Book: CompTIA Network+ Lab Manual

Previous: Phase 4: Troubleshooting the Network
Book main: Foreword

Index

A

A-Mac Address application

ABRs (area border routers)

access control lists (ACLs)

groups

ping of death mitigation

resource access

access-list deny command

access-list permit command

Access Point (Infrastructure) Networks Only option

access to resources

Windows Vista and Windows

Windows XP

Account Is Disabled option

accounts

dial-up

local user

creating

disabling

ACK bit

ACLs (access control lists)

groups

ping of death mitigation

resource access

Activate Scope dialog

active FTP

ad hoc wireless networking

overview

testing

Windows Vista and Windows

Windows XP

Add A New Hardware Device option

Add A Virtual Hard Disk page

Add Data Recovery Agent option

Add Exclusions screen

Add Hardware Wizard

Add Or Remove Snap-Ins dialog

Add/Remove Snap-In

Add Standalone Snap-In dialog

Address Expression dialog

Address Leases option

Address Pool option

Address Resolution Protocol (ARP)

on computers

inverse ARP

MAC addresses

overview

on routers

addresses

IP. See IP addresses

MAC. See MAC addresses

Administrative Tools applet

DHCP

displaying

Local Security Policy

Network Monitor

passwords

ADSL terminal units (ATU-Rs)

Advanced dialog for ad hoc wireless networking

Advanced Attributes dialog

Advanced page

ad hoc wireless networking

Customized Start

Advanced Restore Options screen

Advanced Schedule Options dialog

Advanced Security Settings dialog

Advanced Sharing dialog

All Information On This Computer option

Allow Other Network Users To Connect Through This Computer’s Internet Connection option

Allow Other People To Use This Connection option

Alternate Configuration tab

analog modems

dial-up accounts

dial-up connections

overview

Windows Vista and Windows

AND function for filters

anonymous FTP

Anonymous/Public Logon option

antennas for wireless NICs

antispyware scans

antistatic wrist straps

antivirus scans

APIPA addresses

Windows Vista and Windows

Windows XP Professional

archive bits

area border routers (ABRs)

area identifiers

ARP (Address Resolution Protocol)

on computers

inverse ARP

MAC addresses

overview

on routers

arpwatch utility

assigning IP addresses

Cisco routers

DHCP server configuration

Cisco 2611XM router

Linksys wireless router

relay agents on Cisco routers

Windows Server 2003 and later

Windows Vista and Windows

Windows XP Professional

Association tab

ATM cells

attributes

backups

encryption

ATU-Rs (ADSL terminal units)

Audit Policy option

auditing

failure

success

Auditing Entry dialog

Auditing page

AUI ports

authentication

MD

PPP

authentication pre-share command

Automatic Private IP Address option

automatic summarization

Automatic Updates applet

AVG antivirus scanner

B

Back Up Files And Settings option

backplanes

Backup And Restore applet

backup.bkf file

Backup Options screen

Backup Or Restore Wizard

backups

restores

Backup Or Restore Wizard Welcome screen

Backup Progress pop-up

Backup Type, Destination, And Name screen

backups

encrypted files

Registry

restoring

Windows

Windows XP

baseline traceroutes

bases in numbering systems

Basic Setup page

batteries

Bluetooth

peripherals

BGP (Border Gateway Protocol)

billing information for modem service

bits

Bluetooth Special Interest Group

Bluetooth technology

Bootstrap Protocol (BootP) clients

Border Gateway Protocol (BGP)

border routers

Bridge Protocol Data Units (BPDUs)

broadcast domains, identifying

broadcast traffic on VLANs

BulletProof FTP client

bye command in FTP

C

cables

internetwork drawings

Linksys wireless router

caches

ARP

local DNS resolution

Capture Filter dialog

Capture Filter SAPs And ETYPEs dialog

Capture Interfaces dialog

Capture menu for protocol analyzers

case removal

Catalyst 3550 switch

cd command in FTP

certifications in data encryption

Challenge Handshake Authentication Protocol (CHAP)

