Upgrading and Repairing Networks (5th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

SA (security association)

SAE (stochastic arbitration event)

SAM (security accounts manager)

     domains

         controllers

         models

         replication between controllers

     User Manager utility

Samba 2nd

Samba.org

SAML command

sampling intervals

SANs (Storage Area Networks) 2nd 3rd 4th

     Arbitrated Loops

     fabric switched topology

     Fibre Channel

     IP

     mixed topologies

     selecting

SAP (Service Advertising Protocol)

SAPs (Service Access Points)

SAR (Segmentation and Reassembly)

saving SOHO networks

scalability

     Active Directory

     campus networks

     multi-tiered networks

     RIP

scams

scatternets

scavenging 2nd

schedules

     backups

     downtime

     rotation

schema

     Active Directory 2nd

         master

         modifying

     X.500

SCO (Synchronous Connection-Oriented)

scope

    addresses

         configuring

         creating

     groups, selecting

screened host architecture

SCSI (Small Computer Systems Interface)

     NAS

         capacity

         network appliances

         protocols

     SANs

         applying NAS

         Arbitrated Loops

         fabric switched topology

         Fibre Channel

         IP

         mixed topologies

SDP (Service Discovery Protocol)

SDSL (Single-line Digital Subscriber Line)

searching

     Active Directory

     databases

     NICs

     printers

     user accounts

secondary servers

Secure Hash Algorithm (SHA)

Secure Shell (SSH) 2nd 3rd

Secure Sockets Layer (SSL)

security

     802.11a networks

     802.11b networks

     access control mechanisms

         auditing

         identifying users

         resource protections

     ALWIL software

     Bluetooth

     CERT/CC

     delegating authority

     disabling default options

     encryption

         digital certificates 2nd

         PGP

         privacy

         public key encryption

         RSA public key encryption

         single-key encryption

         SSL handshakes

         types 2nd

     Ethernets

     fiber-optic cables

     firewalls 2nd

         executing

         filtering IP addresses

         FWTK

         hardware

         hybrids

         Intrusion Detection

         NAT

         packet filters

         port number filtering

         protocol filtering

         proxy applications

         proxy servers 2nd

         software

         SOHO

         troubleshooting

     FIRST

     FTP

     Gibson Research Corporation (GRC) 2nd

     Grisoft

     IEEE 802.10

     interdomain trust relationships

     levels

     Linux

     McAfee

     modes

     NAT

    NetWare

         Everyone group

         file system rights

         inheritance of rights

         NDS/file system rights, comparing

         object/property rights

         permissions

         trustees

     Novell

     NTBugTraq

     OpenSSL

     passwords

     permissions 2nd

     physical measures

     piracy

     policies

         acceptable use statements

         elements to include

         guidelines for usage

         Network Connection Policy

    procedures

         elements to include

         escalation procedures

     proxy servers

     routers

     services and system daemons

     share-level permissions

     SMB (Server Message Block)

     SSL

     Symantec

     Symantec Security Response

     TCP

     Telnet

     Trend Micro

     Unix

     user-level permissions

     viruses

     VPNs

         AH

         ESP

         IKE

         IPSec

         L2TP

         PPTP

         protocols

         RAS

     WANs

         back doors

         forged e-mail

         host computers

         network sniffers

         passwords

         preventing attacks

         preventive measures

         routers

         spoofing

         training

         Tripwire

         Trojan horses

         types of attacks

         updating

         viruses 2nd

    wireless networks

         features/standards crossreference

         knowing your users

         neighbors and

         overview 2nd

         SSIDs (service set identifiers)

         WEP

         wired networks, compared

        WPA [See WPA (Wired Protected Access), Enterprise certification.]

         WPA2 2nd

     Zone Labs

security accounts manager [See SAM (security accounts manager).]

security association (SA)

Security Equivalence

Security Parameters Index (SPI)

security policies

Segmentation and Reassembly (SAR)

segments 2nd

     cable segment length

     collision Domains

     LAN 2nd

         reasons to segment network users

         remote locations

         routers

         switches

Select Network Component Type dialog box

Select Network Protocol dialog box

Select Network Service dialog box

selected attributes

selecting

     directories

     drivers

     groups, scope

     Hardware bus types

     NAS

     ports

     protocols

     routers

     SANs

selectors, creating

SEND command

Sender-SMTP

separating logical and physical topologies

serial connections

Serial Line Internet Protocol (SLIP)

Serial Port profile

Server 2003 [See windows, backup; Server 2003.]

