Book Home

Networking CD BookshelfSearch this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: P

packages
installed package information: A.1.2. Solaris Packages
installing in Solaris: A.1.2. Solaris Packages
integrity: A.1.2. Solaris Packages
Red Hat Package Manager: A.1.3. Red Hat Package Manager
removing: A.1.2. Solaris Packages
packet analyzers: 5.1. Traffic Capture Tools
5.6. Packet Analyzers
packet capture
access to traffic: 5.2. Access to Traffic
analysis tools: 5.5. Analysis Tools
5.6. Packet Analyzers
checking email clients: 10.1.1. Email
ethereal tool: 5.6.1.1. Using ethereal
host-monitoring tools: 8.1. What, When, and Where
8.2. Host-Monitoring Tools
Microsoft Windows tools: 5.8. Microsoft Windows
network-monitoring tools: 8.1. What, When, and Where
8.4. Network-Monitoring Tools
point-monitoring tools: 8.1. What, When, and Where
8.3. Point-Monitoring Tools
promiscuous mode and: 5.3. Capturing Data
remote packet capture: 8.5. RMON
restricting tools and privileges: 5.7.2. Protecting Yourself
retransmitting captured packets: 9.1.1.3. Other tools
security and privacy issues: 5. Packet Capture
5.7. Dark Side of Packet Capture
SNMP agents: 7.2.1.7. snmpstatus
7.2.1.8. Agents and traps
snmpnetstat tool: 7.2.1.6. snmpnetstat
snoop tool: 5.5.10. Other Packet Capture Programs
tcpdump tool: 5.4. tcpdump
techniques: 5.3. Capturing Data
traffic capture tools: 5.1. Traffic Capture Tools
packet injection tools: 9.1. Packet Injection Tools
custom packets generators: 9.1.1. Custom Packets Generators
emulators: 9.2.1. NISTNet
load generators: 9.1.2. Load Generators
using packet sniffers with: 9.1.1.2. nemesis
Packet InterNet Groper (see ping tools)
packet pair software: 4.2.2.4. Packet pair software
packet sniffers: 5.1. Traffic Capture Tools
5.1. Traffic Capture Tools
capture and retransmission: 9.1.1.3. Other tools
detecting: 5.7.2. Protecting Yourself
SNMP messages and: 7.1. Overview of SNMP
switches and: 5.7.1. Switch Security
using with packet generators: 9.1.1.2. nemesis
packet stretch measurements: 4.2.2.4. Packet pair software
packets
analysis summary: 5.4.2.3. Controlling what's displayed
blocking: 3.3.2.2. Interpreting results
capturing (see packet capture)
characteristics: 5.4.2.4.3. Packet characteristics.
customized packets: 9.1. Packet Injection Tools
9.1.1. Custom Packets Generators
damaged: 3.3.2.2. Interpreting results
dropped: 9.1.2.1. spray
duplicate: 3.3.2.2. Interpreting results
fields in: 9.1. Packet Injection Tools
filters: 3.3.2.2. Interpreting results
5.4.2.4.3. Packet characteristics.
flooding networks with: 3.3.2.3. Options
forged ARP packets: 5.7.1. Switch Security
fragmentation: 3.3.2.3. Options
headers in: 5.4.2.4.3. Packet characteristics.
5.4.2.4.3. Packet characteristics.
9.1.1.1. hping
hexadecimal: 5.4.2.3. Controlling what's displayed
5.6.1.1. Using ethereal
9.1.1.1. hping
intervals between: 3.3.2.3. Options
length: 3.3.3.3. Ping of Death
5.4.2.4.3. Packet characteristics.
limiting capture: 5.4.2.1. Controlling program behavior
listing number sent: 2.1.3. netstat
load generators: 9.1. Packet Injection Tools
lost packets: 3.3.2.2. Interpreting results
4.1. Path Discovery with traceroute
4.2.2.3. bing
5.3. Capturing Data
9.1.2.1. spray
number captured: 5.4.2.1. Controlling program behavior
5.6.1.1. Using ethereal
5.6.1.1. Using ethereal
8.3.1.1. Interactive mode
number sent: 3.3.2.3. Options
4.1.1. Options
4.2.2.2. pathchar
9.1.1.1. hping
9.1.2.1. spray
offsets in headers: 5.4.2.4.3. Packet characteristics.