Change Adapter Settings option

Change Password dialog

Change Permissions option

Change Schedule link

Change Settings link

backup sets

computer names

CHAP (Challenge Handshake Authentication Protocol)

Check For Problems option

Check For Updates option

Check Names feature

Choose A Connection Option dialog

CIDR (classless inter-domain routing) notation

Cisco Catalyst 2950 switch

Cisco routers

Cisco 2611XM

DHCP server configuration

VLANs on

DHCP relay agents

IP address assignment on

names and default domains

routing policies

Class 1 Bluetooth

classless inter-domain routing (CIDR) notation

classless routing protocols

Clear All Events option

clear crypto sa command

Clear Logs option

Client Lease Time option

clock rate interface command

close command in FTP

Close Session option

collision domains

colon-separated bytes in MAC addresses

color of encrypted files

COM ports

Combs, Gerald

command help

command line in FTP

Completing The Add Hardware Wizard screen

Completing The Backup Or Restore Wizard screen

Completing The New Connection Wizard screen

Completing The New Scope Wizard screen

compression and encrypted files

computer event logs, Event Viewer for

auditing failure

auditing success

displaying

running

Computer Management

local user accounts

creating

disabling

local user groups

Computer Name Changes dialog

Computer Name/Domain Changes dialog

Computer Name tab

Computer-To-Computer (Ad Hoc) Networks Only option

computers

internetwork drawings

names

router communications from

Configure DHCP Options screen

Configure Options option

Connect As dialog

Connect By Server Type option

Connect dialog

Connect Securely option

Connect To A Network link

Connect To dialog

HyperTerminal

Linksys wireless routers

Connect To Site Now option

Connect To The Internet option

Connect To The Network At My Workplace option

Connect Using A Dial-Up Modem option

Connection Availability screen

Connection Description dialog

Connection Name screen

connections and connectivity

ad hoc wireless networks

analog modems

FTP. See File Transfer Protocol (FTP) utility

HyperTerminal

Linksys wireless routers

shares

testing. See ping utilities

connectors

Console Root floating window

converting long filenames

Copy backups

copying encrypted files

cordless phones

CPE (customer premise equipment)

Create A New Connection option

Create A Virtual Machine Wizard

Create An Ad Hoc Network option

Create Registry Backup option

crossover cables

crypto ipsec command

crypto ipsec transform-set command

crypto isakmp key command

crypto isakmp policy command

crypto map command

CSU/DSUs, simulating

customer premise equipment (CPE)

Customized Start Menu dialog

D

daily backups

data backups

encrypted files

restoring

Windows

Windows XP

data encryption

defining traffic

interface

IP configuration

mapping traffic

pre-shared keys

transform sets

Data Encryption Standard (DES) algorithm

Data Entry settings in DHCP

data-link connection identifiers (DLCIs)

data recovery agent (DRA)

DCE devices

connectors

internetwork drawings

debug crypto ipsec command

decimal numbering system

decoding OUIs

default domains

default gateways

default router passwords

default routing

deleting encrypted files

denial of service (DoS) attacks

ping of death

SYN flood

DES (Data Encryption Standard) algorithm

descriptions

connections

local user groups

design phase

differentiating Ethernet devices

drawing internetworks

identifying collision and broadcast domains

identifying network components

IP addresses. See IP addresses

MAC addresses. See MAC addresses

OSI model

static and dynamic routing

VLAN schemes

Destination Directory dialog

Device Manager for Bluetooth

DF (do-not-fragment) bit

DHCP server configuration

Cisco 2611XM router

DSL modems

Linksys wireless router

relay agents on Cisco routers

Windows Server 2003 and later

DHCPDISCOVER broadcast messages

diagrams for internetworks

dial-up for analog modems

accounts

connections

Different User Name link

Differential backups

differentiating Ethernet devices

Diffie-Hellman protocol

dir command in FTP

directories in FTP

Disabled Protocols pane for protocol analyzers

disabling

local user accounts

Sharing Wizard

disconnect command

Display Filter dialog

distance-vector protocols

DLCIs (data-link connection identifiers)

