rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780764542602

Networking All-in-One Desk Reference For Dummies®

by Doug Lowe (Fresno, California, author )
  • ISBN13:

    9780764542602

  • ISBN10:

    0764542605

  • Format: Paperback
  • Publisher: For Dummies
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $34.99

Summary

An essential one-stop resource-nine convenient minibooks in a single 840page volume-for network administrators everywhere This value-priced package includes sections on networking basics, building a network, network administration, TCP/IP and the Internet, wireless and home networking, Windows 2000 and 2003 servers, NetWare 6, Linux networking, and Mac OS X networking Written by the author of the perennial bestseller Networking For Dummies (0-7645-1677-9), this massive reference covers all the topics that administrators routinely handle Provides key information, explanations, and procedures for configuration, Internet connectivity, security, and wireless options on today's most popular networking platforms

Author Biography

Doug Lowe has written more than 50 computer books

Table of Contents

Introduction 1(1)
About This Book
2(1)
How to Use This Book
3(1)
How This Book Is Organized
3(3)
Book I: Networking Basics
3(1)
Book II: Building a Network
4(1)
Book III: Network Administration and Security
4(1)
Book IV: Network Troubleshooting and Disaster Planning
4(1)
Book V: TCP/IP and the Internet
4(1)
Book VI: Wireless and Home Networking
5(1)
Book VII: Windows 2000 and 2003 Server Reference
5(1)
Book VIII: NetWare 6 Reference
5(1)
Book IX: Linux Reference
5(1)
Icons Used in This Book
6(1)
Where to Go from Here
6(1)
Book 1: Networking Basics
7(76)
Understanding Networks
9(14)
What Is a Network?
9(3)
Network building blocks
10(1)
Why bother?
11(1)
Of Clients and Servers
12(1)
Dedicated Servers and Peers
13(1)
Networks Big and Small
14(1)
Network Topology
15(4)
Bus topology
15(1)
Star topology
16(1)
Expanding stars
17(1)
Ring topology
17(1)
Mesh topology
18(1)
The Downside of Networking
19(4)
It's not a personal computer anymore!
19(2)
Network administration: Someone has to do it
21(2)
Understanding Network Protocols and Standards
23(24)
Understanding Protocols
23(2)
Understanding Standards
25(1)
The Seven Layers of the OSI Reference Model
26(1)
The Physical Layer
27(1)
The Data Link Layer
28(3)
How CSMA/CD works
30(1)
How token passing works
31(1)
The Network Layer
31(2)
Logical addressing
31(2)
Routing
33(1)
The Transport Layer
33(2)
The Session Layer
35(1)
The Presentation Layer
35(1)
The Application Layer
36(1)
Following a Packet through the Layers
36(2)
The Ethernet Protocol
38(3)
Standard Ethernet
39(1)
Fast Ethernet
40(1)
Gigabit Ethernet
40(1)
The TCP/IP Protocol Suite
41(3)
IP
42(1)
TCP
42(1)
UDP
43(1)
The IPX/SPX Protocol Suite
44(1)
Other Protocols Worth Knowing About
45(2)
Understanding Network Hardware
47(20)
Servers
47(6)
What's important in a server
47(1)
Components of a server computer
48(3)
Server form factors
51(2)
Network Interface Cards
53(1)
Network Cable
54(3)
Coaxial cable
54(1)
Twisted-pair cable
55(2)
Hubs and Switches
57(3)
Repeaters
60(2)
Bridges
62(1)
Routers
63(1)
Network Attached Storage
64(3)
Understanding Network Operating Systems
67(16)
Network Operating System Features
67(4)
Network support
67(1)
File sharing services
68(1)
Multitasking
68(2)
Directory services
70(1)
Security services
70(1)
Microsoft's Server Operating Systems
71(5)
Windows NT 4 Server
71(2)
