start page | rating of books | rating of authors | reviews | copyrights

Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: C

cable tester
11.2. Diagnostic Tools
11.3.1. The ping Command
11.4.3. Checking the Interface with netstat
cables
Category 5 : 11.4.4. Subdividing an Ethernet
checking
6.4.4. Troubleshooting Serial Connections
11.4.3. Checking the Interface with netstat
11.4.4.1. Network hardware problems
Unshielded Twisted Pair (UTP) : 11.4.4. Subdividing an Ethernet
cache : 3.3. Domain Name Service
corruption : 11.6.3. Cache corruption
initialization file : 8.3.3. The Cache Initialization File
single answers : 3.3.4. BIND, resolver, and named
statement
8.3.1.1. Configuring a caching-only nameserver
C.2. named.boot Configuration Commands
caching-only servers
3.3.4. BIND, resolver, and named
8.1.1. BIND Configurations
8.3.1.1. Configuring a caching-only nameserver
cannot connect error : 3.4.1. Simple Mail Transfer Protocol
Canonical Name (CNAME) resource records
8.3.6. The named.hosts File
10.7.1. Modifying Local Information
C.3.1.5. Canonical Name record
carrier-detect (DCD) indicator, monitoring : 6.3.3. chat
central administrator : (see network, administration)
cf/cf directory : 10.4.1. Locating a Sample sendmail.cf File
cf/feature directory : E.3.2. FEATURE
cf/ostype directory : 10.4.1.1. Building a sendmail.cf with m4 macros
cgm image subtype : 3.4.3. Multipurpose Internet Mail Extensions
Challenge Handshake Authentication Protocol : (see CHAP)
challenge string : 6.3.4. PPP Daemon Security
CHAP (Challenge Handshake Authentication Protocol)
6.3.4. PPP Daemon Security
A.2. The PPP Daemon
chap-secrets file : 6.3.4. PPP Daemon Security
Chapman, Brent : 12.1.1. Assessing the Threat
chat script : 6.3.3. chat
chat scripting language
A.2. The PPP Daemon
A.3. chat
escape sequences, listed : A.3. chat
chatkey : A.1.1. The dip Script File
checksums
1.6.2. Transmission Control Protocol
11.8. Protocol Case Study
recalculating
4.2.1. Obtaining an IP Address
5.3.1.1. Options
CIDR (Classless Inter-Domain Routing) : 2.2.2. Classless IP Addresses
address mask
2.2. The IP Address
2.2.2. Classless IP Addresses
blocks : B.11. The Aggregate Statements
cipher : 12.6. Encryption
Cisco routers : 12.5. Access Control
class w, defining : 10.7.1. Modifying Local Information
classes of addresses : (see addresses, classes of)
Classless Inter-Domain Routing : (see CIDR)
clear text : 12.6. Encryption
client statement : B.8.10. The routerdiscovery Statement
CNAME : (see Canonical Name (CNAME) resource records)
Collis field : 11.4.3. Checking the Interface with netstat
collision rate
6.1.1. Determining the Interface Name
11.4.3. Checking the Interface with netstat
reducing : 11.4.4. Subdividing an Ethernet
colon (:)
beginning and ending fields
9.2.1. The printcap File
9.2.2. Solaris Line Printer Service
separating parameters : 9.4. A BOOTP Server
com domain : 3.3.1. The Domain Hierarchy
Commercial Information Exchange (CIX) : 1.1. TCP/IP and the Internet
communications, interpersonal : (see email (electronic mail))
comp.security newsgroups : 12.1.2.2. Use mailing lists to distribute information
Computer Emergency Response Team (CERT) advisories : 12.1.2.2. Use mailing lists to distribute information
Computer Security Resource Clearinghouse : 13.1. The World Wide Web
computer-to-computer services
servers providing : 9. Configuring Network Servers
conditionals in macro definitions : 10.5.2.1. Conditionals
conf directory : 5.3. The BSD Kernel Configuration File
conf/master directory : 8.3.4. The named.local File
confidence factor : 11.1.1. Troubleshooting Hints
configuration
parameters (in dhcpd) : D.3.2. Configuration Parameters
problems : 11.4.1. Troubleshooting with the ifconfig Command
servers : 3.5. Configuration Servers
system, prerequisites for : 4. Getting Started
connection command-line option, in pppd : 6.3.3. chat
connectivity
1.7. Application Layer
(see also firewalls)
troubleshooting : 11.3. Testing Basic Connectivity
content types : 3.4.3. Multipurpose Internet Mail Extensions
Content-Transfer-Encoding headers : 3.4.3. Multipurpose Internet Mail Extensions
Content-Type headers : 3.4.3. Multipurpose Internet Mail Extensions
contiguous blocks : (see addresses, assigning)
control
information : 1.3. TCP/IP Protocol Architecture
statements (in gated) : B.10. Control Statements
convergence of routing, delays in : 7.4.1.1. Running RIP with routed
COPS (Computer Oracle Password and Security) programs : 12.4.3.1. COPS
copy (cp) command, in NFS : 9.1. The Network File System
core gateways
2.4. Internet Routing Architecture
7.5.1. Exterior Gateway Protocol
count field : 11.3.1. The ping Command
count-to-infinity problem : 7.4.1.1. Running RIP with routed
crash
resetting locks after : 9.1.1. NFS Daemons
restarting after : 9.2.2. Solaris Line Printer Service
crises : (see disaster recovery plans)
cron, files run by, in security checks : 12.4.2. Looking for Trouble
crtscts option : 6.3.1. The PPP Daemon
crypto-checksum : 7.4.3. Open Shortest Path First
CSLIP : (see Van Jacobson header compression)
-Ctest.cf argument : 10.8. Testing sendmail.cf
cua devices : 6.4.4. Troubleshooting Serial Connections
curly braces ({})
configuration statements
7.7.1.1. A host configuration
B.2. The gated Configuration Language
D.3. The dhcpd.conf Configuration File
long variable names : 10.5. sendmail Configuration
macro names : 10.5.2. The Define Macro Command
cyrus and cyrusbb mailers : E.3.5. MAILER


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.