Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] SA (security association) SAE (stochastic arbitration event) SAM (security accounts manager) domains controllers models replication between controllers User Manager utility Samba 2nd Samba.org SAML command sampling intervals SANs (Storage Area Networks) 2nd 3rd 4th Arbitrated Loops fabric switched topology Fibre Channel IP mixed topologies selecting SAP (Service Advertising Protocol) SAPs (Service Access Points) SAR (Segmentation and Reassembly) saving SOHO networks scalability Active Directory campus networks multi-tiered networks RIP scams scatternets scavenging 2nd schedules backups downtime rotation schema Active Directory 2nd master modifying X.500 SCO (Synchronous Connection-Oriented) scope addresses configuring creating groups, selecting screened host architecture SCSI (Small Computer Systems Interface) NAS capacity network appliances protocols SANs applying NAS Arbitrated Loops fabric switched topology Fibre Channel IP mixed topologies SDP (Service Discovery Protocol) SDSL (Single-line Digital Subscriber Line) searching Active Directory databases NICs printers user accounts secondary servers Secure Hash Algorithm (SHA) Secure Shell (SSH) 2nd 3rd Secure Sockets Layer (SSL) security 802.11a networks 802.11b networks access control mechanisms auditing identifying users resource protections ALWIL software Bluetooth CERT/CC delegating authority disabling default options encryption digital certificates 2nd PGP privacy public key encryption RSA public key encryption single-key encryption SSL handshakes types 2nd Ethernets fiber-optic cables firewalls 2nd executing filtering IP addresses FWTK hardware hybrids Intrusion Detection NAT packet filters port number filtering protocol filtering proxy applications proxy servers 2nd software SOHO troubleshooting FIRST FTP Gibson Research Corporation (GRC) 2nd Grisoft IEEE 802.10 interdomain trust relationships levels Linux McAfee modes NAT NetWare Everyone group file system rights inheritance of rights NDS/file system rights, comparing object/property rights permissions trustees Novell NTBugTraq OpenSSL passwords permissions 2nd physical measures piracy policies acceptable use statements elements to include guidelines for usage Network Connection Policy procedures elements to include escalation procedures proxy servers routers services and system daemons share-level permissions SMB (Server Message Block) SSL Symantec Symantec Security Response TCP Telnet Trend Micro Unix user-level permissions viruses VPNs AH ESP IKE IPSec L2TP PPTP protocols RAS WANs back doors forged e-mail host computers network sniffers passwords preventing attacks preventive measures routers spoofing training Tripwire Trojan horses types of attacks updating viruses 2nd wireless networks features/standards crossreference knowing your users neighbors and overview 2nd SSIDs (service set identifiers) WEP wired networks, compared WPA [See WPA (Wired Protected Access), Enterprise certification.] WPA2 2nd Zone Labs security accounts manager [See SAM (security accounts manager).] security association (SA) Security Equivalence Security Parameters Index (SPI) security policies Segmentation and Reassembly (SAR) segments 2nd cable segment length collision Domains LAN 2nd reasons to segment network users remote locations routers switches Select Network Component Type dialog box Select Network Protocol dialog box Select Network Service dialog box selected attributes selecting directories drivers groups, scope Hardware bus types NAS ports protocols routers SANs selectors, creating SEND command Sender-SMTP separating logical and physical topologies serial connections Serial Line Internet Protocol (SLIP) Serial Port profile Server 2003 [See windows, backup; Server 2003.] Server Message Block (SMB) CIFS files NET commands protocol negotiation Samba security types Server Message Block protocol [See SMB (Server Message Block).] servers adding backups BIND binding BOOTP client exchanges (DHCP) DHCP downloading operating systems options fields packet formats request/reply mechanisms caching configuring DFS DHCP