Windows 2000 Server
73(1)
Windows Server 2003
74(2)
Novell NetWare
76(2)
NetWare versions
76(1)
NetWare 6 features
77(1)
NetWare 6.5
78(1)
Other Server Operating Systems
78(1)
Linux
78(1)
Apple Mac OS/X Server
78(1)
Peer-to-Peer Networking with Windows
79(4)
Advantages of peer-to-peer networks
79(1)
Drawbacks of peer-to-peer networks
80(1)
Windows XP
81(1)
Older Windows versions
82(1)
Book II: Building a Network
83(84)
Planning a Network
85(18)
Making a Network Plan
85(1)
Being Purposeful
86(1)
Taking Stock
87(4)
What you need to know
87(3)
Programs that gather information for you
90(1)
To Dedicate or Not to Dedicate: That Is the Question
91(1)
Types of Servers
92(1)
File servers
92(1)
Print servers
92(1)
Web servers
92(1)
Mail servers
93(1)
Database servers
93(1)
Choosing a Server Operating System
93(1)
Planning the Infrastructure
94(1)
Drawing Diagrams
95(1)
Sample Network Plans
96(7)
Building a small network: California Sport Surface, Inc
96(2)
Connecting two networks: Creative Course Development, Inc
98(2)
Improving network performance: DCH Accounting
100(3)
Installing Network Hardware
103(16)
Installing a Network Interface Card
103(2)
Installing Twisted-Pair Cable
105(9)
Cable categories
105(1)
What's with the pairs?
106(1)
To shield or not to shield
106(1)
When to use plenum cable
107(1)
Sometimes solid, sometimes stranded
107(1)
Installation guidelines
108(1)
Getting the tools that you need
109(1)
Pinouts for twisted-pair cables
110(1)
Attaching RJ-45 connectors
111(1)
Crossover cables
112(1)
Wall jacks and patch panels
113(1)
Installing Coaxial Cable
114(2)
Attaching a BNC connector to coaxial cable
115(1)
Installing Hubs and Switches
116(3)
Daisy-chaining hubs or switches
117(2)
Setting up a Network Server
119(16)
The Many Ways to Install a Network Operating System
119(3)
Full install versus upgrade
119(1)
Installing over the network
120(1)
Automated and remote installations
121(1)
Gathering Your Stuff
122(2)
A capable server computer
122(1)
The server operating system
122(1)
Other software
123(1)
A working Internet connection
123(1)
A good book
123(1)
Making Informed Decisions
124(1)
Final Preparations
125(1)
Installing a Network Operating System
125(3)
Phase 1: Collecting Information
126(1)
Phase 2: Dynamic Update
126(1)
Phase 3: Preparing Installation
127(1)
Phase 4: Installing Windows
127(1)
Phase 5: Finalizing Installation
128(1)
Life After Setup
128(3)
Logging on
128(1)
Activating Windows
129(2)
Service packs
131(1)
Testing the installation
131(1)
Configuring Server Roles
131(4)
Configuring Client Computers
135(14)
Configuring Network Connections
135(6)
Windows XP and Windows 2000
136(5)
Windows 9x
141(1)
Configuring Client Computer Identification
141(3)
Windows XP and Windows 2000
142(1)
Windows 9x
143(1)
Configuring Network Domain Logon
144(5)
Windows XP and Windows 2000
144(1)
Windows 9x
145(4)
Configuring Other Network Features
149(12)
Configuring Network Printers
149(4)
Adding a network printer
149(2)
Accessing a network printer using a Web interface
151(2)
Configuring Internet Access
153(5)
Configuring clients for DHCP
153(2)
Disabling dialup connections
155(2)
Using Internet Connection Sharing
157(1)
Mapping Network Drives
158(3)
Verifying Your Network Installation
161(6)
Is the Computer Connected to the Network?
161(1)
Is the Network Configuration Working?
162(2)
Can the Computers Ping Each Other?
164(1)
Can You Log On?
164(1)
Are Network Drives Mapped Correctly?
165(1)
Do Network Printers Work?
