Index: P
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: P
- packages
- installed package information: A.1.2. Solaris Packages
- installing in Solaris: A.1.2. Solaris Packages
- integrity: A.1.2. Solaris Packages
- Red Hat Package Manager: A.1.3. Red Hat Package Manager
- removing: A.1.2. Solaris Packages
- packet analyzers: 5.1. Traffic Capture Tools
- 5.6. Packet Analyzers
- packet capture
- access to traffic: 5.2. Access to Traffic
- analysis tools: 5.5. Analysis Tools
- 5.6. Packet Analyzers
- checking email clients: 10.1.1. Email
- ethereal tool: 5.6.1.1. Using ethereal
- host-monitoring tools: 8.1. What, When, and Where
- 8.2. Host-Monitoring Tools
- Microsoft Windows tools: 5.8. Microsoft Windows
- network-monitoring tools: 8.1. What, When, and Where
- 8.4. Network-Monitoring Tools
- point-monitoring tools: 8.1. What, When, and Where
- 8.3. Point-Monitoring Tools
- promiscuous mode and: 5.3. Capturing Data
- remote packet capture: 8.5. RMON
- restricting tools and privileges: 5.7.2. Protecting Yourself
- retransmitting captured packets: 9.1.1.3. Other tools
- security and privacy issues: 5. Packet Capture
- 5.7. Dark Side of Packet Capture
- SNMP agents: 7.2.1.7. snmpstatus
- 7.2.1.8. Agents and traps
- snmpnetstat tool: 7.2.1.6. snmpnetstat
- snoop tool: 5.5.10. Other Packet Capture Programs
- tcpdump tool: 5.4. tcpdump
- techniques: 5.3. Capturing Data
- traffic capture tools: 5.1. Traffic Capture Tools
- packet injection tools: 9.1. Packet Injection Tools
- custom packets generators: 9.1.1. Custom Packets Generators
- emulators: 9.2.1. NISTNet
- load generators: 9.1.2. Load Generators
- using packet sniffers with: 9.1.1.2. nemesis
- Packet InterNet Groper (see ping tools)
- packet pair software: 4.2.2.4. Packet pair software
- packet sniffers: 5.1. Traffic Capture Tools
- 5.1. Traffic Capture Tools
- capture and retransmission: 9.1.1.3. Other tools
- detecting: 5.7.2. Protecting Yourself
- SNMP messages and: 7.1. Overview of SNMP
- switches and: 5.7.1. Switch Security
- using with packet generators: 9.1.1.2. nemesis
- packet stretch measurements: 4.2.2.4. Packet pair software
- packets
- analysis summary: 5.4.2.3. Controlling what's displayed
- blocking: 3.3.2.2. Interpreting results
- capturing (see packet capture)
- characteristics: 5.4.2.4.3. Packet characteristics.
- customized packets: 9.1. Packet Injection Tools
- 9.1.1. Custom Packets Generators
- damaged: 3.3.2.2. Interpreting results
- dropped: 9.1.2.1. spray
- duplicate: 3.3.2.2. Interpreting results
- fields in: 9.1. Packet Injection Tools
- filters: 3.3.2.2. Interpreting results
- 5.4.2.4.3. Packet characteristics.
- flooding networks with: 3.3.2.3. Options
- forged ARP packets: 5.7.1. Switch Security
- fragmentation: 3.3.2.3. Options
- headers in: 5.4.2.4.3. Packet characteristics.
- 5.4.2.4.3. Packet characteristics.
- 9.1.1.1. hping
- hexadecimal: 5.4.2.3. Controlling what's displayed
- 5.6.1.1. Using ethereal
- 9.1.1.1. hping
- intervals between: 3.3.2.3. Options
- length: 3.3.3.3. Ping of Death
- 5.4.2.4.3. Packet characteristics.
