This book introduces TCP/IP and its applications. TCP/IP is the protocol used on the Internet, the largest Internet network in the world. This book is very rich in content, covering almost all aspects of TCP/IP, including open communication models, TCP/IP communication models, naming and addressing mechanisms in IP networks, address resolution and reverse address resolution protocols, and DNS domains. Word server, WINS, Address Discovery Protocol, IPv6, routing protocols in IP networks (RIP, OSPF, etc.), Internet Printing Protocol, LDAP directory service, remote access protocols, IP security and firewalls. This book introduces how to configure TCP/IP for Windows 9x/NT; it also introduces how to use TCP/IP applications, including remote login, FTP, Web browsing, etc.
Table of Contents Translator’s Preface Part 1 TCP/IP Basics Chapter 1 Introduction to the Open Communication Model 1
1.1 Development of open networks 1
1.1.1 Hierarchy of communication processing 2
1.1.2 OSI Reference Model 3
1.1.3 Use of model 5
1.2 TCP/IP reference model 7
1.3 Summary 7
Chapter 2 TCP/IP and the Internet 8
2.1 A piece of history 8
2.1.1 ARPANET 8
2.1.2 TCP/IP 9
2.1.3 National Science Foundation (NSF) 9
2.1.4 Today’s Internet 12
2.2 RFC and standardization process 12
2.2.1 Obtaining RFC 13
2.2.2 RFC Index 13
2.2.3 Humor about RFCs 13
2.3 Introduction to Internet Services 13
2.3.1 Whois and Finger 14
2.3.2 File transfer protocol 14
2.3.3 Telnet 14
2.3.4 Email 14
2.3.5 WWW 14
2.3.6 USENET News 15
2.4 Overview of Intranet and Extranet 15
2.4.1 Intranet 15
2.4.2 Opening the intranet to the outside world 16
2.5 Tomorrow of the Internet 16
2.5.1 Next Generation Internet (NGI) 16
2.5.2 Super-speed backbone network service 16
2.5.3 Internet2(I2) 17
2.6 Internet Management Organization 17
2.6.1 Internet Society 17
2.6.2 Internet Architecture Group 17
2.6.3 Internet Engineering Task Force 17
2.6.4 Internet Engineering Steering Group 17
2.6.5 Internet Numbering Authority 18
2.6.6 Internet Names and Numbers Assignment Organization
(ICANN) 18
2.6.7 Internet Network Information Center and other notes
Book organization 18
2.6.8 RFC editing 18
2.6.9 Internet Service Provider 18
2.7 Summary 19
Chapter 3 TCP/IP Overview 20
3.1 Advantages of TCP/IP 20
3.2 TCP/IP layers and protocols 21
3.2.1 Architecture 21
3.2.2 Transmission Control Protocol 21
3.2.3 IP protocol 23
3.2.4 Application layer 25
3.2.5 Transport layer 25
3.2.6 Network layer 25
3.2.7 Link layer 25
3.3 Remote login (Telnet) 25
3.4 File Transfer Protocol (FTP) 25
3.5 Trivial File Transfer Protocol (TFTP) 26
3.6 Simple Mail Transfer Protocol (SMTP) 26
3.7 Network File System (NFS) 26
3.8 Simple Network Management Protocol (SNMP) 27
3.9 Combination of TCP/IP and system 27
3.10 Intranet Overview 28
3.11 Summary 28
Part 2 Naming and Addressing Chapter 4 Names and Addresses in IP Networks 29
4.1 IP addressing 29
4.1.1 Binary and decimal numbers 30
4.1.2 IPv4 address format 30
4.2 The emergence of subnets 34
4.2.1 Molecular Network 35
4.2.2 Variable length subnet mask (VLSM) 37
4.3 Classless Domain Front Routing (CIDR) 38
4.3.1 Classless Addresses 38
4.3.2 Strengthening route aggregation 39
4.3.3 Supernetworking 39