DNS

Linksys wireless router

local caches

network device names

nslookup utility

dnscache.txt file

do-not-fragment (DF) bit

domain-level Group Policy

Domain Name And DNS Servers screen

Domain Name field

Domain Name/IP Address field

domains

default

FTP

identifying

names

server configuration

DoS (denial of service) attacks

ping of death

SYN flood

Download All Available Updates option

Download Updates Immediately option

DRA (data recovery agent)

drawing internetworks

driver disks for wireless NICs

DSL modems

DSLAMs (DSL access multiplexers)

DTE devices

connectors

internetwork drawings

dynamic IP addresses

Cisco routers

Windows Vista and Windows

Windows XP Professional

dynamic routing

implementing

planning for

E

Edit DWORD Value dialog

Edit MAC Filter List button

EFS (Encrypting File System) feature

EFSDump utility

efsinfo command

EGPs (exterior gateway protocols)

EIA/TIA-232 specification

eight-pin modular connectors

802.15.1 standard

EIGRP (Enhanced Interior Gateway Routing Protocol)

electrostatic discharge (ESD)

Enable MAC Filter option

Enable Transport Name Resolution option

Enable Undo Disks option

Enabled Protocols pane for protocol analyzers

encapsulating security payload (ESP)

encapsulation

DSL modems

packet messages

PPP authentication

encapsulation PPP command

Encrypt Contents To Secure Data option

Encrypt The File Only option

Encrypting File System (EFS) feature

encryption

ad hoc wireless networking

data. See data encryption

file-level

encryptor identification

files and folders

right-clicking

settings,

FTP

MD

Encryption Details dialog

Encryption Warning dialog

End User License Agreement (EULA) dialog

endpoints, Frame Relay configuration on

ENET ENCAP (Ethernet encapsulation)

Enforce Password History dialog

Enhanced Data Rate (EDR)

Enhanced Interior Gateway Routing Protocol (EIGRP)

eoh (end-of-host) in subnet problems

Ericsson in Bluetooth consortium

ESD (electrostatic discharge)

ESP (encapsulating security payload)

Ethernet cable in internetwork drawings

Ethernet devices, differentiating

Ethernet encapsulation (ENET ENCAP)

Ethernet packets with protocol analyzers

EULA (End User License Agreement) dialog

Event Comb tool

Event Properties dialog

events and Event Viewer

auditing failure

auditing success

displaying

running

Everyone group

Windows Vista and Windows

Windows XP

Everyone’s Documents And Settings option

exclusions

DHCP

protocol analyzer filters

expansion slots

Explain This Setting tab

Express high-priority updates

ExpressCard slots

expressions in protocol analyzer filters

exterior gateway protocols (EGPs)

external hard drives for backups

F

failure, auditing

Fast Ethernet trunk ports

15-pin D-shell connectors

file-level encryption

encryptor identification

files and folders

right-clicking

settings

file systems for virtual machines

File Transfer Protocol (FTP) utility

BulletProof client

Microsoft command line

WebDrive

Windows Explorer

filenames, converting

Filter Expression dialog

filters and filtering

ICMP and Telnet

MAC addresses

on Cisco Catalyst 2950 Switch

on Linksys wireless routers

Network Monitor

Wireshark

Fix Selected Problems icon

flood attacks

Folder Options dialog

folders

encrypting

sharing

virtual machines

fonts for encrypted files

FQDN (fully qualified domain name) resolution

Windows Vista and Windows

Windows XP Professional

fraggle attacks

frame-relay map ip command

frame-relay route command

Frame Relay switches, routers as

frame-relay switching command

frames in OSI model

frequency range in Bluetooth

FTP (File Transfer Protocol) utility

BulletProof Client

Microsoft command line

WebDrive

Windows Explorer

full backups

Full Control permission

Full System Scan link

fully qualified domain name (FQDN) resolution

Windows Vista and Windows

Windows XP Professional

G

game ports

General Public License (GPL)

