A

A flag (Linux routing table), The Routing Table
A records, The Cache Initialization File, Using nslookup
named.ca file, The Cache Initialization File
nslookup command, Using nslookup
ABORT keyword (chat), chat
ACCEPT keyword (iptables command), Defining iptables filter rules
access control, Defining Access Controls, Requiring user authenticationImproved user authentication, Setting file-level access controls, Setting document-level access controls, Access Control, wrapper, tcpd access control filestcpd access control files, Defining an optional shell command, Optional access control language extensions, Controlling Access with xinetdControlling Access with xinetd, Firewalls
Apache, Defining Access Controls, Requiring user authenticationImproved user authentication, Setting file-level access controls, Setting document-level access controls
document level, Setting document-level access controls
file level, Setting file-level access controls
overview, Defining Access Controls
user authentication, Requiring user authenticationImproved user authentication
language extensions, Optional access control language extensions
packet filtering, Firewalls
security, Access Control, tcpd access control filestcpd access control files, Defining an optional shell command
overview, Access Control
shell command, Defining an optional shell command
tcpd, tcpd access control filestcpd access control files
wrapper package, wrapper
xinetd, Controlling Access with xinetdControlling Access with xinetd
access.conf (Apache configuration file), Configuring the Apache Server
AccessFileName directive (Apache), Directory-Level Configuration Controls
access_times parameter (xinetd), Controlling Access with xinetd
acdirmax= option (vfstab file), The vfstab and fstab files
acdirmin= option (vfstab file), The vfstab and fstab files
Acknowledgment Number field (TCP headers), Transmission Control Protocol
Acknowledgment Segment (TCP headers), Transmission Control Protocol
acl statement (named.conf file), The acl Statement
aclok option (share command), The share command
acquire (EGP trace option), The egp Statement
acquiring a neighbor (EGP), Exterior Gateway Protocol
acregmax= option (vfstab file), The vfstab and fstab files
acregmin= option (vfstab file), The vfstab and fstab files
actimeo= option (vfstab file), The vfstab and fstab files
action field (inittab file), Understanding /etc/inittab
active keyword (routed command), Running RIP with routed
active-filter option (pppd), The PPP Daemon
add keyword (dbmmanage command), Improved user authentication
add keyword (route command), Building a Static Routing Table
AddEncoding directive (httpd.conf file), Defining File Types
AddIcon directive (Apache), Creating a Fancy Index
AddIconByEncoding directive (Apache), Creating a Fancy Index
AddIconByType directive (Apache), Creating a Fancy Index
Additional (DNS response packets), dig: An Alternative to nslookup
additional-from-auth parameter (named BIND 9 options statement), The BIND 9 options statement
additional-from-cache (named BIND 9 options statement), The BIND 9 options statement
AddLanguage directive (httpd.conf file), Defining File Types
AddModule directive (httpd.conf file), Loading Dynamic Shared Objects, Loading Dynamic Shared Objects
Solaris modules, Loading Dynamic Shared Objects
address argument (ifconfig command), The ifconfig Command
address blocks, Address Structure
address conversion database (sendmail), Building a sendmail.cf with m4 macros
address field (chap-secrets file), PPP Daemon Security
Address field (netstat command), The Interface Name
address option (share command), The share command
address records, Address record
address resolution, Address Resolution
Address Resolution Protocol, Address Resolution (see ARP)
Address value (dhcpd option statement), DHCP Options
address-list option (named), The options Statement