4.3.4 How CIDR works 39
4.3.5 Public address space 40
4.3.6 RFC 1597 and 1918 40
4.4 Summary 40
Chapter 5 ARP and RARP 41
5.1 Using address 41
5.1.1 Subnet addressing 41
5.1.2 IP address 43
5.2 Using the Address Resolution Protocol 44
5.2.1 ARP cache 45
5.2.2 Proxy ARP 47
5.2.3 Reverse Address Resolution Protocol 47
5.3 Using ARP commands 47
5.4 Summary 47
Chapter 6 DNS: Name Server 48
6.1 Domain Name System Overview 48
6.2 Authorizing Office 50
6.3 DNS distribution database 50
6.4 Domains and Zones 50
6.5 Internet top-level domains 51
6.6 Select a domain name server 52
6.7 Name service resolution process 52
6.7.1 Recursive query 52
6.7.2 Iterative query 52
6.8 Caching 52
6.9 Reverse parsing (Pointer) query 52
6.10 DNS Security 52
6.11 Resource Records 53
6.12 Summary 54
Chapter 7 WINS 55
7.1 NetBIOS 55
7.2 NetBIOS name resolution 57
7.3 Dynamic NetBIOS name resolution 58
7.3.1 Advantages of using WINS 58
7.3.2 How WINS works 59
7.3.3 Configuring WINS client 60
7.3.4 Configuring WINS 60 for the agent
7.3.5 Configuring NT 4.0 system 61
7.3.6 Configuring Windows 95 or Windows 98
System 61
7.4 Installing WINS server 61
7.5 WINS management and maintenance 62
7.5.1 Add static entries 62
7.5.2 Maintaining WINS database 63
7.5.3 Backing up the WINS database 65
7.5.4 Back up WINS registry entries 65
7.5.5 Restoring the WINS database 65
7.5.6 Compressing the WINS database 66
7.5.7 WINS replication participants 66
7.5.8 WINS implementation suggestions 67
7.6 Integrating WINS and DNS name resolution services 67
7.7 DHCP Service WINS Options 67
7.8 NetBIOS naming via LMHOSTS
Analysis 68
7.9 Summary 69
Chapter 8 Address Discovery Protocol (BOOTP and DHCP) 71
8.1 "Bootstrap" Protocol (BOOTP) 71
8.2 Dynamic Host Configuration Protocol (DHCP) 72
8.2.1 How DHCP works 72
8.2.2 Understanding leased addresses 73
8.3 Managing address pools 74
8.4 Other allocations that DHCP can handle 75
8.4.1 Be aware of overloading 75
8.4.2 Other allocations 75
8.5 Summary 76
Part 3 IP and Related Protocols Chapter 9 IP Protocol Family 77
9.1 TCP/IP model 77
9.1.1 Anatomy of the TCP/IP model 78
9.1.2 Protocol components 78
9.2 Understanding Internet Protocol (IP) 79
9.2.1 IPv4 structure 79
9.2.2 What IP does 80
9.3 Understanding Transmission Control Protocol (TCP) 81
9.3.1 TCP header structure 81
9.3.2 What TCP does 83
9.4 Understanding User Datagram Protocol (UDP) 85
9.4.1 UDP header structure 85
9.4.2 What UDP can do 85
9.4.3 TCP and UDP 86
9.5 Summary 86
Chapter 10 IPv6 87
10.1 IPv6 datagram 87
10.1.1 Priority classification 88
10.1.2 Stream identification 89
10.1.3 128-bit IP address 89
10.1.4 IP extension header 90
10.2 Multiple IP address hosts 91
10.3 Unicast, multicast and any header 91
10.4 Transition from IPv4 to IPv6 93
10.5 Summary 94
Part 4 IP Interconnection Chapter 11 Routing in IP Networks 95
11.1 Basic knowledge of routing 95
11.1.1 Static routing 96
11.1.2 Distance-vector routing 99
11.1.3 Link-state routing 100
11.2 Convergence in IP Networks 102
11.2.1 Adapting to topology changes 102
11.2.2 Convergence time 106
11.3 Computing routes in IP networks 106
11.3.1 Storing multiple routes 107
11.3.2 Initial update 107
11.3.3 Routing Metrics 107