General tab

computer names

encryption

Windows Vista and Windows 7 IP address assignments

Windows XP Professional IP address assignments

Genuine Windows Validation page

get command in FTP

Getting Ready screen for analog modems

global configuration mode

GPL (General Public License)

GPOs (Group Policy Objects)

Group 1 Diffie-Hellman protocol

Group Policy for passwords

Group Policy Object Editor

Group Policy Objects (GPOs)

groups, local user

H

Hash Message Authentication Code (HMAC)

hdwwiz.exe command

Help And Support Center

helper addresses

hex pane for protocol analyzers

hexadecimal numbering system

high-priority updates

HMAC (Hash Message Authentication Code)

host IDs in IP addresses

hostname command

hostnames

Linksys wireless router

pre-shared keys

hosts per subnet

How To Back Up screen

How To Restore screen

Human Interface Devices group

hybrid protocols

HyperTerminal

with Telnet

with Wireshark

I

I Don’t Have An ISP link

IBM in Bluetooth consortium

ICMP (Internet Control Message Protocol) traffic

filters for

in ping of death attacks

with protocol analyzers

with traceroute

ICS (Internet Connection Sharing)

identifying

collision and broadcast domains

network components

IEEE (Institute of Electrical and Electronic Engineers)

Bluetooth

OUIs

wired devices

IGPs (interior gateway protocols)

EIGRP

IS-IS

OSPF

RIP

IGRP (Interior Gateway Routing Protocol)

IKE (Internet Key Exchange)

Immunize screen

Immunize This System option

inbound DLCIs for Frame Relay switches

Include Inheritable Permissions From This Object’s Parent option

Include Updates Setup option

inclusions with protocol analyzer filters

incremental backups

incremental values in subnet problems

index.txt file

Info & License menu

Inherit From Parent option

Install From Disk screen

Install Updates option

installing

Spybot - Search & Destroy

virtual machines

Windows Virtual PC

wireless NICs

hardware

laptops

software

task completion criteria

USB

Instant Messenger page

Institute of Electrical and Electronic Engineers (IEEE)

Bluetooth

OUIs

wired devices

Integrated Intermediate System to Intermediate System (IS-IS) protocol

Intel in Bluetooth consortium

interesting octets in subnet problems

interface command for VLANs

interface configuration mode

interface examples

interface loopback command

interface range command

interior gateway protocols (IGPs)

EIGRP

IS-IS

OSPF

RIP

Interior Gateway Routing Protocol (IGRP)

Internet Account Information screen

Internet Connection screen

Internet Connection Sharing (ICS)

Internet Connection Wizard

Internet Control Message Protocol (ICMP) traffic

filters for

in ping of death attacks

with protocol analyzers

with traceroute

Internet Key Exchange (IKE)

Internet Protocol (TCP/IP) Properties dialog

Internet Protocol Version 4 (TCP/IPv4) Properties dialog

Internet Security Association Key Management Protocol (ISAKMP)

internetworks, drawing

inverse ARP

ip access-group command

ip address command

ip address dhcp command

IP Address Range screen

IP addresses

ARP for. See Address Resolution Protocol (ARP)

assigning

Cisco routers,

DHCP server configuration. See DHCP server configuration

overview,

Windows Vista and Windows

Windows XP Professional

data encryption

Frame Relay switches

Linksys wireless router

network device names

in sockets

subnets. See subnets

ip dhcp database command

ip dhcp excluded-address command

ip dhcp pool command

ip domain list command

ip domain lookup command

ip domain name command

ip forward-protocol command

IP headers and protocol analyzers

ip helper-address command

ip name-server command

ip ospf command

ip ospf message-digest-key command

ip route command

ipconfig utility

detailed IP configuration display

DSL modems

general use

Linksys wireless router

local DNS resolution cache

MAC addresses

ipconfig /? command

ipconfig /all command

ipconfig /displaydns command

ipconfig /flushdns command

ipconfig /release command

ipconfig /renew command

ipsec-isakmp command

IS-IS (Integrated Intermediate System to Intermediate System) protocol

Is The Hardware Connected? screen

ISA slots

ISAKMP (Internet Security Association Key Management Protocol)