- limiting capture: 5.4.2.1. Controlling program behavior
- listing number sent: 2.1.3. netstat
- load generators: 9.1. Packet Injection Tools
- lost packets: 3.3.2.2. Interpreting results
- 4.1. Path Discovery with traceroute
- 4.2.2.3. bing
- 5.3. Capturing Data
- 9.1.2.1. spray
- number captured: 5.4.2.1. Controlling program behavior
- 5.6.1.1. Using ethereal
- 5.6.1.1. Using ethereal
- 8.3.1.1. Interactive mode
- number sent: 3.3.2.3. Options
- 4.1.1. Options
- 4.2.2.2. pathchar
- 9.1.1.1. hping
- 9.1.2.1. spray
- offsets in headers: 5.4.2.4.3. Packet characteristics.
- out-of-order: 5.5.3. tcpflow
- oversized packets: 3.3.3.3. Ping of Death
- path discovery: 4.1. Path Discovery with traceroute
- patterns for data: 3.3.2.3. Options
- performance measurements: 4.2.1. Performance Measurements
- ping and: 3.3.2. How ping Works
- 3.3.2.2. Interpreting results
- protocol trees for: 5.6.1.1. Using ethereal
- rate of sending: 3.3.2.3. Options
- retransmitting after capture: 9.1.1.3. Other tools
- round-trip times: 3.3.2. How ping Works
- setup or teardown: 5.4.2.4.3. Packet characteristics.
- size: 3.3.2.3. Options
- 3.3.3.3. Ping of Death
- 4.2.2.2. pathchar
- 4.2.2.3. bing
- 8.3.1.2. Web mode
- 9.1.1.1. hping
- 9.1.2.1. spray
- 9.1.2.2. MGEN
- sniffing (see packet sniffers)
- SNMP packets: 7.2.1.2. Configuration and options
- spray tool: 9.1.2.1. spray
- timeouts for: 4.1.1. Options
- timestamps in: 3.3.2.3. Options
- truncating: 5.4.2.1. Controlling program behavior
- TTL field: 4.1. Path Discovery with traceroute
- parameters
- in performance measurement: 12.2.2.1. General steps
- SNMP objects as: 7.1. Overview of SNMP
- passive fingerprinting: 6.3.1. Stack Fingerprinting
- passwords
- SNMP community strings: 6.6. Politics and Security
- 7.1. Overview of SNMP
- verifying for email accounts: 10.1.1. Email
- patch cabling: 3.2. Testing Adapters
- 5.2. Access to Traffic
- patch devices: 5.2. Access to Traffic
- pathchar bandwidth tools: 4.2.2.2. pathchar
- A.4. Sources for Tools
- A.4. Sources for Tools
- paths
- available paths in routing tables: 2.1.3. netstat
- characteristics
- listing all devices on paths: 4.1.2. Complications with traceroute
- performance: 4.2. Path Performance
- traceroute discovery: 4.1. Path Discovery with traceroute
- counting hops on: 3.3.2.2. Interpreting results
- discovery: 4.1.1. Options
- 4.1.2. Complications with traceroute
- ISP network access: 4.2.3.4. Other related tools
- performance
- bandwidth measurements: 4.2.2. Bandwidth Measurements
- measurements: 4.2.1. Performance Measurements
- Microsoft Windows: 4.3. Microsoft Windows
- throughput measurement: 4.2.3. Throughput Measurements
- traffic measurements: 4.2.4. Traffic Measurements with netstat
- unreachable networks: 3.3.2.2. Interpreting results
- pattern expression in log files: 11.2.2. Log File Management
- patterns
- for packet data: 3.3.2.3. Options
- of usage: 8.1. What, When, and Where
- pchar bandwidth tool: 4.2.2.2. pathchar
- A.4. Sources for Tools
- peering arrangements: 4.1. Path Discovery with traceroute
- 4.2.3.4. Other related tools
- perfmon monitoring tool: 8.6. Microsoft Windows
