P
- packet filter hooks,
Packet Filter Hooks
- packet filtering
- activating a different rule set,
How to Activate a Different or Updated Packet Filtering Rule Set
- appending
- rules to active set,
How to Append Rules to the Active Packet Filtering Rule Set
- rules to inactive set,
How to Append Rules to the Inactive Packet Filtering Rule Set
configuring,
Using IP Filter's Packet Filtering Feature
- deactivating,
How to Deactivate Packet Filtering
- managing rule sets,
Managing Packet Filtering Rule Sets for IP Filter
- reloading after updating current rule set,
How to Activate a Different or Updated Packet Filtering Rule Set
- removing
- active rule set,
How to Remove a Packet Filtering Rule Set
- inactive rule set,
How to Remove an Inactive Packet Filtering Rule Set From the Kernel
specifying a NIC,
How to Activate a NIC for Packet Filtering
- switching between rule sets,
How to Switch Between Active and Inactive Packet Filtering Rule Sets
- packet flow
- relay router,
Considerations for Tunnels to a 6to4 Relay Router
- through tunnel,
Packet Flow Through the 6to4 Tunnel
- packet flow, IPv6
- 6to4 and native IPv6,
Considerations for Tunnels to a 6to4 Relay Router
- through 6to4 tunnel,
Packet Flow Through the 6to4 Tunnel
- packet forwarding router,
IPv4 Autonomous System Topology
- packets
- checking flow,
Monitoring Packet Transfers With the snoop Command
- data encapsulation
Transport Layer: Where Data Encapsulation Begins
Transport Layer: Where Data Encapsulation Begins
- description,
Data Encapsulation and the TCP/IP Protocol Stack
- displaying contents,
Monitoring Packet Transfers With the snoop Command
- dropped or lost
Internet Layer
How to Determine if a Host Is Dropping Packets
- forwarding,
Packet Forwarding and Routing on IPv4 Networks
- fragmentation,
Internet Layer
- header
- IP header,
Internet Layer: Where Packets Are Prepared for Delivery
- TCP protocol functions,
Transport Layer
IP protocol functions,
Internet Layer
- IPv6 header format,
IPv6 Packet Header Format
- life cycle
Data Encapsulation and the TCP/IP Protocol Stack
How the Receiving Host Handles the Packet
- application layer,
Application Layer: Where a Communication Originates
- data-link layer
Data-Link Layer: Where Framing Takes Place
How the Receiving Host Handles the Packet
- Internet layer,
Internet Layer: Where Packets Are Prepared for Delivery
- physical network layer
Physical Network Layer: Where Frames Are Sent and Received
How the Receiving Host Handles the Packet
- receiving host process
How the Receiving Host Handles the Packet
How the Receiving Host Handles the Packet
- transport layer
Transport Layer: Where Data Encapsulation Begins
Transport Layer: Where Data Encapsulation Begins
protecting
- inbound packets,
IPsec Packet Flow
- outbound packets,
IPsec Packet Flow
- with IKE,
IKE Phase 1 Exchange
- with IPsec
IPsec Packet Flow
IPsec Protection Mechanisms
transfer
- router,
How Routers Transfer Packets
- TCP/IP stack
Data Encapsulation and the TCP/IP Protocol Stack
How the Receiving Host Handles the Packet
UDP,
Transport Layer: Where Data Encapsulation Begins
- verifying protection,
How to Verify That Packets Are Protected With IPsec
- params clause
- defining global statistics
How to Create the IPQoS Configuration File and Define Traffic Classes
params Clause
- for a flowacct action,
How to Enable Accounting for a Class in the IPQoS Configuration File
- for a marker action,
How to Define Traffic Forwarding in the IPQoS Configuration File
- for a metering action,
How to Configure Flow Control in the IPQoS Configuration File
- syntax,
params Clause
- per-hop behavior (PHB),
Per-Hop Behaviors
- AF forwarding,
Assured Forwarding
- defining, in the IPQoS configuration file,
How to Configure Flow Control in the IPQoS Configuration File
- EF forwarding,
Expedited Forwarding
- using, with dscpmk marker,
Using the dscpmk Marker for Forwarding Packets
- perfect forward secrecy (PFS)
- description,
IKE Key Terminology
- IKE,
IKE Key Negotiation
- PF_KEY socket interface
- IPsec
IPsec Security Associations
IPsec Utilities and Files
- pfil module,
IP Filter and the pfil STREAMS Module
- viewing statistics,
How to View pfil Statistics for IP Filter
- PFS, See perfect forward secrecy (PFS)
- physical interface,
Link Aggregation Basics
- See also interfaces
- adding, after installation,
How to Configure a Physical Interface After System Installation
- definition
Basics for Administering Physical Interfaces
Physical Interface
- failure detection,
IPMP Failure Detection and Recovery Features
- naming conventions,
Network Interface Names
- network interface card (NIC),
Basics for Administering Physical Interfaces
- removing,
How to Remove a Physical Interface
- repair detection with IPMP,
Detecting Physical Interface Repairs
- physical layer (OSI),
OSI Reference Model
- physical network layer (TCP/IP)
Physical Network Layer
Physical Network Layer: Where Frames Are Sent and Received
How the Receiving Host Handles the Packet
- physical point of attachment (PPA),
VLAN Tags and Physical Points of Attachment
- ping command,
How to Determine if a Host Is Dropping Packets
- description,