ISDN BRI interface

ISDN modems

ISPs for analog modems

ITU-T V.35 specification

J

joystick ports

L

laptops, wireless NIC installation on

layers in OSI model

lcd command in FTP

Lease Duration screen

leases, DHCP

displaying

duration

limiting

Linksys wireless router

monitoring

LEDs in DSL modems

Let Me Choose option

Let Me Choose What To Back Up option

Let Windows Choose option

License Agreement dialog

licenses

efsinfo

GPL

Spybot - Search & Destroy

virtual machines

link-state advertisements (LSAs)

link-state protocols

links between routers, securing

Linksys wireless routers

DHCP server configuration

filtering MAC addresses on

names

LiveUpdate Wizard

LMI (Local Management Interface) format

Local Computer Policy snap-in

local DNS resolution caches

local Group Policy for passwords

Local Management Interface (LMI) format

Local Policies for events

Local Security Policy

encryption

passwords

Local Security Settings screen

events

passwords

local user accounts

creating

disabling

local user groups

Local Users And Groups

local user accounts

creating

disabling

local user groups

log-input keyword

logs, Event Viewer for

auditing failure

auditing success

displaying

running

long filenames, converting

loopback interfaces

ls command in FTP

LSAs (link-state advertisements)

M

MAC Address Filter List screen

MAC addresses

ARP for

filtering

on Cisco Catalyst 2950 Switch

on Linksys wireless routers

Network Monitor

ipconfig

net config workstation

task completion criteria

third-party utilities

visual inspection

winipcfg

Manage Network Connections option

Manage Space link

Manage Wireless Networks applet

manual bindings in DHCP

Manually Connect To A Wireless Network dialog

Map Network Drive dialog

mapping traffic to encryption

masks

subnet. See subnets

wildcard

match address command

Maximum Number Of DHCP Users field

Maximum Password Age

MD5 encryption

measuring wireless signal strength

memory

MAC addresses

virtual machines

mget command in FTP

Microsoft command line for FTP

Microsoft in Bluetooth consortium

Microsoft Internet Referral Service

Microsoft Management Console (MMC) plug-in

Computer Management

DHCP

Security Settings

snap-in choices

Microsoft Update service

microwave ovens

Minimum Password Age setting

modems

analog

dial-up accounts

dial-up connections

overview,

Windows Vista and Windows

DSL

mouse for virtual machines

moving encrypted files

mput command in FTP

MS-CHAP authentication

MTU setting

My Computer

encrypted files

resource access

user accounts

user groups

My Documents And Settings backup option

N

name servers. See DNS

names

ad hoc wireless networks

analog modem connections

folders

FTP connections

network devices

PPP authentication

user accounts

user groups

Wireshark filters

net config workstation command

NetBIOS (Network Basic Input Output System)

names

node type

NETSTAT utility

Network And Sharing Center

ad hoc wireless networking

analog modems

IP address assignments

Network Basic Input Output System (NetBIOS)

names

node type

network components, identifying

Network Connection Type screen

Network Connections window

ad hoc wireless networking

analog modems

Windows Vista and Windows 7 IP address assignments

Windows XP Professional IP address assignments

network devices, names

Network Monitor

filter operators

filters for ICMP and Telnet

general use

Networking tab

New Connection Wizard

analog modems

Windows Vista and Windows

New Exclusion Range option

New Folder option

New Group dialog

New Reservation dialog

New Scope Wizard

New User dialog

next multiple of 8 (nm8) in subnet problems

NICs. See wireless NIC installation

no arp frame-relay command

no frame-relay inverse-arp command

no ip dhcp conflict logging command

no service dhcp command

Nokia in Bluetooth consortium

normal backups

Norton AntiVirus scanner

NOT function for filters

nslookup utility

NTFS filesystems

encryption

virtual machines

null modem cables

numbering systems

O

Obtain An IP Address Automatically option

Obtain DNS Server Address Automatically option

octets, interesting

Open Shortest Path First (OSPF) protocol

description

with MD5-encrypted authentication

Open Systems Interconnection (OSI) reference model

operating systems. See also specific Windows operating systems by name

updates

high-priority

Microsoft Update service

optional

virtual machines

optical drives in virtual machines

optional updates

OR function for filters

organizationally unique identifiers (OUIs)