addresses, TCP/IP Features, Network Access Layer, Addressing, Routing, and Multiplexing, The IP Address, The IP Address, The IP Address, The IP Address, The IP Address, The IP Address, Address Structure, Address Structure, SubnetsSubnets, Subnets, Subnets, The Natural Mask, The Natural MaskThe Natural Mask, The Natural Mask, The Natural Mask, The Natural Mask, The Natural Mask, CIDR Blocks and Route Aggregation, CIDR Blocks and Route Aggregation, CIDR Blocks and Route Aggregation, CIDR Blocks and Route Aggregation, IPv6, IPv6, Address Resolution, The Host Table, Dynamic Host Configuration Protocol, Dynamic Host Configuration Protocol, How DHCP works, Getting Started, Obtaining an IP AddressObtaining an IP Address, Obtaining an IP Address, Obtaining an IP Address, Obtaining an IP Address, Obtaining an official network addressObtaining an official network address, Obtaining an official network address, Obtaining an official network address, Obtaining an IN-ADDR.ARPA domain, Assigning Host Addresses, Defining the Subnet Mask, Defining the Subnet Mask, The ifconfig Command, The Cache Initialization FileThe Cache Initialization File, The named.local File, The Reverse Zone FileThe Reverse Zone File, The Forward-Mapping Zone FileThe Forward-Mapping Zone File, The share command, dhcpd.conf, Building a sendmail.cf with m4 macros, Transforming the AddressTransforming the Address, Transforming with a database, Using Key Files in sendmail, Troubleshooting with the arp CommandARP problem case study, Definition Statements, The sendmail Command, The sendmail Command, The sendmail Command
(see also IP addresses)
assigning, CIDR Blocks and Route Aggregation, The ifconfig Command
contiguous blocks, CIDR Blocks and Route Aggregation
ifconfig command, The ifconfig Command
bit masks, Address Structure, The Natural Mask
broadcast, The IP Address, The IP Address
cache initialization file, The Cache Initialization FileThe Cache Initialization File
CIDR, CIDR Blocks and Route Aggregation
classes of, The Natural Mask
conversion database (sendmail), Building a sendmail.cf with m4 macros
datagrams, The IP Address
default gateway, need for, Getting Started
default masks, identifying, The Natural Mask
DHCP, assigning, Dynamic Host Configuration Protocol
dynamic allocation, dhcpd.conf file, dhcpd.conf
expected utilization rate, Obtaining an official network address
host, The Natural Mask, Assigning Host Addresses
assigning, Assigning Host Addresses
interpreting, The Natural Mask
IPv6, IPv6
limited broadcast, How DHCP works
loopback, The Host Table, The named.local File
converting to localhost, The named.local File
localhost, The Host Table
martians (gated), Definition Statements
multicast, The IP Address
natural mask, The Natural MaskThe Natural Mask
Network Access Layer, Network Access Layer
network growth, effect on addressing schemes, CIDR Blocks and Route Aggregation
obtaining, Obtaining an IP AddressObtaining an IP Address
official, assessing need for, Obtaining an official network addressObtaining an official network address
overriding (sendmail), The sendmail Command
registries, obtaining from, Obtaining an official network address
reserved, The IP Address
resolution of, Address Resolution
reverse domains, Obtaining an IN-ADDR.ARPA domain
rewrite rules, testing (sendmail), The sendmail Command
routing tables, reducing size of, CIDR Blocks and Route Aggregation
sendmail, Transforming the AddressTransforming the Address, Transforming with a database, Using Key Files in sendmail
transformation databases, Using Key Files in sendmail
transforming, Transforming the AddressTransforming the Address, Transforming with a database
share command and, The share command
shortage of, IPv6
spoofing, Obtaining an IP Address
subnet mask, defining, Defining the Subnet Mask, Defining the Subnet Mask
subnet masks, Subnets, Subnets
creating, Subnets
RFCs, Subnets
subnets, SubnetsSubnets
timing out, Dynamic Host Configuration Protocol
translating, The Reverse Zone FileThe Reverse Zone File, The Forward-Mapping Zone FileThe Forward-Mapping Zone File, Troubleshooting with the arp CommandARP problem case study
forward-mapping zone files, The Forward-Mapping Zone FileThe Forward-Mapping Zone File
reverse zone files, The Reverse Zone FileThe Reverse Zone File
troubleshooting, Troubleshooting with the arp CommandARP problem case study
translation, overview, Obtaining an IP Address
unicast, The IP Address
uniqueness of, Obtaining an IP Address
verifying (sendmail), The sendmail Command
address_match_list option (named), The options Statement
AddType directive (httpd.conf file), Defining File Types
