`
`Second Edition
`
`Craig Hunt
`
`Cambridge
`
`- Kéln
`
`- Paris
`
`- Sebastopol
`
`. Tokyo
`
`Huawei V. Uniloc - Exhibit No. 1016 - 1/ 10
`
`O’REILLY"
`
`Huawei v. Uniloc - Exhibit No. 1016 - 1/10
`
`
`
`TCP/IP Network Administration, Second Edition
`by Craig Hunt
`
`Copyright © 1998, 1992 Craig Hunt. All rights reserved.
`Printed in the United States of America.
`
`Published by O’Reilly 8: Associates, Inc., 101 Morris Street, Sebastopol, CA 95472.
`
`Editor: Mike Loukides
`
`Update Editor: Gigi Estabrook
`
`Production Editor: Nicole Gipson Arigo
`
`Printing History:
`
`August 1992:
`
`First Edition.
`
`March 1993:
`
`Minor corrections
`
`September 1993: Minor corrections.
`
`January 1994:
`
`Minor corrections.
`
`May 1994;
`
`Minor corrections.
`
`januaiy 1998:
`
`Second Edition.
`
`Nutshell Handbook and the Nutshell Handbook logo are registered trademarks and The
`javaTM Series is a trademark of O’Reilly 8: Associates, Inc. The association of a crab and the
`topic of TCP/IP is a trademark of O’Reilly 8: Associates, Inc
`
`Many of the designations used by manufacturers and sellers to distinguish their products are
`claimed as trademarks. Where those designations appear in this book, and O‘Reilly &
`Associates, Inc. was aware of a trademark claim, the designations have been printed in caps
`or initial caps.
`
`While every precaution has been taken in the preparation of this book, the publisher assumes
`no responsibility for errors or omissions, or for damages resulting from the use of the
`information contained herein.
`
`03
`{2&9
`
`This book is printed on acid—free paper With 85% recycled content, 15% post—consumer waste.
`O’Reilly & Associates is committed to using paper with the highest recycled content available
`consistent with high quality.
`
`ISBN: 1—56592—522—7
`
`Huawei V. Uniloc - Exhibit No. 1016 - 2/10
`
`Huawei v. Uniloc - Exhibit No. 1016 - 2/10
`
`
`
`Table of Contents
`
`Preface ..................................................................................................................... xi
`
`1: Overview ofTCP/IP
`
`............ I
`
`TCP/IP and the Internet ..................................................................................... 2
`
`A Data Communications Model ......................................................................... 5
`
`TCP/1P Protocol Architecture ............................................................................. 8
`
`Network Access Layer ...................................................................................... 11
`Internet Layer .................................................................................................... I 1
`
`Transport Layer ................................................................................................. I 7
`
`Application Layer .............................................................................................. 21
`Summary ........................................................................................................... 22
`
`2: Delivering the Data .................................................................................. 23
`
`Addressing, Routing, and Multiplexing ........................................................... 23
`The IP Address ................................................................................................. 25
`
`Subnets .............................................................................................................. 31
`
`Internet Routing Architecture .......................................................................... 34
`
`The Routing Table ............................................................................................ 36
`
`Address Resolution ........................................................................................... 39
`Protocols, Ports, and Sockets ........................................................................... 42
`
`Summary ........................................................................................................... 4 7
`
`Huawei V. Uniloc - Exhibit No. 1016 - 3/1012
`
`Huawei v. Uniloc - Exhibit No. 1016 - 3/10
`
`
`
`
`vi
`Table of Contents
`
`3: Network Services ...................................................................................... 48
`
`Names and Addresses ...................................................................................... 49
`
`The Host Table ................................................................................................. 50
`
`Domain Name Service ...................................................................................... 52
`
`Mail Services ..................................................................................................... 60
`
`Configuration Servers ....................................................................................... 71
`
`Bootstrap Protocol ............................................................................................ 73
`File and Print Servers ....................................................................................... 76
`
`Summary ........................................................................................................... 78
`
`4: Getting Started ........................................................................................... 80
`
`Connected and Non—Connected Networks ..................................................... 81
`
`Basic Information ............................................................................................. 83
`
`Planning Routing .............................................................................................. 91
`