11.4 Summary 108
Chapter 12 Routing Information Protocol (RIP) 109
12.1 Understanding RFC1058 109
12.1.1 RIP message format 109
12.1.2 RIP routing table 111
12.2 Operating mechanism 112
12.2.1 Calculating distance vectors 113
12.2.2 Update routing table 116
12.2.3 Addressing issues 118
12.3 Topology changes 120
12.3.1 Convergence 120
12.3.2 Evaluating to infinity 122
12.4 Limitations of RIP 127
12.4.1 Hop limit 128
12.4.2 Fixed metrics 128
12.4.3 Strong response to routing table updates 128
12.4.4 Slow convergence 128
12.4.5 Lack of load balancing 128
12.5 Summary 129
Chapter 13 Open Shortest Path First 130
13.1 OSPF Origins 130
13.2 Understanding RFC 2328 OSPF, Version 2 130
13.2.1 OSPF Zone 131
13.2.2 Routing update 134
13.3 Study OSPF data structure 136
13.3.1 HELLO message 137
13.3.2 Database description message 137
13.3.3 Link-Status Request Message 138
13.3.4 Link-status update message 138
13.3.5 Link-status response message 140
13.4 Calculating routes 140
13.4.1 Using automatic calculations 140
13.4.2 Cost of using default route 141
13.4.3 Shortest path tree 142
13.5 Summary 144
Chapter 14 Gateway Protocol 145
14.1 Gateways, Bridges, and Routers 145
14.1.1 Gateway 145
14.1.2 Bridge 146
14.1.3 Routers 146
14.1.4 Autonomous systems 146
14.2 Gateway Protocol: Basics 146
14.3 Interior Gateway Protocol and Exterior Gateway Protocol 147
14.3.1 Gateway-Gateway Protocol (GGP) 147
14.3.2 Exterior Gateway Protocol (EGP) 147
14.3.3 Interior Gateway Protocol (IGP) 148
14.4 Summary 148
Part 5 Network Services Chapter 15 Internet Printing Protocol 149
15.1 History of IPP 149
15.2 IPP and end users 150
15.3 Implementation using HP’s IPP 151
15.4 Summary 152
Chapter 16 LDAP: Directory Services 153
16.1 Why use directory services 153
16.2 Functions of Directory Services 153
16.3 Directory Services on IP 154
16.4 OSI X.500 Directory Model 156
16.4.1 Early X.500 157
16.4.2 X.500 today 157
16.5 LDAP structure 157
16.5.1 LDAP hierarchy 157
16.5.2 Name structure 158
16.6 Directory System Agents and Access Protocols 158
16.7 Lightweight Directory Access Protocol 158
16.7.1 Query information 159
16.7.2 Storing information 160
16.7.3 Access rights and security 160
16.8 LDAP server-server communication 161
16.8.1 LDAP Data Interchange Format (LDIF) 161
16.8.2 LDAP replication 162
16.9 Designing LDAP Services 162
16.9.1 Defining requirements 162
16.9.2 Design strategy 163
16.9.3 Performance 164
16.9.4 Network functions 165
16.9.5 Security 166
16.10 LDAP configuration 169
16.11 Product Environment 169
16.11.1 Creating a plan 170
16.11.2 Valuable suggestions 171
16.12 Choosing LDAP software 171
16.13 Summary 174
Chapter 17 Remote Access Protocol 175
17.1 Remote interconnection 175
17.1.1 ISDN 176
17.1.2 Cable Modems 176
17.1.3 Digital Subscriber Loop (DSL) 176
17.1.4 Wireless Networks 177
17.2 Remote Authentication Dial-In User Service (RADIUS) 177
17.2.1 RADIUS authentication 178
17.2.2 Accounting information 179
17.3 Transmitting IP data using SLIP, CSLIP and PPP
According to the message 179
17.3.1 Serial Line Interface Protocol (SLIP) 179
17.3.2 Compressed SLIP (CSLIP) 180
17.3.3 Point-to-Point Protocol (PPP) 180
17.4 Tunnel remote access 184