adduser keyword (dbmmanage command), Improved user authentication
admin-c field (RIPE database), Obtaining an IN-ADDR.ARPA domain
adv (gated), Trace Statements
Advanced Research Projects Agency (ARPA), TCP/IP and the Internet
advanced router option (Linux kernel configuration), Linux Kernel Configuration
advertise parameter (gated), The routerdiscovery Statement
aero domain, The Domain Hierarchy
aggregate statement (gated), Aggregate Statements
Alias directive (httpd.conf file), Defining Where Things Are Stored
aliases, Port Numbers, The Host Table, sendmail Aliases
hostnames, The Host Table
network services, Port Numbers
sendmail, overview, sendmail Aliases
aliases database (sendmail), The sendmail Command
aliases file, Simple Mail Transfer Protocol, Simple Mail Transfer Protocol, Network Information Service, sendmail Aliases
email addresses, Simple Mail Transfer Protocol
NIS map, Network Information Service
sendmail, location of, sendmail Aliases
aliases-nexthop (gated), Interface Statements
AliasFile option (sendmail), Setting Options
All (Options directive setting), Controlling Server Options
ALL keyword (security), tcpd access control files
Allow from directive (Directory containers), Defining Access Controls
allow keyword parameter (dhcpd), Configuration Parameters
allow-ip option (pppd), The PPP Daemon
allow-notify (named), The BIND 9 options statement
allow-query option (named), The options Statement
allow-recursion option (named), The options Statement
allow-transfer option (named), The options Statement
AllowOverride directive (Apache), Directory-Level Configuration Controls
AllowOverride directives (Directory containers), Controlling Server Options
also-notify option (named), The options Statement
alternative (MIME data subtype), Multipurpose Internet Mail Extensions
always-reply-rfc1048 flag parameter (dhcpd), Configuration Parameters
amd command, NFS Automounter
American Registry for Internet Numbers (ARIN), Obtaining an official network address
anon=uid option (share command), The share command
Answer (DNS response packets), dig: An Alternative to nslookup
Apache, Installing Apache SoftwareUsing the Red Hat Package Manager, Using the Red Hat Package Manager, Using the Red Hat Package Manager, Using the Red Hat Package Manager, Downloading Apache, Configuring the Apache Server, Configuring Apache on SolarisConfiguring Apache on Solaris, Configuring Apache on Solaris, Understanding an httpd.conf File, Loading Dynamic Shared ObjectsLoading Dynamic Shared Objects, Loading Dynamic Shared Objects, Basic Configuration Directives, Basic Configuration Directives, Managing the Swarm, Managing the Swarm, Managing the Swarm, Managing the Swarm, Managing the Swarm, Managing the Swarm, Managing the Swarm, Managing the Swarm, Defining Where Things Are Stored, Creating a Fancy Index, Creating a Fancy Index, Defining File Types, Performance Tuning Directives, Performance Tuning DirectivesPerformance Tuning Directives, Performance Tuning Directives, Performance Tuning Directives, Performance Tuning Directives, Performance Tuning Directives, Performance Tuning Directives, Defining the log file formatDefining the log file format, Using conditional logging, Proxy Servers and Caching, Multi-Homed Server Options, Defining Virtual Hosts, Web Server Security, The CGI and SSI Threat, The CGI and SSI Threat, Controlling Server OptionsControlling Server Options, Directory-Level Configuration Controls, Directory-Level Configuration Controls, Directory-Level Configuration Controls, Defining Access Controls, Requiring user authenticationImproved user authentication, Requiring user authentication, Requiring user authentication, Requiring user authentication, Setting file-level access controls, Setting document-level access controls, Using Encryption, Using Encryption, Monitoring Your Server
access controls, Defining Access Controls, Requiring user authenticationImproved user authentication, Setting file-level access controls, Setting document-level access controls
document level, Setting document-level access controls
file level, Setting file-level access controls
overview, Defining Access Controls
user authentication, Requiring user authenticationImproved user authentication