Original Location setting

original subnet mask (osm) in subnet problems

OSI (Open Systems Interconnection) reference model

OSPF (Open Shortest Path First) protocol

description

with MD5-encrypted authentication

OUIs (organizationally unique identifiers)

outbound DLCIs for Frame Relay switches

P

partitions in virtual machines

passive FTP

Password Must Meet Complexity Requirements option

Password Never Expires option

passwords and passphrases

ad hoc wireless networks

disabled accounts

DSL modems

FTP

Linksys wireless routers

MD243

restrictions

complexity requirements

Enforce Password History

Maximum Password Age

Minimum Password Age

schedules

Telnet

user accounts

Pattern Match dialog

patterns for protocol analyzer filters

PC Cards

PCI slots

peripherals, batteries for

permanent virtual circuits (PVCs)

permissions

auditing failures

resource access

user groups

Windows Vista and Windows

Windows XP

Permissions dialog

Windows Vista and Windows

Windows XP

Permissions tab

Permit option for MAC address filters

Phone Number To Dial screen

phones, cordless

Pin To Start Menu option

ping of death mitigation

ping utilities

MAC addresses

by name

routing policies

working with

Point-to-Point over ATM (PPPoA) encapsulation

Point-to-Point over Ethernet (PPPoE) encapsulation

Point-to-Point Protocol (PPP)

policies, routing

Port Number field

ports

AUI

game

joystick

in sockets

with traceroute

trunk

Wireshark filters

power, turning off

PPP (Point-to-Point Protocol)

ppp authentication chap command

ppp chap hostname command

PPPoA (Point-to-Point over ATM) encapsulation

PPPoE (Point-to-Point over Ethernet) encapsulation

pre-shared keys

prefix length for subnets

Prevent option for MAC address filters

product keys for virtual machines

protocol analyzers

Network Monitor

filter operators

filters for ICMP and Telnet

general use

third-party. See Wireshark protocol analyzer

protocols, routing

public switched telephone networks (PSTNs)

put command in FTP

PVCs (permanent virtual circuits)

Q

question marks (?) for nslookup

quit command in FTP

R

RADIUS (Remote Authentication Dial-In User Service) servers

RAM for virtual machines

RAS (remote access server)

Read access on Windows XP

read-only memory (ROM) for MAC addresses

Ready To Install dialog

Recover System Settings Or Your Computer link

Recovery screen for antispyware

redistribute static command

Refer Me To More Internet Service Providers option

Registry

backups

for encryption

remote access server (RAS)

remote ADSL terminal units

Remote Authentication Dial-In User Service (RADIUS) servers

Replace The Existing Backups option

reservations in DHCP

resource access

Windows Vista and Windows

Windows XP

Restart Now option for updates

Restore Files And Settings option

restoring backups

Review And Install Updates link

revised subnet mask (rsm) in subnet problems

RFC 1483 encapsulation

right-clicking for encryption

RIP (Routing Information Protocol)

ROM (read-only memory) for MAC addresses

Router (Default Gateway) screen

routers

ARP utilities

data encryption. See data encryption

default domains

DHCP relay agents

DHCP server configuration

as Frame Relay switches

internetwork drawings

IP addresses

MAC address filtering

names

OSI model

routing policies

securing links between

serial interfaces

Telnet protocol

VLANs on

routing

implementing

planning

Routing Information Protocol (RIP)

