|
|
|
Table of Contents | |||||||
---|---|---|---|---|---|---|---|
1 | Prelude to a Practical Guide | 1 | |||||
Layered Protocols: A Description and History | 2 | ||||||
TCP/IP | 3 | ||||||
TCP/IP in Action: A Narrative | 5 | ||||||
RFCs | 7 | ||||||
TCP/IP and Linux | 9 | ||||||
Physical-Layer Issues | 10 | ||||||
Endnotes | 13 | ||||||
I | The Protocols | ||||||
2 | Link-Layer Protocols | 17 | |||||
PPP | 18 | ||||||
Ethernet | 19 | ||||||
PPPoE | 21 | ||||||
ARP and RARP | 28 | ||||||
MTU | 31 | ||||||
Endnotes | 32 | ||||||
3 | Network-Layer Protocols | 33 | |||||
IP Addresses | 33 | ||||||
Subnets and Supernets | 36 | ||||||
Routing | 39 | ||||||
Packet Filtering | 45 | ||||||
Network Address Translation | 46 | ||||||
IPv4 | 46 | ||||||
Endnotes | 51 | ||||||
4 | Transport-Layer Protocols | 53 | |||||
Ports and Sockets | 53 | ||||||
TCP | 57 | ||||||
UDP | 67 | ||||||
ICMP | 69 | ||||||
Endnotes | 75 | ||||||
5 | Application-Layer Protocols | 77 | |||||
RIP | 77 | ||||||
TFTP | 81 | ||||||
HTTP | 89 | ||||||
Endnotes | 95 | ||||||
II | Using the Protocols Effectively | ||||||
6 | A Problem-Solving Pattern | 99 | |||||
Step 1 | Clearly Describe the Symptoms | 101 | |||||
Step 2 | Understand the Environment | 103 | |||||
Step 3 | List Hypotheses | 106 | |||||
Step 4 | Prioritize Hypotheses and Narrow Focus | 107 | |||||
Step 5 | Create a Plan of Attack | 108 | |||||
Step 6 | Act on Your Plan | 109 | |||||
Step 7 | Test Results | 110 | |||||
Step 8 | Apply Results of Testing to Hypotheses | 111 | |||||
Step 9 | Iterate as Needed | 112 | |||||
Two Stories of Problem Solving | 113 | ||||||
Endnotes | 116 | ||||||
7 | Before Things Break--Building a Baseline | 117 | |||||
Why Baselines Matter | 117 | ||||||
What Is a Baseline? | 119 | ||||||
How to Create a Baseline | 122 | ||||||
How to Keep Your Baseline Up-to-Date | 127 | ||||||
Where Monitoring Fits into All of This | 128 | ||||||
Endnotes | 128 | ||||||
8 | In the Moment--Case Studies | 129 | |||||
The Network | 129 | ||||||
The People | 130 | ||||||
The Case Studies | 130 | ||||||
III | Tools for Your Toolkit | ||||||
9 | Troubleshooting Tools | 143 | |||||
ping | 143 | ||||||
traceroute | 147 | ||||||
arp | 149 | ||||||
ngrep | 151 | ||||||
Endnotes | 155 | ||||||
10 | Monitoring Tools | 157 | |||||
Ethereal | 158 | ||||||
mon | 168 | ||||||
Endnotes | 173 | ||||||
11 | Security Tools | 175 | |||||
nmap | 176 | ||||||
Nessus | 181 | ||||||
iptables | 189 | ||||||
Xinetd | 196 | ||||||
tcp wrappers | 202 | ||||||
OPIE | 204 | ||||||
Endnotes | 206 | ||||||
A | RFC-1122 | 207 | |||||
Summary | 207 | ||||||
Table of Contents | 208 | ||||||
1. | Introduction | 211 | |||||
2. | Link Layer | 222 | |||||
3. | Internet Layer Protocols | 227 | |||||
4. | Transport Protocols | 267 | |||||
5. | References | 294 | |||||
B | RFC-1123 | 299 | |||||
Requirements for Internet Hosts | 299 | ||||||
Table of Contents | 300 | ||||||
1. | Introduction | 304 | |||||
2. | General Issues | 309 | |||||
3. | Remote Login--Telnet Protocol | 312 | |||||
4. | File Transfer | 323 | |||||
5. | Electronic Mail--Smtp and RFC-822 | 337 | |||||
6. | Support Services | 357 | |||||
7. | References | 372 | |||||
C | Open Publication License | 377 |
Location | Call no. | Vol. | Availability |
---|---|---|---|
W'PONDS | 005.71268 Linux Eyl/Nla | AVAILABLE |
|
|