17.4.1 Point-to-Point Tunneling Protocol (PPTP) 185
17.4.2 Layer Two Tunneling Protocol (L2TP) 188
17.4.3 IPSec 192
17.5 Summary 194
Chapter 18 Firewall 195
18.1 Making the Internet Secure 195
18.2 Using a firewall 196
18.2.1 Proxy server 197
18.2.2 Message filter 198
18.3 Making services secure 198
18.3.1 Email (SMTP) 198
18.3.2 HTTP: World Wide Web 199
18.3.3 FTP 199
18.3.4 Telnet 199
18.3.5 Usenet:NNTP 199
18.3.6 DNS 200
18.4 Building your own firewall 200
18.5 Using commercial firewall software 200
18.6 Summary 202
Chapter 19 IP Security 203
19.1 Using encryption 203
19.1.1 Public-Private Key Encryption 204
19.1.2 Symmetric private key encryption 205
19.1.3 DES, IDEA and others 205
19.2 Digital signature authentication 206
19.3 Deciphering encrypted data 207
19.4 Securing the Network 207
19.4.1 Login name and password 208
19.4.2 Directory permissions for files 208
19.4.3 Trust relationship 209
19.4.4 UUCP on UNIX and Linux systems 209
19.5 Coping with worst-case scenarios 210
19.6 Summary 210
Part 6 Implementing TCP/IP
Chapter 20 General Configuration Issues 211
20.1 Installing the network card 211
20.1.1 Network card 211
20.1.2 Resource Configuration 212
20.1.3 Install adapter software 213
20.1.4 Redirectors and APIs 214
20.1.5 Services 214
20.1.6 NIC interface 215
20.2 Network and transport layer protocols 215
20.2.1 IP configuration requirements 215
20.2.2 Configuring the default gateway address 216
20.2.3 Configuring the name server address 217
20.2.4 Configuring the mail server address 217
20.2.5 Registering a domain name 218
20.3 IP configuration 218
20.4 Configuring the routing table 218
20.5 IP encapsulation of heterogeneous protocols 219
20.6 Summary 220
Chapter 21 Windows 98 221
21.1 Windows 98 network architecture 221
21.1.1 Installing the network card 222
21.1.2 Change network card configuration 224
21.1.3 When Windows 98 fails to boot 224
21.2 Configuring TCP/IP for Windows 98 225
21.2.1 Writing before you start 225
21.2.2 Installing TCP/IP 225
21.2.3 Configuring Microsoft’s TCP/IP 225
21.2.4 DNS configuration 227
21.2.5 Static configuration files 228
21.2.6 Registry configuration 229
21.2.7 Testing TCP/IP 231
21.3 Summary 232
Chapter 22 Windows 98 Dial-Up Networking 233
22.1 Configuring the dial-up network adapter 233
22.2 Installing dial-up networking 234
22.3 Server Types 235
22.4 Scripting 238
22.5 Multiple links 238
22.6 PPTP 239
22.6.1 Install and configure PPTP 240
22.6.2 Establishing a PPTP connection 240
22.7 Windows 98 Dial-up Server 241
22.8 Troubleshooting Dial-Up Networking Connections 242
22.8.1 Confirm DUN configuration 242
22.8.2 PPP log 243
22.9 Summary 243
Chapter 23 Windows NT 4.0 244
23.1 Windows NT version 244
23.2 Architecture 244
23.3 Installing Windows NT 4.0 244
23.4 Configuring TCP/IP 246
23.4.1 IP address 246
23.4.2 DNS 248
23.4.3 WINS address 248
23.4.4 DHCP Relay 249
23.4.5 Routing 250
23.5 Simple TCP/IP Services 250
23.6 Remote Access Service (RAS) 250
23.7 DHCP Server 252
23.7.1 Install DHCP server service 252
23.7.2 Controlling DHCP server service 253
23.7.3 Compressing the DHCP database 253
23.7.4 Managing DHCP 254
23.8 Using Microsoft DNS 256
23.8.1 Installing DNS 256
23.8.2 Creating a Zone 257