165(2)
Book III: Network Administration and Security
167(44)
Help Wanted: Job Description for a Network Administrator
169(14)
Figuring Out What Network Administrators Do
169(2)
Choosing the Part-Time Administrator
171(1)
Documenting the Network
172(2)
Completing Routine Chores
174(1)
Managing Network Users
174(1)
Patching Things Up
175(1)
Discovering Software Tools for Network Administrators
176(1)
Building a Library
177(1)
Certification
178(3)
Knowing When the Guru Needs a Guru, Too
181(1)
Mastering Helpful Bluffs and Excuses
182(1)
Security 101
183(10)
Do You Need Security?
184(1)
Two Approaches to Security
185(1)
Physical Security: Locking Your Doors
185(2)
Securing User Accounts
187(3)
Obfuscating your usernames
187(1)
Using passwords wisely
188(1)
Generating Passwords For Dummies
189(1)
Securing the Administrator account
190(1)
Hardening Your Network
190(1)
Using a firewall
191(1)
Disabling unnecessary services
191(1)
Patching your servers
191(1)
Securing Your Users
191(2)
Managing User Accounts
193(8)
User Accounts
193(1)
Built-In Accounts
194(2)
The Administrator account
194(1)
The Guest account
195(1)
Service accounts
195(1)
User Rights
196(1)
Permissions (Who Gets What)
197(2)
Group Therapy
199(1)
User Profiles
199(1)
Logon Scripts
200(1)
Firewalls and Virus Protection
201(10)
Firewalls
201(2)
The Many Types of Firewalls
203(3)
Packet filtering
203(2)
Stateful packet inspection (SPI)
205(1)
Circuit-level gateway
205(1)
Application gateway
206(1)
The Built-In Firewall in Windows XP
206(1)
Virus Protection
207(4)
What is a virus?
207(2)
Antivirus programs
209(1)
Safe computing
210(1)
Book IV: Network Troubleshooting and Disaster Planning
211(56)
Solving Network Problems
213(16)
When Bad Things Happen to Good Computers
214(1)
How to Fix Dead Computers
215(1)
Ways to Check a Network Connection
216(1)
A Bunch of Error Messages Just Flew By!
217(1)
Double-Checking Your Network Settings
218(1)
Using the Windows Networking Troubleshooter
218(1)
Time to Experiment
219(1)
Who's on First
220(1)
How to Restart a Client Computer
221(2)
Restarting Network Services
223(1)
How to Restart a Network Server
224(2)
Looking at Event Logs
226(1)
Documenting Your Trials and Tribulations
227(2)
Network Performance Anxiety
229(10)
Why Administrators Hate Performance Problems
229(1)
What Exactly Is a Bottleneck?
230(2)
The Five Most Common Network Bottlenecks
232(2)
The hardware inside your servers
232(1)
The server's configuration options
232(1)
Servers that do too much
233(1)
The network infrastructure
234(1)
Malfunctioning components
234(1)
Tuning Your Network the Compulsive Way
234(1)
Monitoring Network Performance
235(2)
More Performance Tips
237(2)
Protecting Your Network
239(12)
Backing Up Your Data
239(1)
All About Tapes and Tape Drives
240(1)
Backup Software
241(1)
Types of Backups
242(4)
Normal backups
243(1)
Copy backups
244(1)
Daily backups
244(1)
Incremental backups
244(1)
Differential backups
245(1)
Local versus Network Backups
246(1)
How Many Sets of Backups Should You Keep?
247(1)
A Word About Tape Reliability
248(1)
About Cleaning the Heads
249(1)
Backup Security
250(1)
Disaster Recovery and Business Continuity Planning
251(8)
Assessing Different Types of Disasters
252(2)
Environmental disasters
252(1)
Deliberate disasters
253(1)
Disruption of services
253(1)
Equipment failure
254(1)
Other disasters
254(1)
Analyzing the Impact of a Disaster
254(1)
Developing a Business Continuity Plan
255(1)
Holding a Fire Drill
256(3)
Dealing with Dysfunctional E-Mail
259(8)
Coping with the Dreaded Nondelivery Report
259(2)
Viewing the Mail Server's Error Logs
261(1)
Checking Out a Remote Mail System
261(4)
Discovering the mail server for a domain
261(2)
Verifying a mail server
263(2)
Viewing Message Headers
265(1)
Help! I've Been Blacklisted!
265(2)
Book V: TCP/IP and the Internet
267(132)
Introduction to TCP/IP and the Internet
269(8)
What Is the Internet?
269(2)
A Little Internet History
271(1)
TCP/IP Standards and RFCs
272(2)
The TCP/IP Protocol Framework
274(3)
Network Interface layer
274(1)
Network layer
275(1)
Transport layer
275(1)
Application layer
275(2)
Understanding IP Addresses
277(24)
Understanding Binary
277(5)
Counting by ones
277(2)
Doing the logic thing
279(1)
Working with the binary Windows Calculator
280(2)
Introducing IP Addresses
282(1)
Networks and hosts
282(1)
The dotted-decimal dance
283(1)
Classifying IP Addresses
283(5)
Class A addresses
285(1)
Class B addresses
286(1)
Class C addresses
287(1)
Subnetting
288(10)
Subnets
288(1)
Subnet masks
289(1)
Network prefix notation
290(1)
Default subnets
291(1)
The great subnet roundup
291(3)
IP block parties
294(1)
Variable-length subnet masking
295(2)
Supernetting
297(1)
Private and public addresses
297(1)
Network Address Translation
298(3)
Using DHCP
301(16)
Understanding DHCP
301(3)
Configuration information provided by DHCP
302(1)
DHCP servers
302(1)
How DHCP actually works
303(1)
Understanding Scopes
304(3)
Feeling excluded?
305(1)
Reservations suggested
305(2)
How long to lease?
307(1)
Working with a DHCP Server
307(6)
Installing and configuring a DHCP server
307(5)
Managing a DHCP server
312(1)
How to Configure a Windows DHCP Client
313(4)
Automatic Private IP Addressing
314(1)
Renewing and releasing leases
314(3)
Using DNS
317(28)
Understanding DNS Names
317(3)
Domains and domain names
318(2)
Fully qualified domain names
320(1)
Top-Level Domains
320(3)
Generic domains
320(2)
Geographic domains
322(1)
The Hosts File
323(3)
Understanding DNS Servers and Zones
326(6)
Zones
326(2)
Primary and secondary servers
328(1)
Root servers
328(3)
Caching
331(1)
Understanding DNS Queries
332(2)
A real-life example
333(1)
Zone Files and Resource Records
334(5)
SOA records
335(2)
NS records
337(1)
A records
337(1)
CNAME records
338(1)
PTR records
338(1)
MX records
338(1)
Reverse Lookup Zones
339(1)
Working with the Windows DNS Server
340(2)
How to Configure a Windows DNS Client
342(3)
Using FTP
345(24)
Introducing FTP
345(1)
Configuring an FTP Server
346(4)
Installing FTP
346(1)
Changing the FTP site properties
347(2)
Adding content to your FTP site
349(1)
Adding an additional FTP site
349(1)
Accessing an FTP Site with a Browser
350(1)
Using an FTP Command-Line Client
351(3)
FTP Command and Subcommand Reference
354(15)
The FTP command
354(1)
Summary of FTP subcommands
355(2)
! (Escape)
357(1)
? (Help)
357(1)
Append
357(1)
ASCII
358(1)
Bell
358(1)
Binary
358(1)
Bye
358(1)
Cd
358(1)
Close
359(1)
Debug
359(1)
Delete
359(1)
Dir
360(1)
Disconnect
360(1)
Get
360(1)
Glob
361(1)
Hash
361(1)
Help
361(1)
Lcd
361(1)
Literal
362(1)
Ls
362(1)
Mdelete
362(1)
Mdir
362(1)
Mget
363(1)
Mkdir
363(1)
Mis
363(1)
Mput
363(1)
Open
364(1)
Prompt
364(1)
Put
364(1)
Pwd
365(1)
Quit
365(1)
Quote
365(1)
Recv
365(1)
Remotehelp
366(1)
Rename
366(1)
Rmdir
366(1)
Send
366(1)
Status
367(1)
Trace
367(1)
Type
367(1)
User
368(1)
Verbose
368(1)