- performance analysis
- analytical modeling: 12.2.2. Performance Analysis and Monitoring
- measurement: 12.2.2. Performance Analysis and Monitoring
- simulations: 12.2.2. Performance Analysis and Monitoring
- steps in: 12.2.2. Performance Analysis and Monitoring
- Performance Endpoints software: 4.3. Microsoft Windows
- performance management in network management software: 6.1.1. Characteristics of Management Software
- performance measurement: 12.2.2. Performance Analysis and Monitoring
- (see also performance analysis)
- bandwidth: 4.2. Path Performance
- 4.2.2. Bandwidth Measurements
- books and resources: B.2.4. Performance
- bottleneck analysis: 12.2.2.2. Bottleneck analysis
- in capacity planning: 12.2.2.3. Capacity planning
- choosing tools: 12.2.2.1. General steps
- emulators and simulators: 9.2. Network Emulators and Simulators
- host-monitoring tools: 8.2. Host-Monitoring Tools
- ISPs: 4.2.3.4. Other related tools
- load generators: 9.1.2. Load Generators
- Microsoft Windows: 4.3. Microsoft Windows
- 8.6. Microsoft Windows
- mrtg and varieties: 8.4.1. mrtg
- network-monitoring tools: 8.4. Network-Monitoring Tools
- over time: 8.1. What, When, and Where
- packet injection: 9.1. Packet Injection Tools
- path performance: 4.2. Path Performance
- ping tools: 3.3.2.3. Options
- point-monitoring tools: 8.3. Point-Monitoring Tools
- reproducibility: 9.2. Network Emulators and Simulators
- RMON: 8.5. RMON
- steps in: 12.2.2.1. General steps
- terminology: 4.2.1. Performance Measurements
- throughput: 4.2. Path Performance
- 4.2.3. Throughput Measurements
- traffic measurement: 4.2. Path Performance
- 4.2.4. Traffic Measurements with netstat
- 8.1. What, When, and Where
- types of data collection: 8.1. What, When, and Where
- understanding current behavior: 1.2. Need for Troubleshooting Tools
- web servers: 10.1.2. HTTP
- Performance Monitor tool: 8.6. Microsoft Windows
- periodic replacement costs: 1.3.2.4. Economic considerations
- Perl
- Active Perl web site: 8.6.1. ntop, mrtg, and cricket on Windows
- books and resources: B.2.8. Scripting
- cricket and: 8.6.1. ntop, mrtg, and cricket on Windows
- mrtg and: 8.4.2. rrd and the Future of mrtg
- 8.6.1. ntop, mrtg, and cricket on Windows
- scripting with: 6.4. Scripts
- permissions, tcpwrappers tool and: 11.2.3.1. tcpwrappers
- personal firewalls: 6.6. Politics and Security
- personnel problems: 1.3.2.2. Ego management
- Peter Principle: 1.3.2.3. Legal and ethical considerations
- p0f fingerprinting tool: 6.3.1. Stack Fingerprinting
- A.4. Sources for Tools
- physical environment and cabling: 3.1.1. Installing New Cabling
- pin-outs: 3.1.3.2. Cable testers
- Ping of Death Attack: 3.3.3.3. Ping of Death
- ping scanners: 6.2.1. IP Address Management
- ping tools
- alternatives to: 3.3.4. Alternatives to ping
- bandwidth measurements: 4.2.2.1. ping revisited
- checking client name resolution: 10.1.4. Name Services
- cyberkit suite: 6.7.1. Cyberkit
- detecting packet sniffers with: 5.7.2. Protecting Yourself
- discovering MAC/IP address pairs: 6.2.1. IP Address Management
