Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] p-node clients pac command Packet Drivers Packet Header field packets Bluetooth BOOTP Configure-Request DHCP DHCPINFORM ethernets 802.2 LLC standard 802.3 standard Ethernet II/PARC frames filtering 2nd 3rd intrusion detection routers magic page messages Palms Palo Alto Research Center (PARC) 2nd PAM (Password Authentication Manager) panel patches 2nd 3rd PANs (personal area networks) 2nd 3rd paper documentation PAR (Project Authorization Request) parameters -debug -nobsd -nofork passwords Unix PARC (Palo Alto Research Center) 2nd parity checks park mode partial mesh topologies partial synchronization partitioning Active Directory partner servers pass-through authentication passband technologies passive open connections password Authentication Manager (PAM) passwords clear-text construction guidelines default passwords, changing grabbers interdomain trust relationships policies 2nd account lockouts expirations history lists managing smart cards synchronizing tracking Unix Windows NT patches (panels) 2nd 3rd Pathworks pattern hopping Payload Type (PT) PC cards PC-cillin Internet Security suite PCF (Point Coordination Function) PCI (Peripheral Component Interconnect) 2nd PCL (Printer Control Language) PCL.SEP PCMCIA PCS (Physical Coding Sublayer) PDAs (Personal Digital Assistants) BlackBerries features of overview portable media centers, compared smartphones, compared PDCs (primary domain controllers) 2nd 3rd PDU (Protocol Data Unit) peer-to-peer networking models performance cables NAS Peripheral Component Interconnect (PCI) 2nd permanent virtual connection (PVC) permissions cumulative effects of Linux NetWare comparing NDS/file system rights Everyone group file system rights inheritance of rights object/property rights trustees NTFS 2nd SGID share-level SUID Unix user-level personal area networks (PANs) 2nd 3rd Personal Digital Assistants [See PDAs (Personal Digital Assistants), overview.] Personal Information Managers (PIMs) personnel, network upgrades PGP (Pretty Good Privacy) 2nd phones 2.4GHz cordless telephone smartphones PHY (Physical layer) 2nd 802.11 networks ATM IEEE 802 IEEE 802.11 standards Physical Coding Sublayer (PCS) physical interface cards (PICs) Physical layer [See PHY (Physical layer).] physical measures (network security) Physical Media Dependent (PMD) 2nd physical networks, planning physical topologies 2nd 3rd Piano piconets PICs (physical interface cards) PID (process ID) pilot programs PIMs (Personal Information Managers) ping command 2nd 3rd 4th Ping of Death piracy pitfalls of troubleshooting Plain Old Telephone Service (POTS) planning components disaster recovery logical network design maintenance migration arranging domains BDCs, upgrading centralized/decentralized management domain controllers implementing to Active Directories joining trees master domain model member servers modeling directories namespaces PDCs, upgrading networks avoiding sidetracks closing deploying documenting upgrades executing pilot programs measuring success restoring scheduling downtime setting goals testing training upgrading verifying corporate standards physical networks upgrading PLOGI (Port Login) plugs PMD (Physical Media Dependent) 2nd Point Coordination Function (PCF) point-to-point connections (leased lines) Fractional T1 T-carrier system troubleshooting T-carrier system Point-to-Point Protocol over Ethernet (PPPoE) 2nd policies 2nd auditing, configuring Windows 2000/2003 Windows NT 4.0 passwords 2nd security acceptable use statements elements to include escalation procedures guidelines for usage Network Connection Policy passwords poll packets pools (printers) POP3 (Post Office Protocol) Port Forwarding/Triggering dialogs Port Login (PLOGI) portable media centers ports back doors base I/O filtering FTP identifiers IP addresses legacy compatibility numbers routers switches TCP UDP uplink VLAN (virtual LAN) Windows NT Positive Completion replies Positive Intermediate replies Post Office Protocol (POP3) post-implementation reviews PostScript POTS (Plain Old Telephone Service) power conditioning Power Management component power problems (SOHO networks) power strips Power SUM PPP (Point-to-Point Protocol) 2nd frames LCP NCP RFCs Windows 2000 Professional Client PPPoE (Point-to-Point Protocol over Ethernet) 2nd PPTP (Point-to-Point Tunneling Protocol) selecting for wireless networks VPNs pr command PRBS (pseudorandom binary sequence) Pre-Shared Key (PSK) Preboot Execution Environment (PXE) predefined groups Presentation layer Pretty Good Privacy (PGP) 2nd prevention attacks digital certificates WANs down time maintenance backups disaster recovery documenting network monitoring NICs redundancy routine UPS network congestion security measures host computers routers training Tripwire updating virus-checking applications PRI (Primary Rate Interface) primary domain controllers (PDCs) 2nd 3rd primary servers primitives 2nd Print Operators group Print Server Printer Control Language (PCL) printers auditing events naming Properties searching Server Properties sharing troubleshooting Unix/Linux compared to NetWare Web browsers Windows NT printing FORTRAN hardware-based print servers IPP languages NetWare NPRINTER.NLM properties PSERVER.NLM print server applications protocols BSD IPP TCP/IP statistics Unix Windows 2000 Windows NT 4.0 Windows print servers adding printers printers/printing devices Windows XP Professional PrintQueue object privacy private keys privileges [See also rights, Windows NT, groups .] problem resolution cycle procedures 2nd NFS security troubleshooting process ID (PID) process of elimination, troubleshooting profiles Bluetooth Cordless Telephony Dial-Up Networking Generic Access Headset Intercom Serial Port Service Discovery Application users Project Authorization Request (PAR) promiscuous mode 2nd properties Document FTP MMC 2nd NetWare Print Queue object Print Server 2nd Printer Printer object properties property set attribute proprietary extensions 802.11a 802.11b 802.11g protection [See security, routers.] protocols analyzers decoding protocols establishing baselines filtering protocols hardware software statistical data ARP Bluetooth BOOTP 2nd client/server exchanges (DHCP) DHCP downloading operating systems options fields packet formats relay agents request/reply mechanisms support BSD configuring routers DECnet DHCP 2nd 3rd allocation APIPA authorizing servers BOOTP 2nd client/server exchanges clustering configuring customizing daemons DNS exclusions/reservations installing servers large/routed environments leasing servers managing logging MMC Action menu Red Hat Linux relay agents 2nd troubleshooting DISP EGP file servers filtering FTP commands data transfers firewalls ports/processes Red Hat Linux replies TFTP Windows command-line clients HELLO HTTP ICMP 2nd IGMP IGP IMAP4 client commands commands data formatting mailbox naming states system flags universal commands IP 2nd addressing ARP connections datagram headers Fibre Channel implementing proxy ARP RARP SANs subnetting supernetting unacknowledged protocol unreliable protocol IPCP IPP installing object types operations Version 1.1 Windows 2000 IPv6 comparing to IPv4 extension headers headers Options Type field IPXCP ISAKMP L2CAP LAN LCP LDAP 2nd binding requests comparing databases databases directories interoperability between directories metadirectories X.500 limitations LMP (Link Manager Protocol) lpr/lpd Mount 2nd multi-protocol label switching name resolution NAS NCP (NetWare Core Protocol) 2nd 3rd burst mode requests/responses terminating NetWare version 6 NFS 2nd configuring daemons procedures RPC server-side daemons troubleshooting XDR OBEX OSI POP3 PPP configuring Windows 2000 Professional Client LCP NCP RFCs RARP 2nd RIP router updates scalability version 2 RMON (Remote Monitoring Protocol) 2nd routers 2nd SAP SDP selecting SLIP SMB CIFS files negotiation NET commands Samba SMTP (Simple Mail Transfer Protocol) 2nd commands extensions models response codes transactions SNMP 2nd 3rd 4th MIB primitives proxy agents RMON SNMPv2/SNMPv3 Spanning Tree stacks 2nd 3rd stateful stateless TCP 2nd configuring sessions connections ending sessions headers LANs managing sessions security sessions TCP/IP name resolution OSI Reference model Unix TCS Telnet authentication commands NVT TFTP UDP 2nd 3rd headers ICMP interaction UNIX BOOTP DHCP FTP TCP/IP 2nd telnet Telnetxxx VLAN VPNs AH ESP IKE IPSec L2TP PPTP WANs protocols Data Unit (PDU) proxy agents proxy applications proxy ARP (Address Resolution Protocol) proxy servers 2nd 3rd 4th Proxy Settings dialog box PSCRIPT.SEP PSERVER.NLM pseudorandom binary sequence (PRBS) PSK (Pre-Shared Key) PSTN (public switched telephone network) 2nd 3rd 4th 5th 6th PT (Payload Type) Public group public keys 2nd public places, wireless networks public switched telephone network (PSTN) 2nd 3rd 4th 5th pulling records pulse width, configuring pushing records PVC (permanent virtual connection) PXE (Preboot Execution Environment) |