throbber
TCP/IP Network Administration
`
`Second Edition
`
`Craig Hunt
`
`Cambridge
`
`- Kéiln
`
`- Paris
`
`- Sebastopol
`
`- Tokyo
`
`O’REILLY"
`
`001
`
`US. Patent No. 8,724,622
`
`Apple Inc.
`APLl 1 16
`
`001
`
`Apple Inc.
`APL1116
`U.S. Patent No. 8,724,622
`
`

`

`1".9‘P/ii3 Network Administration, Second Edition
`by Craig I-Iunt
`
`Copyright © 1998, 1992 Craig Hunt. All rights reserved.
`Printed in the United States of America.
`
`Published by O'Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472.
`
`Edifai'IMike Loukides
`
`Update Editor: Gigi Estabrook
`
`Production Editor: Nicole Gipson Arigo
`
`Printing History:
`
`August 1992:
`
`First Edition.
`
`March 1993:
`
`Minor corrections.
`
`September 1993: Minor corrections.
`
`January 1994:
`
`Minor corrections.
`
`May 1994:
`
`Minor corrections.
`
`_Ianuary 1998:
`
`Second Edition,
`
`Nutshell Handbook and the Nutshell Handbook logo are registered trademarks and The
`javaTM Series is a trademark of O’Reilly & Associates, inc. The association of a crab and the
`topic of TCP/iP is a trademark of O’Reilly & Associates. Inc.
`
`Many of the designations used by manufacturers and sellers to distinguish their products are
`claimed as trademarks. Where those designations appear in this book, and O’Reilly &
`Associates, Inc, was aware of a trademark claim, the designations have been printed in caps
`or initial caps.
`
`While every precaution has been taken in the preparation of this book, the publisher assumes
`no responsibility for errors or omissions, or for damages resulting from the use of the
`information contained herein,
`
`This book is printed on acid—free paper with 85% recycled content, 15% post-consumer Waste.
`O’Reilly 8: Associates is committed to using paper with the highest recycled content available
`consistent with high quality,
`
`ISBN: 1—56592—322-7
`
`002
`
`002
`
`

`

`Table of Contents
`
`Preface
`
`I: Overview of TCP/IP
`
`’I‘CP/IP and the Internet
`
`A Data Communications Model
`
`TCP/IP Protocol Architecture
`
`Network Access Layer
`Internet Layer
`
`Transport Layer
`
`'WNH
`
`8
`
`I!
`11
`
`17
`
`ApplicationL21yer21
`
`2: Delz'vem'ng the Data
`
`Addressing, Routing, and Multiplexing
`The IP Address
`
`Subnets
`
`Internet Routing Architecture
`
`The Routing Table
`
`Address Resolution
`Protocols, Ports, and Sockets
`
`003
`
`23
`
`23
`25
`
`31
`
`34
`
`36
`
`39
`42
`
`U
`
`003
`
`

`

`of
`Table of Contents
`
`Network Services
`
`Names and Addresses
`The Host Tabie
`
`48
`
`. 49
`
`.. 50
`
`Domain NameService
`
`. 52
`
`60
`
`.. 71
`
`. 73
`
`. 76
`.. 78
`
`80
`
`.. 81
`
`.83
`.91
`
`..94
`
`.97
`.100
`
`..102
`
`. 104
`
`105
`
`105
`
`106
`
`112
`
`. 118
`
`121
`
`123
`
`t 123
`
`. I37
`I40
`
`.. I53
`162
`
`I64
`
`.164
`
`165
`
`..167
`
`.173
`
`Configuration Servers
`Bootstrap Protocol
`
`File and Print Servers
`
`Getting Started
`
`Connected and Non—Connected Networks
`
`..
`
`Basic Information
`
`Planning Routing
`
`Planning Naming Service.
`
`Informing the Users
`
`Summary
`
`Basic Configuration
`
`Kernel Configuration
`
`Linux Kernel Configuration
`
`The BSD Kernel Configuration File
`The Internet Daemon
`
`Configuring the Interface
`
`The ifeonfig Command
`'l'CP/iP Over a Serial Line
`
`Installing SLIP
`
`Configuring Routing
`
`Common Routing Configurations
`
`The Minimal Routing Table
`
`Building a Static Routing Table
`
`Interior Routing Protocols
`
`004
`
`004
`
`

