S



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

SA (security association)
SAE (stochastic arbitration event)
SAM (security accounts manager)
     domains
         controllers
         models
         replication between controllers
     User Manager utility
Samba 2nd
Samba.org
SAML command
sampling intervals
SANs (Storage Area Networks) 2nd 3rd 4th
     Arbitrated Loops
     fabric switched topology
     Fibre Channel
     IP
     mixed topologies
     selecting
SAP (Service Advertising Protocol)
SAPs (Service Access Points)
SAR (Segmentation and Reassembly)
saving SOHO networks
scalability
     Active Directory
     campus networks
     multi-tiered networks
     RIP
scams
scatternets
scavenging 2nd
schedules
     backups
     downtime
     rotation
schema
     Active Directory 2nd
         master
         modifying
     X.500
SCO (Synchronous Connection-Oriented)
scope
    addresses
         configuring
         creating
     groups, selecting
screened host architecture
SCSI (Small Computer Systems Interface)
     NAS
         capacity
         network appliances
         protocols
     SANs
         applying NAS
         Arbitrated Loops
         fabric switched topology
         Fibre Channel
         IP
         mixed topologies
SDP (Service Discovery Protocol)
SDSL (Single-line Digital Subscriber Line)
searching
     Active Directory
     databases
     NICs
     printers
     user accounts
secondary servers
Secure Hash Algorithm (SHA)
Secure Shell (SSH) 2nd 3rd
Secure Sockets Layer (SSL)
security
     802.11a networks
     802.11b networks
     access control mechanisms
         auditing
         identifying users
         resource protections
     ALWIL software
     Bluetooth
     CERT/CC
     delegating authority
     disabling default options
     encryption
         digital certificates 2nd
         PGP
         privacy
         public key encryption
         RSA public key encryption
         single-key encryption
         SSL handshakes
         types 2nd
     Ethernets
     fiber-optic cables
     firewalls 2nd
         executing
         filtering IP addresses
         FWTK
         hardware
         hybrids
         Intrusion Detection
         NAT
         packet filters
         port number filtering
         protocol filtering
         proxy applications
         proxy servers 2nd
         software
         SOHO
         troubleshooting
     FIRST
     FTP
     Gibson Research Corporation (GRC) 2nd
     Grisoft
     IEEE 802.10
     interdomain trust relationships
     levels
     Linux
     McAfee
     modes
     NAT
    NetWare
         Everyone group
         file system rights
         inheritance of rights
         NDS/file system rights, comparing
         object/property rights
         permissions
         trustees
     Novell
     NTBugTraq
     OpenSSL
     passwords
     permissions 2nd
     physical measures
     piracy
     policies
         acceptable use statements
         elements to include
         guidelines for usage
         Network Connection Policy
    procedures
         elements to include
         escalation procedures
     proxy servers
     routers
     services and system daemons
     share-level permissions
     SMB (Server Message Block)
     SSL
     Symantec
     Symantec Security Response
     TCP
     Telnet
     Trend Micro
     Unix
     user-level permissions
     viruses
     VPNs
         AH
         ESP
         IKE
         IPSec
         L2TP
         PPTP
         protocols
         RAS
     WANs
         back doors
         forged e-mail
         host computers
         network sniffers
         passwords
         preventing attacks
         preventive measures
         routers
         spoofing
         training
         Tripwire
         Trojan horses
         types of attacks
         updating
         viruses 2nd
    wireless networks
         features/standards crossreference
         knowing your users
         neighbors and
         overview 2nd
         SSIDs (service set identifiers)
         WEP
         wired networks, compared
        WPA [See WPA (Wired Protected Access), Enterprise certification.]
         WPA2 2nd
     Zone Labs
security accounts manager [See SAM (security accounts manager).]
security association (SA)
Security Equivalence
Security Parameters Index (SPI)
security policies
Segmentation and Reassembly (SAR)
segments 2nd
     cable segment length
     collision Domains
     LAN 2nd
         reasons to segment network users
         remote locations
         routers
         switches
Select Network Component Type dialog box
Select Network Protocol dialog box
Select Network Service dialog box
selected attributes
selecting
     directories
     drivers
     groups, scope
     Hardware bus types
     NAS
     ports
     protocols
     routers
     SANs
selectors, creating
SEND command
Sender-SMTP
separating logical and physical topologies
serial connections
Serial Line Internet Protocol (SLIP)
Serial Port profile
Server 2003 [See windows, backup; Server 2003.]
