIX & Internet Security, 6.5. Message Digests and Digital Signatures
nonrouting dual-homed hosts
Building Internet Firewalls, 5.2.1. Nonrouting Dual-homed Hosts
Building Internet Firewalls, 5.8.2.5. Turning off routing
NORDUNET : Practical UNIX & Internet Security, F.3.4.27. NORDUNET
NOREAD= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
NoRecipientAction option : sendmail, 34.8. Alphabetized Reference
normalizing addresses : sendmail, 17.1.2. Normalize the Address
Northwestern University : Practical UNIX & Internet Security, F.3.4.28. Northwestern University
nosuid : Practical UNIX & Internet Security, 11.1.2. Back Doors and Trap Doors
notation, dotted decimal : TCP/IP Network Administration, 2.3. Subnets
NOTIFY command (SMTP) : sendmail, 36.7. Alphabetized Reference
NOTIFY extension, DSN : sendmail, 23.9. The qf File Internals
notifying people about problems
Building Internet Firewalls, 13.1.4. Make `Incident in Progress'
Building Internet Firewalls, 13.4.4. Planning for Notification of People
TCP/IP Network Administration, 12.4.2. Looking for Trouble
TCP/IP Network Administration, 12.4.2.2. Checking login activity
notsticky feature : sendmail, 19.6. Alphabetized m4 Macros
NOTUNIX macro : sendmail, 18.8. Alphabetized Reference
nouucp feature : sendmail, 19.6. Alphabetized m4 Macros
Novell : Practical UNIX & Internet Security, 1.3. History of UNIX
novrfy (sendmail) : Practical UNIX & Internet Security, 17.3.4.3. Improving the security of Berkeley sendmail V8
Nowitz, David : Practical UNIX & Internet Security, 15.2. Versions of UUCP
NOWRITE= command : Practical UNIX & Internet Security, 15.5.2. Permissions Commands
NP keyword : TCP/IP Network Administration, 12.2.1. The Shadow Password File
npasswd package : Practical UNIX & Internet Security, 8.8.2. Constraining Passwords
NPROC variable : Practical UNIX & Internet Security, 25.2.1.1. Too many processes
nrcpts= equate (syslog output) : sendmail, 26.1.3.6. nrcpts= the number of recipients
NS query : TCP/IP Network Administration, 11.6. Checking Name Service
NS resource records
TCP/IP Network Administration, 8.3.5. The Reverse Domain File
TCP/IP Network Administration, 8.3.6. The named.hosts File
TCP/IP Network Administration, C.3.1.2. Name server record
NSA (National Security Agency) : Practical UNIX & Internet Security, F.2.2. National Security Agency (NSA)
nservers option : TCP/IP Network Administration, 9.1.1. NFS Daemons
NSF (National Science Foundation)
TCP/IP Network Administration, 1.1. TCP/IP and the Internet
TCP/IP Network Administration, 7.5.2. Border Gateway Protocol
NSFNET
TCP/IP Network Administration, 2.4. Internet Routing Architecture
TCP/IP Network Administration, 7.4. Interior Routing Protocols
nslookup
sendmail, 21.4. How to Use nslookup
TCP/IP Network Administration, 4.4.1. Obtaining a Domain Name
TCP/IP Network Administration, 8.4. Using nslookup
in troubleshooting
TCP/IP Network Administration, 11.2. Diagnostic Tools
TCP/IP Network Administration, 11.3. Testing Basic Connectivity
TCP/IP Network Administration, 11.6. Checking Name Service
nsswitch.conf file
sendmail, 7.3.1. The hostname
sendmail, D.4. L and G Configuration Commands
TCP/IP Network Administration, 9.3.1. The nsswitch.conf file
TCP/IP Network Administration, E.4.2. sendmail Options
NSWS (NextStep Window Server) : Practical UNIX & Internet Security, 17.3.16. NEXTSTEP Window Server
NTP (Network Time Protocol)
Building Internet Firewalls, 2.11. Time Service
Building Internet Firewalls, 7.5. Proxying Without a Proxy Server
Practical UNIX & Internet Security, 17.3.14. Network Time Protocol (NTP) (UDP Port 123)
configuring : Building Internet Firewalls, 8.13. Network Time Protocol (NTP)
Secure RPC and : Practical UNIX & Internet Security, 19.3.1.3. Setting the window
NU-CERT : Practical UNIX & Internet Security, F.3.4.28. Northwestern University
null
addresses
sendmail, 10.3. Missing Addresses
sendmail, 17.1.1.3. Handle null address
sendmail, 30.8. Alphabetized F= Flags
database class : sendmail, 33.8. Alphabetized Reference
device : Practical UNIX & Internet Security, 5.6. Device Files
sendmail.cf file : sendmail, 5.2. The Minimal File
null.mc file : sendmail, 16.2. The null.mc File
nullclient feature : sendmail, 19.6. Alphabetized m4 Macros
numbers
sendmail, 29.1.1. Rule-Set Numbers
(see also identifiers)
delivery failure count : sendmail, 23.9. The qf File Internals
DNS errors : sendmail, B.1. Status file lines
inode and device : sendmail, 23.9. The qf File Internals
port : Building Internet Firewalls, C.12.2. Port Numbers
protocol : Building Internet Firewalls, C.12.1. Protocol Numbers
rule sets
sendmail, 8.3. Rule Sets
sendmail, 29.1.1. Rule-Set Numbers
SMTP status codes : sendmail, B.1. Status file lines
UNIX errors : sendmail, B.1. Status file lines
numeric addresses : (see addresses)
numeric-type arguments : sendmail, 34.5. Option Argument Types
numeric values, in printcap parameters : TCP/IP Network Administration, 9.2.1. The printcap File
nuucp account
Practical UNIX & Internet Security, 15.1.4. How the UUCP Commands Work
Practical UNIX & Internet Security, 15.3.1. Assigning Additional UUCP Logins
Practical UNIX & Internet Security, 15.4.1.3. Format of USERFILE entry without system name


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.