`Planning Naming Service ................................................................................. 94
`
`Other Services ................................................................................................... 97
`
`Informing the Users ....................................................................................... 100
`
`netconfig ....................................................... '.................................................. 102
`
`Summary ......................................................................................................... 1 04
`
`5: Basic Configuration .............................................................................. 105
`
`Kernel Configuration ...................................................................................... 105
`
`Linux Kernel Configuration ........................................................................... 106
`
`The BSD Kernel Configuration File ............................................................... 112
`The Internet Daemon ..................................................................................... 118
`
`Summary ......................................................................................................... 121
`
`6: Configuring the Interface .................................................................... 123
`
`, The ifconfig Command .................................................................................. 123
`TCP/IP Over a Serial Line ................................................... ‘; .......................... 13 7
`
`Installing PPP .................................................................................................. 140
`
`Installing SLIP ................................................................................................. 153
`Summary ......................................................................................................... 1 62
`
`7: Configuring Routing ............................................................................. 164
`
`Common Routing Configurations .................................................................. 164
`
`The Minimal Routing Table ........................................................................... 165
`
`Building 3 Static Routing Table ..................................................................... I67
`
`Interior Routing Protocols .............................................................................. 1 73
`
`Huawei V. Uniloc - Exhibit No. 1016 - 4/10
`
`Huawei v. Uniloc - Exhibit No. 1016 - 4/10
`
`
`
`Table of Contents
`
`my
`
`Exterior Routing Protocols ............................................................................. I84
`
`Gateway Routing Daemon ............................................................................. 187
`
`Configuring gated ........................................................................................... 189
`Summary ......................................................................................................... 200
`
`Configuring DNS Name Service ........................................................ 202
`
`BIND: UNIX Name Service ............................................................................ 202
`
`Configuring the Resolver ............................................................................... 205
`
`Configuring named ........................................................................................ 208
`
`Using nslookup .............................................................................................. 221
`
`Summary ......................................................................................................... 225
`
`Configuring Network Servers ............................................................ 226
`
`The Network File System ............................................................................... 226
`Line Printer Daemon ...................................................................................... 240
`
`Network Information Service ......................................................................... 245
`
`A BOOTP Server ............................................................................, ................ 250
`DHCP .............................................................................................................. 258
`
`Managing Distributed Servers ........................................................................ 263
`Mail Servers .................................................................................................... 266
`
`Summary ......................................................................................................... 269
`
`I 0:
`
`sendmuz'l .................................................................................................... 27]
`
`sendmail’s Function ........................................................................................ 272
`
`Running sendmail as a Daemon .................................................................... 273
`sendmail Aliases ............................................................................................. 274
`
`The sendmailcf File ....................................................................................... 276
`
`sendmail Configuration .................................................................................. 283
`
`Rewriting the Mail Address ............................................................................ 295
`
`Modifying a sendmailcf File .......................................................................... 304
`