TCP/IP Tools and Commands
369(30)
Arp
369(1)
Hostname
370(1)
IPConfig
370(4)
Displaying basic IP configuration
371(1)
Displaying detailed configuration information
371(1)
Renewing an IP lease
372(1)
Releasing an IP lease
373(1)
Flushing the local DNS cache
373(1)
Nbtstat
374(1)
Netdiag
375(3)
Netstat
378(3)
Displaying connections
378(1)
Displaying interface statistics
379(2)
Nslookup
381(7)
Looking up an IP address
381(1)
Using Nslookup subcommands
381(1)
Displaying DNS records
382(2)
Locating the mail server for an e-mail address
384(1)
Taking a ride through DNS-Land
385(3)
PathPing
388(1)
Ping
389(2)
Route
391(3)
Displaying the routing table
391(2)
Modifying the routing table
393(1)
Tracert
394(3)
Winipcfg
397(2)
Book VI: Wireless and Home Networking
399(88)
Networking Your Home
401(12)
Deciding Why You Need a Network
401(2)
Choosing How to Network Your Home
403(6)
Phone line networks
404(1)
Power line networks
405(1)
USB networks
406(1)
Wireless networks
406(2)
Cabled Ethernet
408(1)
Strange Things to Add To Your Network
409(1)
A Home Network Example
410(3)
Connecting to the Internet with Internet Explorer
413(18)
Some General Tips
413(1)
Deciding How to Connect
414(6)
Choosing dialup
414(2)
Choosing cable
416(2)
Choosing DSL
418(2)
Choosing a Provider
420(5)
Online services
421(2)
Basic Internet service providers
423(2)
Getting Internet Explorer
425(1)
Setting Up Your Internet Connection
426(5)
Home Networking with Windows XP
431(24)
Using the Windows XP Network Setup Wizard
431(4)
Deciding on computer names
432(1)
Running the wizard
432(3)
Setting Up a Network without the Wizard
435(4)
Configuring the network connection
435(3)
Identifying your computer
438(1)
Sharing Hard Drive Files
439(4)
Understanding hard drive sharing
440(1)
Four good uses for a shared folder
440(1)
Designating a shared drive or folder
441(2)
Oh, the Network Places You'll Go
443(4)
Mapping network drives
445(2)
Sharing a Printer
447(3)
Designating a shared printer
447(1)
Adding a network printer
448(2)
Using a network printer
450(1)
Sharing an Internet Connection
450(3)
Setting up a firewall
452(1)
Using a broadband router
453(1)
Managing Your Home Network
453(2)
Setting Up a Wireless Network
455(20)
Diving into Wireless Networking
456(1)
A Little High School Electronics
456(4)
Waves and frequencies
457(1)
Wavelength and antennas
457(2)
Spectrums and the FCC
459(1)
Eight-Oh-Two-Dot-Eleventy Something? (Or, Understanding Wireless Standards)
460(1)
Home on the Range
461(1)
Wireless Network Adapters
462(1)
Wireless Access Points
463(4)
Infrastructure mode
465(1)
Multifunction WAPs
466(1)
Roaming
467(1)
Wireless bridging
467(1)
Ad-hoc networks
467(1)
Configuring a Wireless Access Point
468(3)
Basic configuration options
468(2)
DHCP configuration
470(1)
Configuring Windows XP for Wireless Networking
471(1)
Using a Wireless Network with Windows XP
472(3)
Securing a Wireless Network
475(12)
Understanding Wireless Security Threats
475(4)
Intruders
476(1)
Freeloaders
477(1)
Eavesdroppers
477(1)
Jamming
478(1)
Rogue access points
478(1)
What About Wardrivers and Warchalkers?