out-of-order: 5.5.3. tcpflow
oversized packets: 3.3.3.3. Ping of Death
path discovery: 4.1. Path Discovery with traceroute
patterns for data: 3.3.2.3. Options
performance measurements: 4.2.1. Performance Measurements
ping and: 3.3.2. How ping Works
3.3.2.2. Interpreting results
protocol trees for: 5.6.1.1. Using ethereal
rate of sending: 3.3.2.3. Options
retransmitting after capture: 9.1.1.3. Other tools
round-trip times: 3.3.2. How ping Works
setup or teardown: 5.4.2.4.3. Packet characteristics.
size: 3.3.2.3. Options
3.3.3.3. Ping of Death
4.2.2.2. pathchar
4.2.2.3. bing
8.3.1.2. Web mode
9.1.1.1. hping
9.1.2.1. spray
9.1.2.2. MGEN
sniffing (see packet sniffers)
SNMP packets: 7.2.1.2. Configuration and options
spray tool: 9.1.2.1. spray
timeouts for: 4.1.1. Options
timestamps in: 3.3.2.3. Options
truncating: 5.4.2.1. Controlling program behavior
TTL field: 4.1. Path Discovery with traceroute
parameters
in performance measurement: 12.2.2.1. General steps
SNMP objects as: 7.1. Overview of SNMP
passive fingerprinting: 6.3.1. Stack Fingerprinting
passwords
SNMP community strings: 6.6. Politics and Security
7.1. Overview of SNMP
verifying for email accounts: 10.1.1. Email
patch cabling: 3.2. Testing Adapters
5.2. Access to Traffic
patch devices: 5.2. Access to Traffic
pathchar bandwidth tools: 4.2.2.2. pathchar
A.4. Sources for Tools
A.4. Sources for Tools
paths
available paths in routing tables: 2.1.3. netstat
characteristics
listing all devices on paths: 4.1.2. Complications with traceroute
performance: 4.2. Path Performance
traceroute discovery: 4.1. Path Discovery with traceroute
counting hops on: 3.3.2.2. Interpreting results
discovery: 4.1.1. Options
4.1.2. Complications with traceroute
ISP network access: 4.2.3.4. Other related tools
performance
bandwidth measurements: 4.2.2. Bandwidth Measurements
measurements: 4.2.1. Performance Measurements
Microsoft Windows: 4.3. Microsoft Windows
throughput measurement: 4.2.3. Throughput Measurements
traffic measurements: 4.2.4. Traffic Measurements with netstat
unreachable networks: 3.3.2.2. Interpreting results
pattern expression in log files: 11.2.2. Log File Management
patterns
for packet data: 3.3.2.3. Options
of usage: 8.1. What, When, and Where
pchar bandwidth tool: 4.2.2.2. pathchar
A.4. Sources for Tools
peering arrangements: 4.1. Path Discovery with traceroute
4.2.3.4. Other related tools
perfmon monitoring tool: 8.6. Microsoft Windows
performance analysis
analytical modeling: 12.2.2. Performance Analysis and Monitoring
measurement: 12.2.2. Performance Analysis and Monitoring
simulations: 12.2.2. Performance Analysis and Monitoring
steps in: 12.2.2. Performance Analysis and Monitoring
Performance Endpoints software: 4.3. Microsoft Windows
performance management in network management software: 6.1.1. Characteristics of Management Software
performance measurement: 12.2.2. Performance Analysis and Monitoring
(see also performance analysis)
bandwidth: 4.2. Path Performance
4.2.2. Bandwidth Measurements
books and resources: B.2.4. Performance
bottleneck analysis: 12.2.2.2. Bottleneck analysis
in capacity planning: 12.2.2.3. Capacity planning
choosing tools: 12.2.2.1. General steps
emulators and simulators: 9.2. Network Emulators and Simulators
host-monitoring tools: 8.2. Host-Monitoring Tools
ISPs: 4.2.3.4. Other related tools
load generators: 9.1.2. Load Generators
Microsoft Windows: 4.3. Microsoft Windows
8.6. Microsoft Windows
mrtg and varieties: 8.4.1. mrtg
network-monitoring tools: 8.4. Network-Monitoring Tools
over time: 8.1. What, When, and Where
packet injection: 9.1. Packet Injection Tools
path performance: 4.2. Path Performance
ping tools: 3.3.2.3. Options
point-monitoring tools: 8.3. Point-Monitoring Tools
reproducibility: 9.2. Network Emulators and Simulators
RMON: 8.5. RMON