`Testing sendmailcf ......................................................................................... 308
`
`Summary ......................................................................................................... 318
`
`1]:
`
`Troubleshooting TCP/IP ........................................................................ 3 19
`
`Approaching a Problem ................................................................................. 320
`
`Diagnostic Tools ............................................................................................. 322
`
`Testing Basic Connectivity ............................................................................. 324
`
`Troubleshooting Network Access .................................................................. 328
`
`Checking Routing ........................................................................................... 335
`
`Checking Name Service ................................................................................. 341
`
`Huawei V. Uniloc - Exhibit No. 1016 - 5/10
`
`Huawei v. Uniloc - Exhibit No. 1016 - 5/10
`
`
`
`viii
`Table of Contents
`
`Analyzing Protocol Problems ........................................................................ 349
`Protocol Case Study ....................................................................................... 352
`Simple Network Management Protocol
`........................................................ 356
`Summary ......................................................................................................... 36]
`
`12: Network Security .................................................................................... 362
`
`Security Planning ............................................................................................ 363
`User Authentication ........................................................................................ 368
`Application Security ....................................................................................... 384
`Security Monitoring ........................................................................................ 385
`
`Access Control ................................................................................................ 393
`Encryption ...................................................................................................... 396
`Firewalls .......................................................................................................... 398
`Words to the Wise .......................................................................................... 403
`Summary ......................................................................................................... 404
`
`13: Internet Information Resources ....................................................... 405
`
`The World Wide Web ..................................................................................... 405
`Anonymous FTP ............................................................................................. 408
`
`Finding Files ................................................................................................... 413
`Retrieving RFCs .............................................................................................. 417
`
`Mailing Lists .................................................................................................... 420
`
`The White Pages ............................................................................................ 423
`Summary ......................................................................................................... 428
`
`A: PPP Tools ................................................................................................... 429
`
`B: A gated Reference ................................................................................... 449
`
`C: A named Reference ................................................................................ 497
`
`D: A dbcpd Reference .................................................................................. 519
`
`E: A sendmdz‘l Reference ........................................................................... 532
`
`F: Selected TCP/IP Headers ...................................................................... 583
`
`Index .................................................................................................................... 589
`
`Huawei V. Uniloc - Exhibit No. 1016 - 6/10
`
`Huawei v. Uniloc - Exhibit No. 1016 - 6/10
`
`
`
`
`
`~
`- THIS BOOK ISDUE Q11 mESLAstATE ‘
`STAMPEDiBEWWV-TV
`‘
`‘ A;
`
`BOOKS REQUESTED BY ANOTHER Bonnowsh
`
`ARE SUBJECT To IMMEDIATE RECALL
`Lv
`
`
`
`LlBRARY, UNIVERSITY OF CALIFORNIA, DAVIS
`
`04613-1 (5/02)M
`
`Huawei V. Uniloc - Exhibit No. 1016 - 7/10
`
`Huawei v. Uniloc - Exhibit No. 1016 - 7/10
`
`
`
`
`
`THIS BOOK IS DUE ON THE LAST DATE
`STAMPED BELOW
`
`
`
`LIBRARY, UNIVERSITY OF CALIFORNIA, DAVIS
`http://libnte.ucdavis.edu/PatronRenew.html
`Automated Phone Renewal (24-hour): (530) 7524132
`D4613 (4/99)M
`
`/
`
`Huawei V. Uniloc - Exhibit No. 1016 - 8/10
`
`Huawei v. Uniloc - Exhibit No. 1016 - 8/10
`
`
`
`
`
`THIS BOOK IS DUE ON-THE LAST DATE
`STAMPED BELOW
`
`BOOKS REQUESTED BY ANOTHER BORROWER
`ARE SUBJECT TO IMMEDIATE RECALL
`
`
`3M; mama}! 1% Ligmv
`$235 JAN “*6 199m 5&1: we
`% 5
`
`
`
`LIBRARY. UNIVERSE! OF CAUFORNIA, DAVIS
`http://www.lib.ucdavis.édu/apcess/cierep/patron.html
`Automated Phone Renewal (ad-hour). (530) 75271132
`D4613 (3/98)
`aw;
`s»;
`--
`_
`
`1
`
`Huawei V. Uniloc - Exhibit No. 1016 - 9/10
`
`Huawei v. Uniloc - Exhibit No. 1016 - 9/10
`
`
`
`Huawei V. Uniloc - Exhibit No. 1016 - 10/ 10
`
`Huawei v. Uniloc - Exhibit No. 1016 - 10/10
`
`