Server Message Block (SMB)
     CIFS
     files
     NET commands
     protocol negotiation
     Samba
     security
     types
Server Message Block protocol [See SMB (Server Message Block).]
servers
     adding
     backups
     BIND
     binding
    BOOTP
         client exchanges (DHCP)
         DHCP
         downloading operating systems
         options fields
         packet formats
         request/reply mechanisms
     caching
     configuring
     DFS
     DHCP
         APIPA
         authorizing
         BOOTP support
         clustering
         configuring
         daemons
         DNS
         exclusions/reservations
         installing
         large/routed environments
         leasing
         managing logging
         MMC Action menu
         Red Hat Linux
         relay agents 2nd
         troubleshooting
    DNS
         files
         Unix configuration
     dual-redundant network controllers
     files
    FTP [See FTP (File Transfer Protocol), ports/processes.]
     groups
     hardware-based print
     high-end
     installing
     master/slave (NIS)
     member 2nd 3rd
     multi-homed
     NBNS
     network Printer
    NFS
         configuring
         daemons
     NIS
     primary
     printer server applications
     proxy 2nd 3rd 4th
     secondary
     slaves (NIS)
     SMS
    SMTP
         commands
         extensions
         models
         response codes
         transactions
     statistics
    Telnet [See Telnet.]
     tftp
    Windows 2000
         adding printers
         installing DNS
    Windows 2000 Server
         ActiveState ActivePerl 5.6
         DFS
         DNS
         Korn Shell command
         NetWare
         passwords
         Telnet
        Unix [See Unix, ifconfig command.]
         upgrading
         user name mapping
         Windows 2003 Server upgrade
    Windows 2003
         Active Directory
         FTP 2nd
         installing Active Directory
         managing FTP
         protocols/utilities
         TCP/IP
         Telnetxxx
         upgrading to
    Windows 2003 Server
         Active Directory
         ActiveState ActivePerl 5.6
         auditing policies
         BOOTP
         DFS
         DNS
         Event Viewer
         groups
         installing
         Korn Shell command
         NetWare
         operating systems
         passwords
         servers
         Telnet 2nd
        Unix [See Unix, root account.]
         upgrading to
         user name mapping
         WINS
    Windows NT [See NT (Windows), domains, trust relationships .]
    Windows Print
         adding printers
         printers/printing devices
Service Access Points (SAPs)
Service Advertising Protocol (SAP)
Service Discovery Application profile
Service Discovery Protocol (SDP)
Service Level Agreement (SLA)
Service Pack 2 (SP2)
     OS changes from
     Wireless Network Setup Wizard 2nd
Service Pack 4 (Windows 2000)
service records (SRVs)
Service Resource Records (SRV RRs)
services
     Active Directory
     categories
     directory
         NDS
         X.500
     identifying
     IP addresses
     Knowledge Consistency Checker
     NetWare 6
     network security
     NIS 2nd
         clients
         domainname command
         maps
         master/slave servers
         modifying maps
         slaves
         starting
         yp commands
         ypserve daemon
     RPC
     security
     TCP/IP
Services for NetWare Version 5.0 [See SFN (Services for NetWare Version 5.0).]
Services for Unix [See SFU (Services for Unix).]
sessions
     layers
     one-way synchronization
     SMB
     TCP
         configuring
         ending
         managing
         security
     Telnet
         authentication
         commands
         NVT
     two-way synchronization
set commands
Set Group ID (SGID)
Set User ID (SUID)
setting goals
SFF (small form factor)
SFN (Services for NetWare Version 5.0)
     FMU
    FPNW
         4.0
         5.0
     MSDSS
         installation
         one-time migration
         one-way synchronization sessions
         prerequisites
         two-way synchronization sessions
SFU (Services for Unix) 2nd
     ActiveState ActivePerl 5.8
     installing
     Korn Shell commands
     password synchronization
     telnet
     user name mapping
SGID (Set Group ID)
SHA (Secure Hash Algorithm)
shadow password files 2nd
share-level permissions
share-level security
shareware [See also applications, assessing.]
sharing
     file systems
     network media
     printers
     topologies
shielded twisted-pair cables
shields
short frames
shutdown events
SIG (special interest group)
signal modulation
signatures (digital)
Simple Mail Transfer Protocol [See SMTP (Simple Mail Transfer Protocol).]
Simple Network Management Protocol [See SNMP (Simple Network Management Protocol).]
simple repeaters
single domain models
single hops
single-key encryption
site-to-site VPN
SIZE command
sizes
     fiber-optic cables
     giant frame errors
     windows
SLA (Service Level Agreement)
slaves 2nd
sliding windows
SLIP (Serial Line Internet Protocol)
slow starts
small businesses [See SOHO (small offices and home offices), routers.]