`

`
`Table of (f‘rmrenfs__________
`
`Exterior Routing Protocols
`
`Gateway Routing Daemon
`
`vii
`
`.. 184
`
`187
`
`I89
`Configuringgated
`.. 200
`
`Configuring DNSName Service
`BIND: UNIX Name Service
`
`Configuring the Resolver
`
`Configuring named
`
`Using nslookup
`
`..
`
`Configuring Network Servers
`
`The Network File System
`Line Printer Daemon
`
`202
`
`.. 202
`
`205
`208
`
`.. 22!
`
`225
`
`226
`
`.. 226
`
`240
`
`245
`
`Network InformationService
`
`A BOOTP Sewer
`
`Managing Distributed Sewers
`
`I 0:
`
`sendmaz‘l
`
`.. 250
`
`258
`
`263
`.. 266
`
`269
`
`.. 271
`
`sendmail’sFunction
`
`.t 272
`
`Running sendinail as aDaemon
`273
`sentlrnail Aliases
`.. 274
`
`The senclmailcf File
`
`sendmail Configuration
`
`Rewriting the Mail Address
`
`Modifying a sendinaiicf File
`
`Testing sendmailcf
`
`I]:
`
`Troubleshooting TCP/IP
`
`Approaching a Problem
`
`Diagnostic Tools. .
`
`Testing Basic Connectivity
`
`Troubleshooting Network Access
`
`Checking Routing
`
`Checking Name Service
`
`276
`
`283
`295
`
`304
`
`308
`
`t. 318
`
`319
`
`320
`
`.. 322
`
`324
`
`328
`
`t. 335
`
`341
`
`005
`
`005
`
`

`

`
`
` m'it' Tobie of Contents
`
`Analyzing Protocol Problems ...................................................................... .. 349
`Protocol Case Study ..................................................................................... i. 352
`Simple Network Management Protocol
`...................................................... .. 356
`Summary ....................................................................................................... .. 36]
`
`12: Network Security .................................................................................. .. 3 62
`
`Security Planning .......................................................................................... .. 363
`User Authentication ...................................................................................... .. 368
`Application Security ..................................................................................... ‘. 384
`Security Monitoring ...................................................................................... .. 385
`Access Control .............................................................................................. .. 393
`Encryption .................................................................................................... .. 396
`Firewalls ........................................................................................................ .. 398
`Words to the Wise ........................................................................................ .. 403
`Summaiy ...................................................................................................... .. 404
`
`13: Internet Information Resources ..................................................... .. 405
`
`The World Wide Web ................................................................................... .. 405
`Anonymous FTP ........................................................................................... .. 408
`
`............................................................................. .. 413
`Finding Files .................
`Retrieving RFCs
`............................................................................................ .. 4J7
`
`Mailing Lists .................................................................................................. .. 420
`The White Pages .......................................................................................... .. 423
`Summary ....................................................................................................... ., 428
`
`A: PPP Tools ................................................................................................. .. 429
`
`B: A gated Reference ................................................................................. .. 449
`
`C: A named Reference .............................................................................. .. 497
`
`D: A dbcpd Reference ................................................................................ .. 519
`
`E: A sendmm'l Reference ......................................................................... .. 532
`
`F: Selected TCP/IP Headers .................................................................... .. 583
`
`Index .................................................................................................................. .. 589
`
`006
`
`006
`
`

`

`THIS BOOK IS DUE ON THE LAST DATE
`STAMPED BELOW
`
`BOOKS REQUESTED BY ANOTHER BORROWER
`ARE SUBJECT O IMMEDIATE RECALL
`
`
`
`
`
`
`I
`
`NAR {I 7 2016
`
`LIBRARY, UNIVERSITY OF CALIFORNIA, DAVIS
`
`045131 (swam
`
`007
`
`007
`
`

`

`THIS BOOK IS DUE ON THE LAST DATE
`STAMPED BELOW
`
`
`BOfifi REQUESTED BY ANOTHER BORROWER
`3
`
`
`
`
`difié
`
`1 _ n
`..
`1'“
`if); wan ME;
`
`_ REEENEQ
`
`mug”
`
`1
`
`
`
`JAN 1 3 2008
`D t
`LIBRARY. UNIVERSITY OF CALIFORNIA. DAVIS
`htlpn‘flibnle.uodavis.edulPatronFlenaw.html
`Automated Phone HGFIBWEU {24-hour}: (530) 752-1132
`04513 (4:99)»:
`
`’
`
`'
`
`008
`
`008
`
`

`

`THIS BOOK IS DUE ON THE LAST DATE
`STAMPED BELOW
`
`BOOKS REQUESTED BY ANOTHER BORROWER
`ARE SUBJECT TO IMMEDIATE RECALL
`
`
`
`
`LIBRARY, UNIVERSIIX OF CAUFOHNIA. DAVIS
`http:waw.iih.ucdavis.iédufqpcgssrcircwqbfpatronhtml
`Automated Phone Renewai {24-hour}. (530] 752—91132
`AUG 2‘ 5 5535????
`
`009
`
`009
`
`

`

`010
`
`010
`
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket