Configuring ipx – Nortel Networks NN46110-602 User Manual

Page 222

Advertising
background image

222 Appendix D Configuring for interoperability

NN46110-602

6

Selections in the Encryption fields are dependent on the type of encryption
that your third-party client supports.

7

Enable Perfect Forward Secrecy (PFS). PFS ensures that if one key is
compromised, subsequent keys are not compromised.

8

In the Forced Logoff dialog box, specify a time after which all active users
are automatically logged off. The default is 0, which means the option is
turned off. The possible range is 00:00:01 to 23:59:59.

9

Enable compression for IPsec tunneling.

10 In the Rekey Time-out section, enter the time you want to limit the lifetime

of a single key used to encrypt data. The default is 08:00:00 (8 hours).

11 In the Rekey Data Count section, you can choose to set a rekey data count

depending on how much data you expect to transmit through the tunnel with a
single key. The default is 0 KB; a setting of 0 disables this count.

12 Enable or disable IPsec Data Protection, depending on whether you want to

allow it.

Configuring IPX

The Internetwork Packet Exchange (IPX) protocol is the Novell* adaptation of the
Xerox Networking System (XNS) protocol. IPX has the following characteristics:

It is a connectionless datagram delivery protocol. A datagram is a unit of data
that contains all of the addressing information to deliver it to its destination.

It does not guarantee the delivery of packets. Higher-level protocols assume
the responsibility for reliability.

The VPN Router supports IPX by encapsulating IPX traffic within PPTP client
connections. Note that the VPN Router’s IPX support is not available for the
IPsec tunneling protocol.

IPX is the network-layer routing protocol used in the Novell NetWare*
environment. The primary tasks of IPX are addressing, routing, and switching
information packets from one location to another on a network. In a LAN-based
client, the network interface card (NIC) provides network node addressing; in a
tunneled environment, the VPN Router provides the network node addressing.

Advertising