- DOS attacks and: 3.3.3.1. Security and ICMP
- examples: 3.3.2.1. Simple examples
- functions: 3.3.2. How ping Works
- generating loads with: 9.1.2. Load Generators
- graphing round-trip delays: 8.6.2. getif revisited
- hping tool: 9.1.1.1. hping
- interpreting results: 3.3.2.2. Interpreting results
- Microsoft Windows: 3.4. Microsoft Windows
- options: 3.3.2.3. Options
- Ping of Death Attack: 3.3.3.3. Ping of Death
- problems with: 3.3.3. Problems with ping
- running: 3.3.2.4. Using ping
- source web site: A.4. Sources for Tools
- source web sites: A.4. Sources for Tools
- testing connectivity with: 3.3. Software Testing with ping
- versions: 3.3.1. ping
- pkgadd command (Solaris): A.1.2. Solaris Packages
- pkgchk command (Solaris): A.1.2. Solaris Packages
- pkginfo package command (Solaris): A.1.2. Solaris Packages
- pkgrm command (Solaris): A.1.2. Solaris Packages
- planning
- capacity planning (see capacity planning)
- performance analysis (see performance analysis)
- playing back captured tcpdump data: 5.4.2.1. Controlling program behavior
- plenum cabling: 3.1.1. Installing New Cabling
- plotting traffic data (see graphing traffic data)
- plugins for ntop tool: 8.3.1.2. Web mode
- pmon.exe tool: 2.3. Microsoft Windows
- point-monitoring tools: 8.1. What, When, and Where
- 8.3. Point-Monitoring Tools
- ntop: 8.3.1. ntop
- Windows: 8.6. Microsoft Windows
- point-to-point bandwidth: 4.2.2.3. bing
- point tools: 6.1.2. Discovery and Mapping Tools
- Poisson distribution: 9.1.2.2. MGEN
- policies for networks: 1.3.1. Documentation
- polling with tkined: 7.2.3.1. ICMP monitoring
- 7.2.3.5. Other commands
- POP2 and POP3 protocols: 6.3. Device Identification
- 6.3. Device Identification
- 10.1.1. Email
- port 0: 9.1.1.1. hping
- port collections: A.1.4. FreeBSD Ports
- port scanners: 2.1.7. Scanning Tools
- identifying hardware with: 6.3. Device Identification
- nmap tool: 6.2.2. nmap
- Windows tools: 2.3. Microsoft Windows
- portable computers: 5.2. Access to Traffic
- portable hubs: 5.2. Access to Traffic
- portmap NFS daemon: 10.1.6. NFS
- portmapper NFS daemon: 10.1.6. NFS
- ports
- aliasing: 5.2. Access to Traffic
- displaying numbers for connections: 2.1.3. netstat
- duplicating traffic on: 5.2. Access to Traffic
- ephemeral: 5.4.2.4.4. Compound filters.
- 5.5.3. tcpflow
- filtering: 5.4.2.4.2. Protocol and port filtering.
- 5.4.2.4.4. Compound filters.
- getif results: 7.4.2. SNMP Tools
- graphing usage by: 8.3.1.2. Web mode
- MGEN packet settings: 9.1.2.2. MGEN
- mirroring: 5.2. Access to Traffic
- mrtg setting: 8.4.2. rrd and the Future of mrtg
- nemesis settings: 9.1.1.2. nemesis
- ntop selection: 8.3.1.2. Web mode
- preserving numbers in data: 5.5.2. tcpdpriv
- scanning (see port scanners)
- telnet information at login: 6.3. Device Identification
- traceroute starting ports: 4.1.1. Options
- portscan scanning tool: 2.1.7. Scanning Tools
- 11.4. Security Tools
- A.4. Sources for Tools
- power lines, cabling and: 3.1.1. Installing New Cabling
- PPP (Point-to-Point Protocol): 3.3.2.3. Options
- B.2.3. Specific Protocols
- precedence in operators: 5.4.2.4.4. Compound filters.