APIPA authorizing BOOTP support clustering configuring daemons DNS exclusions/reservations installing large/routed environments leasing managing logging MMC Action menu Red Hat Linux relay agents 2nd troubleshooting DNS files Unix configuration dual-redundant network controllers files FTP [See FTP (File Transfer Protocol), ports/processes.] groups hardware-based print high-end installing master/slave (NIS) member 2nd 3rd multi-homed NBNS network Printer NFS configuring daemons NIS primary printer server applications proxy 2nd 3rd 4th secondary slaves (NIS) SMS SMTP commands extensions models response codes transactions statistics Telnet [See Telnet.] tftp Windows 2000 adding printers installing DNS Windows 2000 Server ActiveState ActivePerl 5.6 DFS DNS Korn Shell command NetWare passwords Telnet Unix [See Unix, ifconfig command.] upgrading user name mapping Windows 2003 Server upgrade Windows 2003 Active Directory FTP 2nd installing Active Directory managing FTP protocols/utilities TCP/IP Telnetxxx upgrading to Windows 2003 Server Active Directory ActiveState ActivePerl 5.6 auditing policies BOOTP DFS DNS Event Viewer groups installing Korn Shell command NetWare operating systems passwords servers Telnet 2nd Unix [See Unix, root account.] upgrading to user name mapping WINS Windows NT [See NT (Windows), domains, trust relationships .] Windows Print adding printers printers/printing devices Service Access Points (SAPs) Service Advertising Protocol (SAP) Service Discovery Application profile Service Discovery Protocol (SDP) Service Level Agreement (SLA) Service Pack 2 (SP2) OS changes from Wireless Network Setup Wizard 2nd Service Pack 4 (Windows 2000) service records (SRVs) Service Resource Records (SRV RRs) services Active Directory categories directory NDS X.500 identifying IP addresses Knowledge Consistency Checker NetWare 6 network security NIS 2nd clients domainname command maps master/slave servers modifying maps slaves starting yp commands ypserve daemon RPC security TCP/IP Services for NetWare Version 5.0 [See SFN (Services for NetWare Version 5.0).] Services for Unix [See SFU (Services for Unix).] sessions layers one-way synchronization SMB TCP configuring ending managing security Telnet authentication commands NVT two-way synchronization set commands Set Group ID (SGID) Set User ID (SUID) setting goals SFF (small form factor) SFN (Services for NetWare Version 5.0) FMU FPNW 4.0 5.0 MSDSS installation one-time migration one-way synchronization sessions prerequisites two-way synchronization sessions SFU (Services for Unix) 2nd ActiveState ActivePerl 5.8 installing Korn Shell commands password synchronization telnet user name mapping SGID (Set Group ID) SHA (Secure Hash Algorithm) shadow password files 2nd share-level permissions share-level security shareware [See also applications, assessing.] sharing file systems network media printers topologies shielded twisted-pair cables shields short frames shutdown events SIG (special interest group) signal modulation signatures (digital) Simple Mail Transfer Protocol [See SMTP (Simple Mail Transfer Protocol).] Simple Network Management Protocol [See SNMP (Simple Network Management Protocol).] simple repeaters single domain models single hops single-key encryption site-to-site VPN SIZE command sizes fiber-optic cables giant frame errors windows SLA (Service Level Agreement) slaves 2nd sliding windows SLIP (Serial Line Internet Protocol) slow starts small businesses [See SOHO (small offices and home offices), routers.] Small Computer Systems Interface [See SCSI (Small Computer Systems Interface).] small form factor (SFF) small office/home office [See SOHO (small offices and home offices), routers.] smart cards smartphones SMB (Server Message Block) CIFS files NET commands protocol negotiation Samba security types SMS (System Management Server) SMTP (Simple Mail Transfer Protocol) 2nd commands extensions models response codes transactions SNA (Systems Network Architecture) snap features, 802.3 snap-ins (Active Directory) Computers and Users schema SNIA (Storage Networking Industry Association) sniff mode sniffers SNMP (Simple Network Management Protocol) 2nd 3rd 4th MIB primitives proxy agents RMON SNMPv2/SMNPv3 SOA (Start of Authority) social engine sockets software [See applications, assessing; utilities, R-utilities.] software-based analyzers SOHO (small offices and home offices) 2nd antivirus tips backups data files full system backups software clients firewalls ISPs, contacting network topologies office applications CrossOver Office Microsoft Office Student and Teacher Edition 2003 OpenOffice.org selecting StarOffice StarOffice 8 Suite WordPerfect Office X3 requirements routers 2nd 3rd topologies troubleshooting cables components DHCP configuration issues firewalls power problems wireless problems vertical-market applications SOML command SonicWALL source IP addresses Source Service Access Point (SSAP) Spanning Tree Protocol special interest group (SIG) special permissions (Windows NT) specialized servers speed (networks) SPI (Security Parameters Index) SpinRite 6 splicing fiber optic cables splitters spoofing spooling 2nd spread-spectrum technologies 2nd spreadsheets SRV RRs (Service Resource Records) SRVs (service records) SSAP (Source Service Access Point) SSH (Secure Shell) 2nd 3rd SSID field (Wireless-G broadband router installation) SSIDs (service set identifiers) SSL (Secure Sockets Layer) stacks adding HBA protocols switches standalone UPS systems standard input standard objects (Active Directory) standard Select User Computer or Group dialog box standards 2nd 802.2 LLC 802.3 Active Directory corporate IEEE 2nd 3rd IEEE 802 LAN/MAN Standards Committee 2nd ISO LMSC (IEEE architectures) 802 802.1 802.10 802.11 802.2 802.3 802.4 802.5 802.7 OSI RFCs SNIA W3C X.500 standby mode star topologies LAN wireless networks star-wireless topologies StarOffice StarOffice 8 Suite Start menu commands Active Directory Users and Computers Computer Management Internet Services Manager Start of Authority (SOA) Start/Search method starting Arbitrated Loops networks NIS startup events STAT command stateful protocols stateless protocols states IMAP4 POP3 tombstone static entries static IPs selecting for wireless networks troubleshooting SOHO networks static mappings statistics data printing servers status command stochastic arbitration event (SAE) storage backups NAS capacity network appliances protocols SANs 2nd 3rd 4th applying NAS Arbitrated Loops fabric switched topology Fibre Channel IP mixed topologies selecting Storage Area Networks [See SANs (Storage Area Networks).] Storage Networking Industry Association (SNIA) store-and-forward switches 2nd STP (shielded twisted-pair) stream ciphers stream mode strict source routing Structured Query Language (SQL) structures directories wiring backbone cabling system horizontal cabling system work area specification su command 2nd subheaders (LLC) subnets IP addresses multi-homed systems subsets [See also global catalogs.] success, measuring upgrades SUID (Set User ID) Sun Microsystems 2nd supernetting IP addresses superscopes [See also scope, addresses, creating .] support BOOTP costs UNIX Windows NT 2nd surge protection 2nd surveying users SVC (switched virtual circuit) 2nd SVR4 (System V, Release 4) 2nd administration commands commands switches 2nd 3rd 4th 10Base-2 networks applying collapsed backbones collisions 2nd Ethernet fabric switched topology full-duplex ethernet hardware types chassis cut-through switches 2nd home offices Layer 3 switches stackable store-and-forward switches 2nd Layer 3 2nd managing mixed topologies MPLS multi-protocol label network segments results routing troubleshooting upgrade from bridges 2nd VLANs 2nd Symantec Symantec Security Response symmetric encryption 2nd SYN (synchronization) flooding synchronization full/partial one-way sessions passwords troubleshooting two-way sessions synchronization (SYN) flooding Synchronization profile Synchronous Connection-Oriented (SCO) syslog daemon syslog utility 2nd SYSPRINT.SEP System Management Server (SMS) System V, Release 4 (SVR4) 2nd administration commands commands systems flags Information MMC utility log files multi-homed Systems Network Architecture (SNA) |