RS-232 specification

Run dialog

S

SA (security association) for data encryption

Save On A Network option

Save Password option

Save Settings option

Linksys wireless router

MAC address filters

Save Settings And Run Backup option

saving ad hoc wireless networks

Scan Drives dialog

Scan Folders dialog

Scan For Viruses page

scans

antispyware

antivirus

Schedule tab

Schedule Task tab

scheduling antispyware

scope

DHCP

IP addresses

VLANs

Scope Name screen

Scope Options screen

screw-on antennas

Search For Updates option

Secure Hash Algorithm (SHA)

security

ad hoc wireless networks

analog modems

antispyware scans

antivirus scans

backups

encrypted files

Registry

restoring

Windows

Windows XP

encryption. See encryption

Event Viewer

auditing failure

auditing success

displaying

running

links between routers

operating system updates

passwords. See passwords and passphrases

ping of death attacks

resource access

Windows Vista and Windows

Windows XP

SYN flood attacks

security association (SA) for data encryption

Security Essentials antivirus scanner

security identifiers (SIDs)

security keys

Security Settings plug-in

Security tab

events

Windows Vista and Windows

Windows XP

Security Warning dialog

segments in TCP

Select Additional Tasks dialog

Select Components dialog

Select Destination Location dialog

Select Group Policy Object Wizard

Select Network Adapter screen

Select Start Menu Folder dialog

Select User Or Group dialog

Select Users dialog

Select Users Or Groups dialog

serial interfaces

Server Message Block (SMB)

service dhcp command

service set identifiers (SSIDs)

set domain command

Set Password option

schedules

user accounts

set peer command

set srchlist command

set transform-set command

Set Up A Connection Or Network dialog

Set Up A Dial-Up Connection option

Set Up A Wireless Ad Hoc Network dialog

Set Up An Advanced Connection setting

Set Up Backup screen

Set Up My Connection Manually option

Settings menu for antispyware

Setup tab for Linksys wireless router

SHA (Secure Hash Algorithm)

SHA HMAC authentication algorithm

Share Permissions tab

Share This Folder option

Sharing And Security option

Sharing tab

Sharing Wizard, disabling

show access-lists command

show arp command

show controllers command

Show Encrypted Or Compressed NTFS Files In Color option

show interface f0/0 command

show interface trunk command

show ip interface brief command

show ip route command

show sessions command

show vlan command

show vlan-switch command

SIDs (security identifiers)

Signing Up With An Internet Service Provider option

Site Wizard screen

sketches for internetworks

Smart-Serial V.35 connectors

SMB (Server Message Block)

smurf attacks

sockets

software installation for wireless NICs

Software or Hardware link for updates

SpeedBooster

Spybot - Search & Destroy utility

downloading and installing

running

SSIDs (service set identifiers)