479(2)
Wardriving
479(1)
Warchalking
480(1)
Securing Your Wireless Network
481(6)
Changing the password
481(1)
Securing the SSID
482(1)
Enabling WEP
483(1)
Using MAC address filtering
484(2)
Placing your access points outside the firewall
486(1)
Book VII: Windows 2000 and 2003 Server Reference
487(102)
Installing and Configuring Windows 2000 and 2003 Server
489(12)
Planning a Windows Server Installation
489(6)
Checking system requirements
489(1)
Reading the release notes
490(1)
Deciding whether to upgrade or install
490(1)
Considering your licensing options
491(1)
Thinking about multiboot
491(1)
Choosing a file system
492(1)
Planning your partitions
493(1)
Deciding your TCP/IP configuration
494(1)
Choosing workgroups or domains
494(1)
Before You Install
495(1)
Backing up
495(1)
Checking the event logs
495(1)
Uncompressing data
495(1)
Disconnect UPS devices
496(1)
Running Setup
496(3)
Now What?
499(2)
Managing User Accounts
501(20)
Understanding Windows User Accounts
501(2)
Local accounts versus domain accounts
501(1)
User account properties
502(1)
The Administrator account
502(1)
Creating a New User
503(3)
Setting User Properties
506(4)
Changing the user's contact information
506(1)
Setting account options
507(1)
Specifying logon hours
508(1)
Restricting access to certain computers
509(1)
Setting the user's profile information
509(1)
Resetting User Passwords
510(1)
Disabling and Enabling User Accounts
511(1)
Deleting a User
512(1)
Working with Groups
512(6)
Group types
513(1)
Group scope
513(1)
Default groups
514(1)
Creating a group
515(1)
Adding a member to a group
516(2)
User Profiles
518(3)
Types of user profiles
518(1)
Creating a roaming profile
519(2)
Managing a File Server
521(18)
Understanding Permissions
521(2)
Understanding Shares
523(1)
Configuring the File Server Role
524(3)
Managing Your File Server
527(8)
Sharing a folder from the File Server Manager
528(3)
Sharing a folder without the wizard
531(1)
Granting permissions
532(3)
Advanced Features for Managing File Servers
535(4)
Configuring offline settings
535(1)
Setting up shadow copies
536(1)
Dealing with users
537(2)
Managing Security
539(12)
Configuring Account Policies
539(4)
Password policies
539(1)
Account lockout policy
540(1)
Kerberos policy
541(1)
Setting account policies
542(1)
Encrypting Files and Folders
543(4)
Understanding public key encryption
544(1)
Understanding EFS
545(1)
Encrypting a folder
545(1)
Sharing an encrypted folder with other users
546(1)
Auditing Security Events
547(4)
Troubleshooting
551(12)
Working with the Event Viewer
551(3)
Using the Event Viewer
551(2)
Setting event log policies
553(1)
Monitoring Performance
554(5)
Using the Performance Console
555(2)
Creating performance logs
557(2)
Using the Computer Management Console
559(2)
Working with Services
561(2)
Windows Commands
563(26)
Using a Command Window
563(2)
Opening and closing a command window
564(1)
Editing commands
564(1)
Using the Control menu
565(1)
Special Command Tricks
565(5)
Wildcards
566(1)
Chaining commands
566(1)
Redirection and Piping
567(1)
Environment variables
568(1)
Batch files
569(1)
Using Windows Net Commands
570(19)
The Net Accounts command
571(1)
The Net Computer command
572(1)
The Net Config command
572(1)
The Net Continue command
573(1)
The Net File command
573(1)
The Net Group command
574(1)
The Net Help command
575(1)
The Net Helpmsg command
576(1)
The Net Localgroup command
576(2)