Small Computer Systems Interface [See SCSI (Small Computer Systems Interface).]
small form factor (SFF)
small office/home office [See SOHO (small offices and home offices), routers.]
smart cards
smartphones
SMB (Server Message Block)
     CIFS
     files
     NET commands
     protocol negotiation
     Samba
     security
     types
SMS (System Management Server)
SMTP (Simple Mail Transfer Protocol) 2nd
     commands
     extensions
     models
     response codes
     transactions
SNA (Systems Network Architecture)
snap features, 802.3
snap-ins (Active Directory)
     Computers and Users
     schema
SNIA (Storage Networking Industry Association)
sniff mode
sniffers
SNMP (Simple Network Management Protocol) 2nd 3rd 4th
     MIB
     primitives
     proxy agents
     RMON
     SNMPv2/SMNPv3
SOA (Start of Authority)
social engine
sockets
software [See applications, assessing; utilities, R-utilities.]
software-based analyzers
SOHO (small offices and home offices) 2nd
     antivirus tips
     backups
         data files
         full system backups
         software
     clients
     firewalls
     ISPs, contacting
     network topologies
    office applications
         CrossOver Office
         Microsoft Office Student and Teacher Edition 2003
         OpenOffice.org
         selecting
         StarOffice
         StarOffice 8 Suite
         WordPerfect Office X3
     requirements
     routers 2nd 3rd
     topologies
    troubleshooting
         cables
         components
         DHCP configuration issues
         firewalls
         power problems
         wireless problems
     vertical-market applications
SOML command
SonicWALL
source IP addresses
Source Service Access Point (SSAP)
Spanning Tree Protocol
special interest group (SIG)
special permissions (Windows NT)
specialized servers
speed (networks)
SPI (Security Parameters Index)
SpinRite 6
splicing fiber optic cables
splitters
spoofing
spooling 2nd
spread-spectrum technologies 2nd
spreadsheets
SRV RRs (Service Resource Records)
SRVs (service records)
SSAP (Source Service Access Point)
SSH (Secure Shell) 2nd 3rd
SSID field (Wireless-G broadband router installation)
SSIDs (service set identifiers)
SSL (Secure Sockets Layer)
stacks
     adding
     HBA
     protocols
     switches
standalone UPS systems
standard input
standard objects (Active Directory)
standard Select User Computer or Group dialog box
standards 2nd
     802.2 LLC
     802.3
     Active Directory
     corporate
     IEEE 2nd 3rd
     IEEE 802 LAN/MAN Standards Committee 2nd
     ISO
     LMSC (IEEE architectures)
         802
         802.1
         802.10
         802.11
         802.2
         802.3
         802.4
         802.5
         802.7
     OSI
     RFCs
     SNIA
     W3C
     X.500
standby mode
star topologies
     LAN
     wireless networks
star-wireless topologies
StarOffice
StarOffice 8 Suite
Start menu commands
     Active Directory Users and Computers
     Computer Management
     Internet Services Manager
Start of Authority (SOA)
Start/Search method
starting
     Arbitrated Loops
     networks
     NIS
startup events
STAT command
stateful protocols
stateless protocols
states
     IMAP4
     POP3
     tombstone
static entries
static IPs
     selecting for wireless networks
     troubleshooting SOHO networks
static mappings
statistics
     data
     printing
     servers
status command
stochastic arbitration event (SAE)
storage
     backups
     NAS
         capacity
         network appliances
         protocols
     SANs 2nd 3rd 4th
         applying NAS
         Arbitrated Loops
         fabric switched topology
         Fibre Channel
         IP
         mixed topologies
         selecting
Storage Area Networks [See SANs (Storage Area Networks).]
Storage Networking Industry Association (SNIA)
store-and-forward switches 2nd
STP (shielded twisted-pair)
stream ciphers
stream mode
strict source routing
Structured Query Language (SQL)
structures
     directories
     wiring
         backbone cabling system
         horizontal cabling system
         work area specification
su command 2nd
subheaders (LLC)
subnets
     IP addresses
     multi-homed systems
subsets [See also global catalogs.]
success, measuring upgrades
SUID (Set User ID)
Sun Microsystems 2nd
supernetting IP addresses
superscopes [See also scope, addresses, creating .]
support
     BOOTP
     costs
     UNIX
     Windows NT 2nd
surge protection 2nd
surveying users
SVC (switched virtual circuit) 2nd
SVR4 (System V, Release 4) 2nd
     administration commands
     commands
switches 2nd 3rd 4th
     10Base-2 networks
     applying
     collapsed backbones
     collisions 2nd
     Ethernet
     fabric switched topology
     full-duplex ethernet
     hardware types
         chassis
         cut-through switches 2nd
         home offices
         Layer 3 switches
         stackable
         store-and-forward switches 2nd
     Layer 3 2nd
     managing
     mixed topologies
     MPLS
     multi-protocol label
     network segments
     results
     routing
     troubleshooting
     upgrade from bridges 2nd
     VLANs 2nd
Symantec
Symantec Security Response
symmetric encryption 2nd
SYN (synchronization) flooding
synchronization
     full/partial
     one-way sessions
     passwords
     troubleshooting
     two-way sessions
synchronization (SYN) flooding
Synchronization profile
Synchronous Connection-Oriented (SCO)
syslog daemon
syslog utility 2nd
SYSPRINT.SEP
System Management Server (SMS)
System V, Release 4 (SVR4) 2nd
     administration commands
     commands
systems
     flags
     Information MMC utility
     log files
     multi-homed
Systems Network Architecture (SNA)




Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2006
Pages: 411

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net