AllowOverride directive, Directory-Level Configuration Controls
conditional logging, Using conditional logging
configuring, Configuring the Apache Server, Configuring Apache on SolarisConfiguring Apache on Solaris
overview, Configuring the Apache Server
Solaris, Configuring Apache on SolarisConfiguring Apache on Solaris
directives, Basic Configuration Directives, Managing the Swarm, Managing the Swarm, Managing the Swarm, Managing the Swarm, Managing the Swarm, Managing the Swarm, Managing the Swarm, Defining Where Things Are Stored, Creating a Fancy Index, Performance Tuning Directives, Performance Tuning DirectivesPerformance Tuning Directives, Performance Tuning Directives, Performance Tuning Directives, Performance Tuning Directives, Performance Tuning Directives, Performance Tuning Directives, Defining the log file formatDefining the log file format, Directory-Level Configuration Controls, Requiring user authentication, Requiring user authentication, Requiring user authentication
AccessFileName, Directory-Level Configuration Controls
AuthName, Requiring user authentication
AuthType, Requiring user authentication
BrowserMatch, Performance Tuning Directives
configuration, Basic Configuration Directives
directory indexing, Creating a Fancy Index
DocumentRoot, Defining Where Things Are Stored
Group, Managing the Swarm
HostnameLookups, Performance Tuning Directives
httpd process control, Managing the Swarm
KeepAlive, Performance Tuning Directives
KeepAliveTimeout, Performance Tuning Directives
LogFileFormat, Defining the log file formatDefining the log file format
MaxKeepAliveRequests, Performance Tuning Directives
MaxRequestsPerChild, Managing the Swarm
MaxSpareServer, Managing the Swarm
MinSpareServer, Managing the Swarm
performance tuning, Performance Tuning DirectivesPerformance Tuning Directives
Require, Requiring user authentication
StartServer, Managing the Swarm
Timeout, Performance Tuning Directives
User, Managing the Swarm
directory indexes, Creating a Fancy Index
directory-level configuration control, Directory-Level Configuration Controls
DocumentRoot directive, Configuring Apache on Solaris
DSO modules, Loading Dynamic Shared Objects
encryption, Using Encryption
httpd processes, managing, Managing the Swarm
httpd.conf file, Understanding an httpd.conf File, Loading Dynamic Shared ObjectsLoading Dynamic Shared Objects, Basic Configuration Directives
configuration directives, Basic Configuration Directives
dynamically loadable modules, Loading Dynamic Shared ObjectsLoading Dynamic Shared Objects
overview, Understanding an httpd.conf File
installing, overview, Installing Apache SoftwareUsing the Red Hat Package Manager
launching, Using the Red Hat Package Manager, Using the Red Hat Package Manager
daemons at bootup, Using the Red Hat Package Manager
without rebooting, Using the Red Hat Package Manager
MIME file types, defining, Defining File Types
monitoring, Monitoring Your Server
multi-homed servers, options, Multi-Homed Server Options
obtaining, Downloading Apache
OpenSSL, Using Encryption
packages, locating names of, Using the Red Hat Package Manager
proxy servers, caching options, Proxy Servers and Caching
security, Web Server Security, The CGI and SSI Threat, The CGI and SSI Threat
CGI scripts, The CGI and SSI Threat
overview, Web Server Security
SSI, The CGI and SSI Threat
server options, controlling, Controlling Server OptionsControlling Server Options
virtual hosts, defining, Defining Virtual Hosts
Applicability Statements (AS), Protocol Standards
application (MIME data content type), Multipurpose Internet Mail Extensions
Application Layer, A Data Communications Model, Application Layer
applications, Transmission Control Protocol, Port Numbers, Remove Unnecessary Software, Keep Software Updated
port numbers, Transmission Control Protocol
protocols for, Port Numbers
security, Remove Unnecessary Software, Keep Software Updated
removing unnecessary, Remove Unnecessary Software
updating, Keep Software Updated
architecture, TCP/IP Protocol ArchitectureTCP/IP Protocol Architecture, Internet Routing ArchitectureInternet Routing Architecture
Internet routing, Internet Routing ArchitectureInternet Routing Architecture