Server Message Block (SMB)

     CIFS

     files

     NET commands

     protocol negotiation

     Samba

     security

     types

Server Message Block protocol [See SMB (Server Message Block).]

servers

     adding

     backups

     BIND

     binding

    BOOTP

         client exchanges (DHCP)

         DHCP

         downloading operating systems

         options fields

         packet formats

         request/reply mechanisms

     caching

     configuring

     DFS

     DHCP

         APIPA

         authorizing

         BOOTP support

         clustering

         configuring

         daemons

         DNS

         exclusions/reservations

         installing

         large/routed environments

         leasing

         managing logging

         MMC Action menu

         Red Hat Linux

         relay agents 2nd

         troubleshooting

    DNS

         files

         Unix configuration

     dual-redundant network controllers

     files

    FTP [See FTP (File Transfer Protocol), ports/processes.]

     groups

     hardware-based print

     high-end

     installing

     master/slave (NIS)

     member 2nd 3rd

     multi-homed

     NBNS

     network Printer

    NFS

         configuring

         daemons

     NIS

     primary

     printer server applications

     proxy 2nd 3rd 4th

     secondary

     slaves (NIS)

     SMS

    SMTP

         commands

         extensions

         models

         response codes

         transactions

     statistics

    Telnet [See Telnet.]

     tftp

    Windows 2000

         adding printers

         installing DNS

    Windows 2000 Server

         ActiveState ActivePerl 5.6

         DFS

         DNS

         Korn Shell command

         NetWare

         passwords

         Telnet

        Unix [See Unix, ifconfig command.]

         upgrading

         user name mapping

         Windows 2003 Server upgrade

    Windows 2003

         Active Directory

         FTP 2nd

         installing Active Directory

         managing FTP

         protocols/utilities

         TCP/IP

         Telnetxxx

         upgrading to

    Windows 2003 Server

         Active Directory

         ActiveState ActivePerl 5.6

         auditing policies

         BOOTP

         DFS

         DNS

         Event Viewer

         groups

         installing

         Korn Shell command

         NetWare

         operating systems

         passwords

         servers

         Telnet 2nd

        Unix [See Unix, root account.]

         upgrading to

         user name mapping

         WINS

    Windows NT [See NT (Windows), domains, trust relationships .]

    Windows Print

         adding printers

         printers/printing devices

Service Access Points (SAPs)

Service Advertising Protocol (SAP)

Service Discovery Application profile

Service Discovery Protocol (SDP)

Service Level Agreement (SLA)

Service Pack 2 (SP2)

     OS changes from

     Wireless Network Setup Wizard 2nd

Service Pack 4 (Windows 2000)

service records (SRVs)

Service Resource Records (SRV RRs)

services

     Active Directory

     categories

     directory

         NDS

         X.500

     identifying

     IP addresses

     Knowledge Consistency Checker

     NetWare 6

     network security

     NIS 2nd

         clients

         domainname command

         maps

         master/slave servers

         modifying maps

         slaves

         starting

         yp commands

         ypserve daemon

     RPC

     security

     TCP/IP

Services for NetWare Version 5.0 [See SFN (Services for NetWare Version 5.0).]

Services for Unix [See SFU (Services for Unix).]

sessions

     layers

     one-way synchronization

     SMB

     TCP

         configuring

         ending

         managing

         security

     Telnet

         authentication

         commands

         NVT

     two-way synchronization

set commands

Set Group ID (SGID)

Set User ID (SUID)

setting goals

SFF (small form factor)

SFN (Services for NetWare Version 5.0)

     FMU

    FPNW

         4.0

         5.0

     MSDSS

         installation

         one-time migration

         one-way synchronization sessions

         prerequisites

         two-way synchronization sessions

SFU (Services for Unix) 2nd

     ActiveState ActivePerl 5.8

     installing

     Korn Shell commands

     password synchronization

     telnet

     user name mapping

SGID (Set Group ID)

SHA (Secure Hash Algorithm)

shadow password files 2nd

share-level permissions

share-level security

shareware [See also applications, assessing.]

sharing

     file systems

     network media

     printers

     topologies

shielded twisted-pair cables

shields

short frames

shutdown events

SIG (special interest group)

signal modulation

signatures (digital)

Simple Mail Transfer Protocol [See SMTP (Simple Mail Transfer Protocol).]

Simple Network Management Protocol [See SNMP (Simple Network Management Protocol).]

simple repeaters

single domain models

single hops

single-key encryption

site-to-site VPN

SIZE command

sizes

     fiber-optic cables

     giant frame errors

     windows

SLA (Service Level Agreement)

slaves 2nd

sliding windows

SLIP (Serial Line Internet Protocol)

slow starts

small businesses [See SOHO (small offices and home offices), routers.]