SSL encryption method

Start menu

Administrative Tools

Windows Virtual PC

Start Menu Items settings

Start Menu page

Start Using The Program option, antispyware

Starting IP Address field

static, ESD

static IP addresses

Cisco routers

DSL modems

static failover

Windows Vista and Windows

Windows XP Professional

static routing

implementing

planning for

subnets

decimal method

four clues

Linksys wireless router

number of

problems

steps

task completion criteria

success, auditing

superframes in OSI model

Switch To Wizard Mode option

switches

Frame Relay

internetwork drawings

VLAN support

switchport commands

SYN flood attacks

sysdm.cpl command

system partitions for virtual machines

System Properties window

System Restore option

T

T1 circuits

CSU/DSU simulation

Frame Relay

OSI model

Task page

Taskbar And Start Menu Properties dialog

TCP

headers

sockets

TCP/IP protocol

IP addresses. See IP addresses

NETSTAT utility for

TCP/IP (Winsock) option for Telnet

Telnet protocol

computer to router

DSL modems

filters for

general setup

router to router

testing

ad hoc wireless networks

connections. See ping utilities

for SYN flooding

third-party products

MAC address utilities

protocol analyzers. See Wireshark protocol analyzer

This Is A Computer-To-Computer (Ad Hoc) Network option

Threat Detection Categories page

tildes (~) for long filenames

time to live (TTL) field

TLS encryption method

Tools menu for antispyware

Toshiba in Bluetooth consortium

traceroute utilities

transform sets in data encryption

transparent bridging components

troubleshooting

ARP utilities for

computer event logs for. See events and Event Viewer

connectivity. See ping utilities

FTP for

BulletProof client

Microsoft command line

WebDrive

Windows Explorer

ipconfig for

NETSTAT utility for

nslookup utility for

protocol analyzers. See protocol analyzers

Telnet for

traceroute utilities for

trunk ports

trunks in VLANs

TTL (time to live) field

2611XM routers

data encryption

DHCP server configuration

VLANs

Type I subnet problems

Type II subnet problems

Type Of Backup screen

U

UDP

fraggle attacks

ports

in sockets

testing for

traceroute

ultra-wideband (UWB) Bluetooth version

undebug all command

Universal Serial Bus (USB) interface

Bluetooth

wireless NICs

Update Filter List option

updates

antispyware

MAC address filters

operating systems

high-priority,

Microsoft Update service

optional

USB (Universal Serial Bus) interface

Bluetooth

wireless NICs

USB Human Interface Device entries

Use Passive Mode option

Use Sharing Wizard (Recommended) option

Use The Following DNS Server Addresses option

Use The Following IP Address option

Use This Account Name And Password When Anyone Connects To The Internet From This Computer option

user accounts

creating

disabling

user groups

username command

usernames

FTP

router security

Telnet

user accounts

Users Who Can Transparently Access This File section

UWB (ultra-wideband) Bluetooth version

V

V.35 connectors

variable-length subnet masking (VLSM)

VHDs (virtual hard disks)

View Available Wireless Networks option

virtual circuits (VCs)

virtual hard disks (VHDs)

virtual LANs (VLANs)

on Cisco 2611XM router and Catalyst 3550 switch

designing

virtual machines (VMs)

creating

installing

operating systems

viruses, antivirus scans

VirusScan scanner

Vista operating system. See Windows Vista operating system

VLANs (virtual LANs)

on Cisco 2611XM router and Catalyst 3550 switch

designing

VLSM (variable-length subnet masking)

VMs (virtual machines)

creating

installing

operating systems

Voice over IP (VoIP)

VPNs

ping of death mitigation

subnets

SYN floods

Telnet through

W

WAPs (wireless access points)

WebDrive program

Welcome To Windows Update page

What To Back Up screen

What To Restore screen

When To Back Up screen

Where To Restore screen

wildcard masks

WiMedia Alliance in Bluetooth

Windows 7 operating system

ad hoc wireless networking

analog modems

backups

computer names

IP address assignments

automatic

dynamic

static

resource access

Windows Update

Windows Explorer for FTP

Windows Genuine Advantage

Windows Help And Support dialog

Windows Internet Naming Service (WINS)

description

DHCP configuration

Linksys wireless router

network device names

Windows Scheduled Tasks utility

Windows Security dialog

Windows Server in DHCP server configuration

Windows Update

high-priority updates

optional updates

Windows Vista and Windows

Windows Virtual PC

Windows Vista operating system

ad hoc wireless networking

analog modems

computer names

IP address assignments

automatic

dynamic

static

resource access

Windows Update

Windows XP Mode application

Windows XP operating system

ad hoc wireless networking

backups

computer names

encryption

IP address assignments

dynamic

static

resource access

winipcfg interface

WINS (Windows Internet Naming Service)

description

DHCP configuration

Linksys wireless router

network device names

WINS Servers screen

wired devices standards

wireless access points (WAPs)

Wireless Client MAC List screen

Wireless MAC Filter page

wireless networking

ad hoc

overview,

testing

Windows Vista and Windows

Windows XP

Bluetooth technology

signal strength measurements

Wireless Networks tab

wireless NIC installation

hardware

laptops

software

task completion criteria

USB

Wireless tab

Wireshark protocol analyzer

filters

HyperTerminal with

protocol changes

starting

wrist straps

www.eventid.net site

X

XP operating system. See Windows XP operating system

Y

Yes, I Want To Activate This Scope Now option

Yes, I Want To Configure These Options Now option

Z

ZyXEL 645-R DSL modems

Previous: Phase 4: Troubleshooting the Network
Book main: Foreword