TCP/IP models, TCP/IP Protocol ArchitectureTCP/IP Protocol Architecture
area auth simple parameter (gated), The isis Statement
area parameter, The ospf Statement, The isis Statement
gated isis statement, The isis Statement
gated ospf statement, The ospf Statement
areas (OSPF hierarchy), Open Shortest Path First
arguments, The ifconfig Command, Running sendmail as a Daemon, The gated Command, The sendmail CommandThe sendmail Command, The sendmail K Command
gated command, The gated Command
ifconfig command, The ifconfig Command
sendmail command, Running sendmail as a Daemon, The sendmail CommandThe sendmail Command
sendmail K command, The sendmail K Command
arguments field (inet.conf file), The Internet Daemon
Argv field (sendmail), Defining Mailers
arith (sendmail K command value), The sendmail K Command
ARP (Address Resolution Protocol), Address Resolution, ARP
enabling and disabling, ARP
arp command, Address Resolution, Troubleshooting with the arp CommandARP problem case study
troubleshooting with, Troubleshooting with the arp CommandARP problem case study
arp module, options, Using Dynamically Loadable Modules
arp, diagnostic troubleshooting, Diagnostic Tools
ARPA (Advanced Research Projects Agency), TCP/IP and the Internet
ARPAnet, TCP/IP and the Internet
AS (Applicability Statements), Protocol Standards
AS (gated), Interface Statements
as parameter (gated), Aggregate Statements
AS path (routing policies), Control Statements
ASCII, MIME encoding, Multipurpose Internet Mail Extensions
Asian Pacific Network Information Center (APNIC), Obtaining an official network address
ASNs (autonomous system numbers), Obtaining an autonomous system number, Obtaining an autonomous system number, Registering in a Routing Database
obtaining, Obtaining an autonomous system number, Obtaining an autonomous system number
routing databases, registering, Registering in a Routing Database
aspath parameter (gated), Aggregate Statements
aspppd command (Solaris), Solaris PPP
asymmetric encryption, Encryption
Asynchronous PPP Daemon (aspppd), Solaris PPP
asyncmap option (pppd), The PPP Daemon
at command, security considerations, Looking for Trouble
ATTEMPT option (xinetd), Controlling Access with xinetd
attempts option (resolv.conf file), The Resolver Configuration File
audio (MIME data content type), Multipurpose Internet Mail Extensions
auth option (pppd), PPP Daemon Security, PPP Server Configuration, The PPP Daemon
configuring PPP servers, PPP Server Configuration
auth-nxdomain option (named), The options Statement
authentication, The PPP Daemon, PPP Daemon Security, Open Shortest Path First, The share command, Requiring user authenticationImproved user authentication, Setting file-level access controls, Setting document-level access controls, User Authentication, The Shadow Password FileThe Shadow Password File, Secure Shell
Apache, Requiring user authenticationImproved user authentication, Setting file-level access controls, Setting document-level access controls
document-level access controls, Setting document-level access controls
file-level access controls, Setting file-level access controls
dedicated connections and, The PPP Daemon
OSPF, Open Shortest Path First
protocols, pppd command, PPP Daemon Security
shadow password files, The Shadow Password FileThe Shadow Password File
share command, The share command
ssh, Secure Shell
AuthName directive (Apache), Requiring user authentication
authoritative parameter (dhcpd), Configuration Parameters
authoritative servers, DNS, BIND, Resolvers, and named
DNS, DNS
Authority (DNS response packets), dig: An Alternative to nslookup
AuthType directive (Apache), Requiring user authentication
autofs script, NFS Automounter
automatically allocating addresses (DHCP), Dynamic Host Configuration Protocol
automounter (NFS), NFS Automounter, NFS Automounter, NFS Automounter
configuration files, NFS Automounter
daemon, NFS Automounter
autonomous system external (ASE) routes, Exterior gateway configuration
autonomous system numbers, Obtaining an autonomous system number (see ASNs)
autonomous systems (AS), Internet Routing Architecture
autonomoussystem (gated), Definition Statements
auto_home map, NFS Automounter
auto_master file, configuration, NFS Automounter