steps in: 12.2.2.1. General steps
terminology: 4.2.1. Performance Measurements
throughput: 4.2. Path Performance
4.2.3. Throughput Measurements
traffic measurement: 4.2. Path Performance
4.2.4. Traffic Measurements with netstat
8.1. What, When, and Where
types of data collection: 8.1. What, When, and Where
understanding current behavior: 1.2. Need for Troubleshooting Tools
web servers: 10.1.2. HTTP
Performance Monitor tool: 8.6. Microsoft Windows
periodic replacement costs: 1.3.2.4. Economic considerations
Perl
Active Perl web site: 8.6.1. ntop, mrtg, and cricket on Windows
books and resources: B.2.8. Scripting
cricket and: 8.6.1. ntop, mrtg, and cricket on Windows
mrtg and: 8.4.2. rrd and the Future of mrtg
8.6.1. ntop, mrtg, and cricket on Windows
scripting with: 6.4. Scripts
permissions, tcpwrappers tool and: 11.2.3.1. tcpwrappers
personal firewalls: 6.6. Politics and Security
personnel problems: 1.3.2.2. Ego management
Peter Principle: 1.3.2.3. Legal and ethical considerations
p0f fingerprinting tool: 6.3.1. Stack Fingerprinting
A.4. Sources for Tools
physical environment and cabling: 3.1.1. Installing New Cabling
pin-outs: 3.1.3.2. Cable testers
Ping of Death Attack: 3.3.3.3. Ping of Death
ping scanners: 6.2.1. IP Address Management
ping tools
alternatives to: 3.3.4. Alternatives to ping
bandwidth measurements: 4.2.2.1. ping revisited
checking client name resolution: 10.1.4. Name Services
cyberkit suite: 6.7.1. Cyberkit
detecting packet sniffers with: 5.7.2. Protecting Yourself
discovering MAC/IP address pairs: 6.2.1. IP Address Management
DOS attacks and: 3.3.3.1. Security and ICMP
examples: 3.3.2.1. Simple examples
functions: 3.3.2. How ping Works
generating loads with: 9.1.2. Load Generators
graphing round-trip delays: 8.6.2. getif revisited
hping tool: 9.1.1.1. hping
interpreting results: 3.3.2.2. Interpreting results
Microsoft Windows: 3.4. Microsoft Windows
options: 3.3.2.3. Options
Ping of Death Attack: 3.3.3.3. Ping of Death
problems with: 3.3.3. Problems with ping
running: 3.3.2.4. Using ping
source web site: A.4. Sources for Tools
source web sites: A.4. Sources for Tools
testing connectivity with: 3.3. Software Testing with ping
versions: 3.3.1. ping
pkgadd command (Solaris): A.1.2. Solaris Packages
pkgchk command (Solaris): A.1.2. Solaris Packages
pkginfo package command (Solaris): A.1.2. Solaris Packages
pkgrm command (Solaris): A.1.2. Solaris Packages
planning
capacity planning (see capacity planning)
performance analysis (see performance analysis)
playing back captured tcpdump data: 5.4.2.1. Controlling program behavior
plenum cabling: 3.1.1. Installing New Cabling
plotting traffic data (see graphing traffic data)
plugins for ntop tool: 8.3.1.2. Web mode
pmon.exe tool: 2.3. Microsoft Windows
point-monitoring tools: 8.1. What, When, and Where
8.3. Point-Monitoring Tools
ntop: 8.3.1. ntop
Windows: 8.6. Microsoft Windows
point-to-point bandwidth: 4.2.2.3. bing
point tools: 6.1.2. Discovery and Mapping Tools
Poisson distribution: 9.1.2.2. MGEN
policies for networks: 1.3.1. Documentation
polling with tkined: 7.2.3.1. ICMP monitoring
7.2.3.5. Other commands
POP2 and POP3 protocols: 6.3. Device Identification
6.3. Device Identification
10.1.1. Email
port 0: 9.1.1.1. hping
port collections: A.1.4. FreeBSD Ports
port scanners: 2.1.7. Scanning Tools
identifying hardware with: 6.3. Device Identification
nmap tool: 6.2.2. nmap
Windows tools: 2.3. Microsoft Windows
portable computers: 5.2. Access to Traffic
portable hubs: 5.2. Access to Traffic
portmap NFS daemon: 10.1.6. NFS
portmapper NFS daemon: 10.1.6. NFS
ports
aliasing: 5.2. Access to Traffic
displaying numbers for connections: 2.1.3. netstat
duplicating traffic on: 5.2. Access to Traffic
ephemeral: 5.4.2.4.4. Compound filters.
5.5.3. tcpflow
filtering: 5.4.2.4.2. Protocol and port filtering.