Small Computer Systems Interface [See SCSI (Small Computer Systems Interface).]

small form factor (SFF)

small office/home office [See SOHO (small offices and home offices), routers.]

smart cards

smartphones

SMB (Server Message Block)

     CIFS

     files

     NET commands

     protocol negotiation

     Samba

     security

     types

SMS (System Management Server)

SMTP (Simple Mail Transfer Protocol) 2nd

     commands

     extensions

     models

     response codes

     transactions

SNA (Systems Network Architecture)

snap features, 802.3

snap-ins (Active Directory)

     Computers and Users

     schema

SNIA (Storage Networking Industry Association)

sniff mode

sniffers

SNMP (Simple Network Management Protocol) 2nd 3rd 4th

     MIB

     primitives

     proxy agents

     RMON

     SNMPv2/SMNPv3

SOA (Start of Authority)

social engine

sockets

software [See applications, assessing; utilities, R-utilities.]

software-based analyzers

SOHO (small offices and home offices) 2nd

     antivirus tips

     backups

         data files

         full system backups

         software

     clients

     firewalls

     ISPs, contacting

     network topologies

    office applications

         CrossOver Office

         Microsoft Office Student and Teacher Edition 2003

         OpenOffice.org

         selecting

         StarOffice

         StarOffice 8 Suite

         WordPerfect Office X3

     requirements

     routers 2nd 3rd

     topologies

    troubleshooting

         cables

         components

         DHCP configuration issues

         firewalls

         power problems

         wireless problems

     vertical-market applications

SOML command

SonicWALL

source IP addresses

Source Service Access Point (SSAP)

Spanning Tree Protocol

special interest group (SIG)

special permissions (Windows NT)

specialized servers

speed (networks)

SPI (Security Parameters Index)

SpinRite 6

splicing fiber optic cables

splitters

spoofing

spooling 2nd

spread-spectrum technologies 2nd

spreadsheets

SRV RRs (Service Resource Records)

SRVs (service records)

SSAP (Source Service Access Point)

SSH (Secure Shell) 2nd 3rd

SSID field (Wireless-G broadband router installation)

SSIDs (service set identifiers)

SSL (Secure Sockets Layer)

stacks

     adding

     HBA

     protocols

     switches

standalone UPS systems

standard input

standard objects (Active Directory)

standard Select User Computer or Group dialog box

standards 2nd

     802.2 LLC

     802.3

     Active Directory

     corporate

     IEEE 2nd 3rd

     IEEE 802 LAN/MAN Standards Committee 2nd

     ISO

     LMSC (IEEE architectures)

         802

         802.1

         802.10

         802.11

         802.2

         802.3

         802.4

         802.5

         802.7

     OSI

     RFCs

     SNIA

     W3C

     X.500

standby mode

star topologies

     LAN

     wireless networks

star-wireless topologies

StarOffice

StarOffice 8 Suite

Start menu commands

     Active Directory Users and Computers

     Computer Management

     Internet Services Manager

Start of Authority (SOA)

Start/Search method

starting

     Arbitrated Loops

     networks

     NIS

startup events

STAT command

stateful protocols

stateless protocols

states

     IMAP4

     POP3

     tombstone

static entries

static IPs

     selecting for wireless networks

     troubleshooting SOHO networks

static mappings

statistics

     data

     printing

     servers

status command

stochastic arbitration event (SAE)

storage

     backups

     NAS

         capacity

         network appliances

         protocols

     SANs 2nd 3rd 4th

         applying NAS

         Arbitrated Loops

         fabric switched topology

         Fibre Channel

         IP

         mixed topologies

         selecting

Storage Area Networks [See SANs (Storage Area Networks).]

Storage Networking Industry Association (SNIA)

store-and-forward switches 2nd

STP (shielded twisted-pair)

stream ciphers

stream mode

strict source routing

Structured Query Language (SQL)

structures

     directories

     wiring

         backbone cabling system

         horizontal cabling system

         work area specification

su command 2nd

subheaders (LLC)

subnets

     IP addresses

     multi-homed systems

subsets [See also global catalogs.]

success, measuring upgrades

SUID (Set User ID)

Sun Microsystems 2nd

supernetting IP addresses

superscopes [See also scope, addresses, creating .]

support

     BOOTP

     costs

     UNIX

     Windows NT 2nd

surge protection 2nd

surveying users

SVC (switched virtual circuit) 2nd

SVR4 (System V, Release 4) 2nd

     administration commands

     commands

switches 2nd 3rd 4th

     10Base-2 networks

     applying

     collapsed backbones

     collisions 2nd

     Ethernet

     fabric switched topology

     full-duplex ethernet

     hardware types

         chassis

         cut-through switches 2nd

         home offices

         Layer 3 switches

         stackable

         store-and-forward switches 2nd

     Layer 3 2nd

     managing

     mixed topologies

     MPLS

     multi-protocol label

     network segments

     results

     routing

     troubleshooting

     upgrade from bridges 2nd

     VLANs 2nd

Symantec

Symantec Security Response

symmetric encryption 2nd

SYN (synchronization) flooding

synchronization

     full/partial

     one-way sessions

     passwords

     troubleshooting

     two-way sessions

synchronization (SYN) flooding

Synchronization profile

Synchronous Connection-Oriented (SCO)

syslog daemon

syslog utility 2nd

SYSPRINT.SEP

System Management Server (SMS)

System V, Release 4 (SVR4) 2nd

     administration commands

     commands

systems

     flags

     Information MMC utility

     log files

     multi-homed

Systems Network Architecture (SNA)

Категории