23.8.3 Configuring the reverse domain name solution function 258
23.8.4 Configure the connection between DNS and WINS server
pick up 259
23.8.5 Adding a secondary name server 259
23.9 FTP and HTTP services 259
23.10 TCP/IP Printing Service 259
23.10.1 Install TCP/IP printing service 259
23.10.2 Installing LPR service 260
23.11 New features of Windows 2000 260
23.12 Summary 261
Chapter 24 Supporting IP in Novell NetWare 262
24.1 Novell and TCP/IP 262
24.1.1 IP and NetWare 4 262
24.1.2 NetWare 5 and Pure IP initialization 262
24.2 Legacy Solutions: NetWare 3.x to
NetWare 4.x IP support 263
24.2.1 IP Tunnel 264
24.2.2 IP Relay 264
24.2.3 LAN WorkPlace 264
24.2.4 IPX-IP Gateway 265
24.2.5 NetWare/IP 265
24.3 NetWare 5—Novell’s take on IP
Fully supported 266
24.3.1 Pure IP 266
24.3.2 Multiprotocol 266
24.4 Installation options 266
24.4.1 IP-Only installation of NetWare 5 267
24.4.2 IPX-Only installation 267
24.4.3 Mixed TCP/IP installation 268
24.5 IP migration assistance tool 268
24.5.1 NDS 268
24.5.2 DNS 269
24.5.3 DHCP 269
24.5.4 DDNS 269
24.5.5 SLP 269
24.5.6 Compatibility mode 269
24.5.7 Migration Agent 270
24.6 Migration Strategy 270
24.6.1 Using a test platform 270
24.6.2 Migration recommendations 270
24.7 Summary 271
Part 7 Using TCP/IP Applications Chapter 25 Whois and Finger 273
25.1 Understanding the Whois protocol 273
25.1.1 Internet Registration 273
25.1.2 Whois database 274
25.1.3 Web-based Whois 275
25.1.4 Whois in command line mode 276
25.1.5 Example 276
25.1.6 Whois based on Telnet 278
25.2 Extending Whois 279
25.2.1 Prompt Whois (RWhois) 279
25.2.2 WHOIS++ 280
25.3 Using Finger 280
25.3.1 Finger command 280
25.3.2 Finger daemon 282
25.3.3 Finger in non-UNIX environments 283
25.3.4 Application of Finger 283
25.4 Related RFC documents 285
25.5 Summary 285
Chapter 26 File Transfer Protocol 286
26.1 The role of FTP and TFTP in the online world 286
26.2 Using FTP to transfer files 286
26.2.1 FTP connection 287
26.2.2 Establishing a connection using an FTP client 288
26.2.3 FTP security 296
26.2.4 FTP server and daemon 299
26.2.5 Anonymous FTP access 299
26.3 Using TFTP 300
26.3.1 The difference between FTP and TFTP 301
26.3.2 TFTP commands 301
26.4 Summary 301
Chapter 27 Using Telnet 302
27.1 Understanding the Telnet protocol 302
27.2 Telnet daemon 303
27.3 Using Telnet 304
27.3.1 UNIX telnet command 304
27.3.2 Telnet GUI application 305
27.3.3 Telnet command 305
27.3.4 Example 308
27.4 Advanced Topics 309
27.4.1 Security 309
27.4.2 Telnet application 309
27.4.3 Use Telnet to access other TCP/IP
Services 310
27.5 Related RFC documents 312
27.6 Summary 313
Chapter 28 Using r-series utilities 314
28.1 Understanding r series commands 314
28.1.1 Security issues 314
28.1.2 Prohibiting the use of r series commands 315
28.1.3 Enhance the security of r series commands 316
28.2 Alternatives to using r-series commands 317
28.3 Detailed explanation of r series commands 317
28.3.2 Related documents 320
28.4 Implementing the r system in non-UNIX environments
Functions of column commands 321
28.5 Summary 322
Chapter 29 Using Network File System (NFS) 323
29.1 What is NFS 323
29.1.1 History of NFS 323
29.1.2 Why use NFS 323