5.4.2.4.4. Compound filters.
getif results: 7.4.2. SNMP Tools
graphing usage by: 8.3.1.2. Web mode
MGEN packet settings: 9.1.2.2. MGEN
mirroring: 5.2. Access to Traffic
mrtg setting: 8.4.2. rrd and the Future of mrtg
nemesis settings: 9.1.1.2. nemesis
ntop selection: 8.3.1.2. Web mode
preserving numbers in data: 5.5.2. tcpdpriv
scanning (see port scanners)
telnet information at login: 6.3. Device Identification
traceroute starting ports: 4.1.1. Options
portscan scanning tool: 2.1.7. Scanning Tools
11.4. Security Tools
A.4. Sources for Tools
power lines, cabling and: 3.1.1. Installing New Cabling
PPP (Point-to-Point Protocol): 3.3.2.3. Options
B.2.3. Specific Protocols
precedence in operators: 5.4.2.4.4. Compound filters.
precompiled binary files: A.1.1. Generic Installs
printed documentation: B.1. Sources of Information
printing
screen shots of windows: 11.1.1. Automating Documentation
troubleshooting details: 11.1.1. Automating Documentation
priorities for traffic: 3.3.3.4. Other problems
privacy issues
egos and: 1.3.2.2. Ego management
limiting bytes captured and: 5.4.2.1. Controlling program behavior
packet capture and: 5. Packet Capture
sanitize tool: 5.5.1. sanitize
segmented networks and: 5.2. Access to Traffic
TCP streams and: 5.6.1.1. Using ethereal
tcpdpriv tool: 5.5.2. tcpdpriv
use of network tools and: 1.3.2.3. Legal and ethical considerations
private MIBs (enterprise): 7.1. Overview of SNMP
7.2.1.5. snmptranslate
7.2.3.3. Examining MIBs
proactive nature of troubleshooting: 0. Preface
probe computers: 5.2. Access to Traffic
problem decomposition technique: 1.1. General Approaches to Troubleshooting
process documentation: 1.3.1. Documentation
process explode tool: 2.3. Microsoft Windows
process monitor tool: 2.3. Microsoft Windows
process viewer tool: 2.3. Microsoft Windows
processes
bottlenecks in: 12.2.2.2. Bottleneck analysis
defunct processes: 2.1.1. ps
initiated by vnc: 11.1.2. vnc
listing: 2.1.1. ps
2.1.4. lsof
2.1.4. lsof
2.3. Microsoft Windows
listing usersÕ processes: 2.1.1. ps
lsof tool: 2.1.4. lsof
2.1.4. lsof
Microsoft Windows: 2.3. Microsoft Windows
multiple instances: 2.1.1. ps
ranking in order of CPU usage: 2.1.2. top
resource-hogging: 2.1.2. top
rogue processes: 2.1.1. ps
run levels and: 2.2.4. Startup Files and Scripts
SNMP agent information: 7.2.1.8. Agents and traps
processor loads in SNMP agent information: 7.2.1.8. Agents and traps
professionalism in network management: 1.3.2.1. Professionalism
promiscuous mode
arpwatch tool: 6.2.3. arpwatch
checking interfaces: 5.7.2. Protecting Yourself
disabling in tcpdump: 5.4.2.1. Controlling program behavior
ethereal settings: 5.6.1.1. Using ethereal
ntop tool: 8.3.1. ntop
packet capture and: 5.3. Capturing Data
propagation delays or times: 4.2.1. Performance Measurements
4.2.2.1. ping revisited
4.2.2.1. ping revisited
protecting networks (see security issues)
protocol analyzers: 5.1. Traffic Capture Tools
5.1. Traffic Capture Tools
protocol stack, application data in: 5.1. Traffic Capture Tools
protocols
application-level (see application-level protocols)
capturing traffic with snmpnetstat: 7.2.1.6. snmpnetstat
connectivity protocols (see connectivity protocols)
displaying traffic by: 8.3.1.2. Web mode
displaying with netstat: 2.1.3. netstat
filtering: 5.4.2.4.2. Protocol and port filtering.
network-level (see names of specific protocols)
packet capture and: 5.1. Traffic Capture Tools
transport-level (see names of specific protocols)
tree display in ethereal: 5.6.1.1. Using ethereal
proxy servers, stack fingerprinting and: 6.3.1. Stack Fingerprinting
ps command: 2.1.1. ps
2.1.7. Scanning Tools
7.2.1.8. Agents and traps
public time servers: 11.3. NTP
published addresses in ARP tables: 2.1.6. arp
purchase information: 1.3.1. Documentation
purchasing software: 6.1.3. Selecting a Product
putty ssh tool: 11.5. Microsoft Windows
A.4. Sources for Tools
pviewer.exe process tool: 2.3. Microsoft Windows
pview.exe process tool: 2.3. Microsoft Windows


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z


Library Navigation Links

Copyright © 2002 O'Reilly & Associates, Inc. All Rights Reserved.