December 2003, M-10041-01
vi Contents
Stateful Packet Inspection ..................................................................................... C-11
Denial of Service Attack ........................................................................................ C-11
Ethernet Cabling ..........................................................................................................C-12
Uplink Switches and Crossover Cables ................................................................C-12
Cable Quality .........................................................................................................C-13
Appendix D
Preparing Your Network
Preparing Your Computers for TCP/IP Networking .......................................................D-1
Configuring Windows 95, 98, and Me for TCP/IP Networking .......................................D-2
Install or Verify Windows Networking Components .................................................D-2
Enabling DHCP to Automatically Configure TCP/IP Settings .................................D-4
Selecting Windows’ Internet Access Method ....................................................D-4
Verifying TCP/IP Properties ....................................................................................D-5
Configuring Windows NT, 2000 or XP for IP Networking ...............................................D-5
Installing or Verifying Windows Networking Components .......................................D-5
Verifying TCP/IP Properties ....................................................................................D-6
Configuring the Macintosh for TCP/IP Networking ........................................................D-6
MacOS 8.6 or 9.x ....................................................................................................D-6
MacOS X .................................................................................................................D-7
Verifying TCP/IP Properties for Macintosh Computers ...........................................D-8
Verifying the Readiness of Your Internet Account .........................................................D-9
Are Login Protocols Used? .....................................................................................D-9
What Is Your Configuration Information? ................................................................D-9
Obtaining ISP Configuration Information for Windows Computers .......................D-10
Obtaining ISP Configuration Information for Macintosh Computers ..................... D-11
Restarting the Network ................................................................................................D-12
Appendix E
Virtual Private Networking
What is a VPN? ............................................................................................................. E-1
What Is IPSec and How Does It Work? ......................................................................... E-2
IPSec Security Features ......................................................................................... E-2
IPSec Components ................................................................................................. E-2
Encapsulating Security Payload (ESP) ................................................................... E-3
Authentication Header (AH) .................................................................................... E-4
IKE Security Association ......................................................................................... E-4