- precompiled binary files: A.1.1. Generic Installs
- printed documentation: B.1. Sources of Information
- printing
- screen shots of windows: 11.1.1. Automating Documentation
- troubleshooting details: 11.1.1. Automating Documentation
- priorities for traffic: 3.3.3.4. Other problems
- privacy issues
- egos and: 1.3.2.2. Ego management
- limiting bytes captured and: 5.4.2.1. Controlling program behavior
- packet capture and: 5. Packet Capture
- sanitize tool: 5.5.1. sanitize
- segmented networks and: 5.2. Access to Traffic
- TCP streams and: 5.6.1.1. Using ethereal
- tcpdpriv tool: 5.5.2. tcpdpriv
- use of network tools and: 1.3.2.3. Legal and ethical considerations
- private MIBs (enterprise): 7.1. Overview of SNMP
- 7.2.1.5. snmptranslate
- 7.2.3.3. Examining MIBs
- proactive nature of troubleshooting: 0. Preface
- probe computers: 5.2. Access to Traffic
- problem decomposition technique: 1.1. General Approaches to Troubleshooting
- process documentation: 1.3.1. Documentation
- process explode tool: 2.3. Microsoft Windows
- process monitor tool: 2.3. Microsoft Windows
- process viewer tool: 2.3. Microsoft Windows
- processes
- bottlenecks in: 12.2.2.2. Bottleneck analysis
- defunct processes: 2.1.1. ps
- initiated by vnc: 11.1.2. vnc
- listing: 2.1.1. ps
- 2.1.4. lsof
- 2.1.4. lsof
- 2.3. Microsoft Windows
- listing usersÕ processes: 2.1.1. ps
- lsof tool: 2.1.4. lsof
- 2.1.4. lsof
- Microsoft Windows: 2.3. Microsoft Windows
- multiple instances: 2.1.1. ps
- ranking in order of CPU usage: 2.1.2. top
- resource-hogging: 2.1.2. top
- rogue processes: 2.1.1. ps
- run levels and: 2.2.4. Startup Files and Scripts
- SNMP agent information: 7.2.1.8. Agents and traps
- processor loads in SNMP agent information: 7.2.1.8. Agents and traps
- professionalism in network management: 1.3.2.1. Professionalism
- promiscuous mode
- arpwatch tool: 6.2.3. arpwatch
- checking interfaces: 5.7.2. Protecting Yourself
- disabling in tcpdump: 5.4.2.1. Controlling program behavior
- ethereal settings: 5.6.1.1. Using ethereal
- ntop tool: 8.3.1. ntop
- packet capture and: 5.3. Capturing Data
- propagation delays or times: 4.2.1. Performance Measurements
- 4.2.2.1. ping revisited
- 4.2.2.1. ping revisited
- protecting networks (see security issues)
- protocol analyzers: 5.1. Traffic Capture Tools
- 5.1. Traffic Capture Tools
- protocol stack, application data in: 5.1. Traffic Capture Tools
- protocols
- application-level (see application-level protocols)
- capturing traffic with snmpnetstat: 7.2.1.6. snmpnetstat
- connectivity protocols (see connectivity protocols)
- displaying traffic by: 8.3.1.2. Web mode
- displaying with netstat: 2.1.3. netstat
- filtering: 5.4.2.4.2. Protocol and port filtering.
- network-level (see names of specific protocols)
- packet capture and: 5.1. Traffic Capture Tools
- transport-level (see names of specific protocols)
- tree display in ethereal: 5.6.1.1. Using ethereal
- proxy servers, stack fingerprinting and: 6.3.1. Stack Fingerprinting
- ps command: 2.1.1. ps
- 2.1.7. Scanning Tools
- 7.2.1.8. Agents and traps
- public time servers: 11.3. NTP
- published addresses in ARP tables: 2.1.6. arp
- purchase information: 1.3.1. Documentation
- purchasing software: 6.1.3. Selecting a Product
- putty ssh tool: 11.5. Microsoft Windows
- A.4. Sources for Tools
- pviewer.exe process tool: 2.3. Microsoft Windows
- pview.exe process tool: 2.3. Microsoft Windows
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.