Probing Remote Hosts With the ping Command
- extensions for IPv6,
ping Command Modifications for IPv6 Support
- running,
How to Determine if a Host Is Dropping Packets
- -s option,
How to Determine if a Host Is Dropping Packets
- syntax
Probing Remote Hosts With the ping Command
Probing Remote Hosts With the ping Command
- PKCS #11 library
- in ike/config file,
IKE Public Key Databases and Commands
- specifying path to,
ikecert certlocal Command
- pkcs11_path keyword
- description,
IKE Public Key Databases and Commands
- ikecert command and,
ikecert certlocal Command
- using,
How to Generate and Store Public Key Certificates in Hardware
- plumbing an interface
How to Configure an IPv4 Router
Plumbing an Interface
How to Configure a Physical Interface After System Installation
- pntadm command
- description
DHCP Command-Line Utilities
DHCP Commands
- examples,
Working With IP Addresses in the DHCP Service (Task Map)
- using in scripts,
Running DHCP Commands in Scripts
- policies, IPsec,
IPsec Protection Policies
- policies, for aggregations,
Policies and Load Balancing
- policy files
- ike/config file
IPsec Utilities and Files
IKE Utilities and Files
IKE Configuration File
- ipsecinit.conf file,
ipsecinit.conf File
- security considerations,
Security Considerations for ipsecinit.conf and ipsecconf
- policy service
- description,
IPsec Services
- use,
How to Secure Traffic Between Two Systems With IPsec
- ports, TCP, UDP, and SCTP port numbers,
services Database
- PPP links
- troubleshooting
- packet flow,
Monitoring Packet Transfers With the snoop Command
- prefix
- network, IPv4,
Designing Your CIDR IPv4 Addressing Scheme
- site prefix, IPv6,
Prefixes in IPv6
- subnet prefix, IPv6,
Prefixes in IPv6
- prefix discovery, in IPv6,
IPv6 Neighbor Discovery Protocol Overview
- prefixes
- router advertisement
Prefix Configuration Variables
Comparison of Neighbor Discovery to ARP and Related IPv4 Protocols
Router Advertisement Prefixes
- presentation layer (OSI),
OSI Reference Model
- preshared keys (IKE)
- description,
IKE With Preshared Key Authentication
- replacing,
How to Refresh IKE Preshared Keys
- shared with other platforms,
How to Configure IKE With Preshared Keys
- storing,
IKE Preshared Keys Files
- task map,
Configuring IKE With Preshared Keys (Task Map)
- viewing,
How to View IKE Preshared Keys
- preshared keys (IPsec), creating,
How to Manually Create IPsec Security Associations
- preventing IP spoofing, SMF manifest,
How to Prevent IP Spoofing
- primary network interface,
Basics for Administering Physical Interfaces
- private keys, storing (IKE),
ikecert certlocal Command
- privilege level
- changing in IKE,
How to View IKE Preshared Keys
- checking in IKE
How to Refresh IKE Preshared Keys
How to View IKE Preshared Keys
- setting in IKE,
How to Verify That IKE Preshared Keys Are Identical
- probe-based failure detection
- configuring target systems,
Configuring Target Systems
- definition,
Probe-Based Failure Detection
- failure detection time,
Probe-Based Failure Detection
- probe traffic, IPMP,
Test Addresses
- probing targets,
Probe-Based Failure Detection
- probing targets, in.mpathd daemon,
Test Addresses
- protecting
- IPsec traffic,
Introduction to IPsec
- keys in hardware,
IKE and Hardware Storage
- mobile systems with IPsec,
Configuring IKE for Mobile Systems
- packets between two systems,
How to Secure Traffic Between Two Systems With IPsec
- VPN with IPsec tunnel in transport mode,
How to Protect a VPN With an IPsec Tunnel in Transport Mode Using IPv4
- VPN with IPsec tunnel in tunnel mode,
How to Protect a VPN With an IPsec Tunnel in Tunnel Mode Using IPv4
- web server with IPsec,
How to Use IPsec to Protect a Web Server From Nonweb Traffic
- Protecting a VPN With IPsec (Task Map),
Protecting a VPN With IPsec (Task Map)
- Protecting Traffic With IPsec (Task Map),
Protecting Traffic With IPsec (Task Map)
- protection mechanisms, IPsec,
IPsec Protection Mechanisms
- protocol layers
- OSI Reference Model
Protocol Layers and the Open Systems Interconnection Model
OSI Reference Model
- packet life cycle
Data Encapsulation and the TCP/IP Protocol Stack
How the Receiving Host Handles the Packet
- TCP/IP protocol architecture model
TCP/IP Protocol Architecture Model
Application Layer
- application layer
TCP/IP Protocol Architecture Model
Application Layer
Application Layer
- data-link layer
TCP/IP Protocol Architecture Model
Data-Link Layer
- Internet layer
TCP/IP Protocol Architecture Model
Internet Layer
- physical network layer
TCP/IP Protocol Architecture Model
Physical Network Layer
- transport layer
TCP/IP Protocol Architecture Model
Transport Layer
- protocol statistics display,
How to Display Statistics by Protocol
- protocols database
- corresponding name service files,
How Name Services Affect Network Databases
- overview,
protocols Database
- proxy keyword, IKE configuration file,
How to Handle a Certificate Revocation List
- public key certificates, See certificates
- public keys, storing (IKE),
ikecert certdb Command
- public topology, IPv6,
Global Unicast Address
- publickeys database,
/etc/inet/ike/publickeys Directory