Part V

Network Troubleshooting and Security

450604-pp0501.eps

In this part . . .

Part V is dedicated to TCP/IP protocols, services, and applications that help you maintain a secure, trouble-free network. Because reality can give you a sharp kick when it comes to network security, the chapters in Part V give you tips and techniques for finding and fixing network and security problems.

Chapter 20 goes beyond the minimum security introduction in Chapter 12 to describe some additional forms of malware. The chapter shows you how to use TCP/IP applications, such as syslog and netstat, to uncover and diagnose security incursions. Chapter 21 continues with more advanced security protocols and applications, such as the IPSec group of protocols and Kerberos, the strictest and most secure (and most complicated) security guardian in the TCP/IP stack.

Chapter 22 walks you step by step through solving an Internet connectivity problem, using basic TCP/IP tools and applications available on every operating system that runs a TCP/IP stack. Finally, Chapter 22 describes how complete Network Management Systems (NMS), based on the Simple Network Management Protocol (SNMP), help network administrators collect, collate, and report on network usage so that minor difficulties can be corrected before they become major problems.

Get TCP/IP For Dummies, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.