29.2 Implementation—NFS working process 324
29.2.1 Remote Procedure Call (RPC)
and External Data Representation (XDR) 324
29.2.2 Loading types 324
29.3 Files and commands used by NFS 325
29.3.1 NFS daemon 325
29.3.2 NFS-related files 327
29.3.3 NFS server commands 329
29.3.4 NFS client commands 331
29.4 Example: Sharing and Mounting an NFS File System 333
29.5 NFS common problems and solutions 334
29.5.1 Unable to load 334
29.5.2 Cannot uninstall 334
29.5.3 Hard loading and soft loading 334
29.6 Related agreements and products 334
29.6.1 WebNFS 335
29.6.2 PC-based NFS and other clients
Software 335
29.6.3 SMB and CIFS 335
29.6.4 Other products 336
29.7 Summary 336
Part 8 Using IP-based Applications Chapter 30 Integrating TCP/IP in Applications 337
30.1 Using the browser as the presentation layer 338
30.2 Growing Internet applications 338
30.3 Integrating TCP/IP into existing applications 339
30.4 Using TCP/IP on other networks 339
30.4.1 NetBIOS and TCP/IP 339
30.4.2 IPX and UDP 340
30.4.3 ARCNET and TCP/IP 340
30.5 Summary 340
Chapter 31 Internet Email Protocol 341
31.1 Email 341
31.1.1 The history of email 341
31.1.2 Standards and standards-setting organizations 341
31.2 X.400 341
31.3 Simple Mail Transfer Protocol (SMTP) 343
31.3.1 MIME and SMTP 343
31.3.2 Other coding standards 344
31.3.3 SMTP commands 344
31.3.4 SMTP status code 345
31.3.5 Extending SMTP 345
31.3.6 Checking SMTP headers 346
31.3.7 Advantages and disadvantages of SMTP 347
31.4 Retrieve customer emails using POP and IMAP 347
31.4.1 Post Office Protocol (POP) 347
31.4.2 Internet Mail Access Protocol (IMAP) 348
31.4.3 Comparison between POP3 and IMAP4 348
31.5 Advanced Topics 349
31.6 Related RFC documents and other reference information 351
31.7 Summary 352
Chapter 32 HTTP: World Wide Web 353
32.1 World Wide Web (WWW) 353
32.1.1 A brief history of the Web 353
32.1.2 Development of the Web 354
32.2 Uniform Resource Locator 354
32.3 Web server and browser 355
32.4 Understanding HTTP 356
32.4.1 HTTP/1.1 356
32.4.2 MIME and the Web 358
32.4.3 HTTP communication example 358
32.5 Advanced Topics 359
32.5.1 Server-side functionality 359
32.5.2 SSL and S-HTTP 359
32.6 Web Language 359
32.6.1 HTML 360
32.6.2 XML 360
32.6.3 CGI 361
32.6.4 Java 361
32.6.5 JavaScript 362
32.6.6 Dynamic Server Pages 362
32.7 The future of the Web 363
32.7.1 HTTP-ng 363
32.7.2 IIOP 363
32.7.3 IPv6 363
32.7.4 IPP 363
32.8 Summary 364
Chapter 33 NNTP: Internet News Group 365
33.1 Internet News Groups 365
33.2 Newsgroups and Hierarchies 366
33.3 Network News Transfer Protocol 367
33.3.1 Obtaining newsgroups 367
33.3.2 Get messages 369
33.3.3 Publishing messages 370
33.4 Massive advertising (Spamming) and news black hole
(Blackholing) 371
33.5 Summary 371
Chapter 34 Web Services 373
34.1 Overview of Web Service Work 373
34.2 Mainstream Web Servers 375
34.3 Running the Apache HTTP Web Service 376
34.3.1 Download, install and configure Apache 376
34.3.2 Using Apache in a Windows environment 381
34.4 Browsing other web servers 383
34.5 Summary 383
Part 9 Using and Managing TCP/IP Networks Chapter 35 Protocol Configuration and Adjustment 385
35.1 System initialization issues 385
35.2 Configuration files 390