The Net Name command
578(1)
The Net Pause command
578(1)
The Net Print command
579(1)
The Net Send command
580(1)
The Net Session command
581(1)
The Net Share command
581(2)
The Net Start command
583(1)
The Net Statistics command
583(1)
The Net Stop command
584(1)
The Net Time command
584(1)
The Net Use command
585(1)
The Net User command
586(2)
The Net View command
588(1)
Book VIII: NetWare 6 Reference
589(78)
Installing and Managing NetWare 6
591(20)
Planning a NetWare Installation
591(4)
Checking system requirements
591(1)
Figuring out how you'll boot during installation
592(1)
Reading the Readme file
593(1)
Deciding whether to upgrade or install
593(1)
Planning your partitions
594(1)
Deciding your TCP/IP configuration
594(1)
Planning your tree
594(1)
Running nwdeploy.exe
595(1)
Installing NetWare
595(6)
Installing Client Software
601(1)
Looking at Novell's Administration Tools
601(10)
ConsoleOne
602(1)
The Welcome Brigade
603(1)
Web Manager
603(2)
eDirectory Administration
605(1)
Remote Manager
605(2)
iManage
607(1)
RConsoleJ
608(3)
Managing User Objects
611(12)
Understanding NetWare User Accounts
611(1)
The Admin Object
612(1)
Creating a New User
612(3)
Setting User Properties
615(5)
The General tab
616(1)
The Restrictions tab
616(1)
The Memberships tab
617(1)
The Security Equal To Me tab
618(1)
The Logon Script tab
618(1)
The NDS Rights tab
618(1)
The Other tab
618(1)
The Rights To Files And Folders tab
618(2)
Some Common User Maintenance Chores
620(1)
Resetting user passwords
620(1)
Disabling and enabling user accounts
620(1)
Deleting a user
620(1)
Working with Groups
620(3)
TCP/IP and NetWare 6
623(20)
Configuring TCP/IP with INETCFG
623(4)
Preparing for DNS and DHCP
627(1)
Configuring the DNS and DHCP Scope
628(1)
Setting up a DNS Server
629(6)
Step 1: Creating a DNS server
629(2)
Step 2: Creating a zone
631(1)
Step 3: Creating the reverse-lookup zone
632(1)
Step 4: Creating resource records
633(2)
Step 5: Starting the DNS service
635(1)
Setting Up a DHCP Server
635(8)
Step 1: Creating a DHCP server
636(2)
Step 2: Creating a subnet pool
638(1)
Step 3: Creating a subnet
639(1)
Step 4: Creating subnet address ranges
640(1)
Step 5: Creating IP address records
641(1)
Step 6: Starting the DHCP service
642(1)
NetWare Login Scripts
643(12)
Understanding Login Scripts
643(1)
Creating Login Scripts
644(5)
Creating a container or user script
644(2)
Creating a profile script
646(3)
Login Script Basics
649(6)
The Attach command
649(1)
The Display command
649(1)
The Exit command
650(1)
The Fire Phasers command
650(1)
Identifier variables
650(1)
The If Command
651(1)
The Include command
652(1)
The Map command
652(1)
The No_Default command
653(1)
The Pause command
653(1)
The Set command
654(1)
The Write command
654(1)
NetWare Console Commands
655(12)
Broadcast
655(1)
Cls
656(1)
Config
657(1)
Disable Login
657(1)
Dismount
658(1)
Display Environment
658(1)
Display Modified Environment
659(1)
Down
659(1)
Edit
660(1)
Enable Login
660(1)
Help
661(1)
Load
661(1)
Modules
662(1)
Mount
662(1)
Scrsaver
663(1)
Secure Console
663(1)
Set
663(1)
Send
664(1)
Unload
664(1)
Version
665(2)
Book IX: Linux Reference
667(112)
Installing a Linux Server
669(24)
Planning a Linux Server Installation
669(5)
Checking system requirements
669(1)
Choosing a distribution
670(1)
Figuring out how you'll boot during installation
671(1)
Thinking about multiboot
672(1)
Planning your partitions
673(1)
Deciding your TCP/IP configuration
673(1)
Installing Red Hat Linux 9
674(13)
Using the Setup Agent
687(1)
Installing Additional Packages
688(5)
Getting Used to Linux
693(10)
Linux: It Isn't Windows
693(2)
X Window
693(1)
Virtual consoles
694(1)
Understanding the file system
694(1)
On Again, Off Again
695(3)
Logging on
696(1)
Logging off
697(1)
Shutting down
697(1)
Using GNOME
698(1)
Getting to a Command Shell
699(1)
Managing User Accounts
700(3)
Basic Linux Network Configuration
703(12)
Using the Red Hat Network Configuration Program
703(3)
Restarting Your Network
706(1)
Working with Network Configuration Files
707(7)
The Network file
708(1)
The Hostname file
709(1)
The Ifcfg files
709(1)
The Hosts file
710(1)
The resolv.conf file
711(1)
The nsswitch.conf file
711(2)
The xinetd.conf file
713(1)
Displaying Your Network Configuration with the ifconfig Command
714(1)
Doing the Samba Dance
715(14)
Understanding Samba
715(1)
Installing Samba
716(1)
Starting and Stopping Samba
717(2)
Using the Red Hat Samba Server Configuration Tool
719(5)
Configuring server settings
719(2)
Configuring server users
721(1)
Creating a share
722(2)
Editing the smb.conf File
724(2)
Using the Samba Client
726(3)
Running Internet Servers
729(22)
Running a DHCP Server
729(4)
Installing DHCP
730(1)
Configuring DHCP
731(1)
Starting DHCP
732(1)
Running a DNS Server
733(11)
Installing BIND
733(1)
Looking at BIND configuration files
734(1)
named.conf
734(1)
named.custom
735(1)
named.ca
735(2)
named.local
737(1)
Zone files
738(1)
Creating a zone with the Red Hat BIND configuration tool
739(4)
Restarting BIND
743(1)
Running Sendmail
744(3)
Installing Sendmail
744(1)
Modifying sendmail.mc
745(2)
Setting up aliases
747(1)
Running a Web Server
747(4)
Installing Apache
747(2)
Configuring Apache
749(1)
Creating Web pages
750(1)
Linux Commands
751(28)
Command Shell Basics
751(5)
Getting to a shell
751(2)
Editing commands
753(1)
Wildcards
753(1)
Redirection and piping
753(1)
Environment variables
754(1)
Shell scripts
755(1)
Directory and File Handling Commands
756(6)
The pwd command
756(1)
The cd command
756(1)
The mkdir command
757(1)
The rmdir command
757(1)
The Is command
757(2)
The cp command
759(1)
The rm command
760(1)
The mv command
760(1)
The touch command
761(1)
The cat command
761(1)
Commands for Working with Packages and Services
762(3)
The service command
763(1)
The rpm command
764(1)
Commands for Administering Users
765(6)
The useradd command
765(2)
The usermod command
767(1)
The userdel command
767(1)
The chage command
767(1)
The passwd command
768(1)
The newusers command
768(1)
The groupadd command
769(1)
The groupdel command
769(1)
The gpasswd command
770(1)
Commands for Managing Ownership and Permissions
771(2)
The chown command
771(1)
The chgrp command
771(1)
The chmod command
772(1)
Networking Commands
773(6)
The hostname command
773(1)
The ifconfig command
773(1)
The netstat command
774(2)
The ping command
776(1)
The route command
777(1)
The traceroute command
777(2)
Book X: Appendixes
779(2)
Appendix A: Directory of Useful Web Sites
781(8)
Certification
781(1)
Hardware
781(1)
Home Networking
782(1)
Linux Sites
783(1)
Magazines
784(1)
Microsoft
784(1)
Network Standards Organizations
784(1)
Reference Sites
785(1)
Search Sites
785(1)
TCP/IP and the Internet
786(1)
Wireless Networking
787(2)
Appendix B: Glossary
789(22)
Index 811

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program