35.2.1 Define the network in the /etc/protocols file
Network protocol 390
35.2.2 Identifying hosts in the /etc/hosts file 391
35.2.3 TCP/IP and /etc/services files 392
35.2.4 inetd daemon and /etc/inetd.conf
File 394
35.2.5 Setting up the network in the /etc/networks file 397
35.2.6 DNS client and /etc/resolv.conf 397
35.3 Summary 398
Chapter 36 Configuring DNS 399
36.1 Domain Name Server 399
36.2 Resource records 400
36.3 Domain name resolution 401
36.4 Configuring UNIX or Linux domain name servers
(DNS) 401
36.4.1 Adding resource records 402
36.4.2 Completing the DNS file 402
36.4.3 Start DNS daemon 405
36.4.4 Configuring the client 405
36.5 Windows and Domain Name Servers 405
36.6 Summary 406
Chapter 37 Network Management 407
37.1 Develop a network monitoring plan 407
37.2 Network problems and their solutions 408
37.3 Network management tools 408
37.3.1 Using a protocol analyzer 409
37.3.2 Expert systems 410
37.3.3 PC-based analyzers 410
37.3.4 Network management protocol support 411
37.3.5 Integrated network simulation/modeling tools 411
37.4 Configuring SNMP 412
37.4.1 Configuring Windows SNMP 413
37.4.2 Configuring UNIX SNMP 414
37.4.3 SNMP security attributes 414
37.4.4 SNMP agent and management 415
37.5 SNMP tools and commands 416
37.6 RMON and related MIB models 417
37.7 Establish network management requirements 417
37.8 Summary 419
Chapter 38 SNMP: Simple Network Management Protocol 420
38.1 What is SNMP 420
38.2 Management Information Base (MIB) 421
38.3 Using SNMP 421
38.4 UNIX and SNMP 422
38.4.1 Installing SNMP on UNIX and Linux 423
38.4.2 SNMP commands 424
38.5 Windows and SNMP 424
38.5.1 Windows NT 425
38.5.2 Windows 95, Windows 98 and
Windows 3.x 425
38.6 Summary 427
Chapter 39 Strengthening TCP/IP Transmission Security 428
39.1 Defining required network security 428
39.1.1 What is network security 428
39.1.2 Why network security is important 429
39.1.3 Security Level 429
39.1.4 Passwords and password files 430
39.1.5 Controlling access to passwords 430
39.2 Strengthening network security 431
39.2.1 Types of attacks 431
39.2.2 Strengthening network security 432
39.3 Application Configuration 434
39.3.1 Internet daemons and
/etc/inetd.conf 434
39.3.2 Network encryption software 436
39.3.3 TCP Wrapper 436
39.4 Used ports and trusted ports 437
39.4.1 Firewall 437
39.4.2 Packet filtering 437
39.4.3 Application layer gateway 438
39.4.4 Filtering by other applications 438
39.5 General Security Matters 438
39.5.1 User account maintenance 438
39.5.2 Audit 438
39.5.3 Correct system configuration 438
39.6 Summary 438
Chapter 40 Problem Solving Tools and Key Points 440
40.1 Monitoring network behavior 440
40.2 Standard Applications 440
40.2.1 Testing basic connections 441
40.2.2 ping command 442
40.2.3 Solving network access problems 443
40.3 Solving network interface layer problems 449
40.4 Solving network layer problems 449
40.4.1 TCP/IP configuration parameters 449
40.4.2 IP address configuration issues 450
40.5 Solving TCP and UDP issues 453
40.6 Solving application layer problems 455
40.7 Summary 455
Part 10 Appendix Appendix A RFC and Standardization 457
Appendix B Linux 469
Appendix C Abbreviations and Abbreviations 480