Ipx spoofing configuration elements, Ipx spoofing background information – Cabletron Systems CSX1000 User Manual

Page 286

Advertising
background image

USER’S GUIDE

286 CyberSWITCH

b.

Press 2 to select the system serialization packet handling level. The default values for all
parameters will be displayed. Enter the Id of any parameters you need to change. Follow
the onscreen instructions for changing the default values. Return to the IPX spoofing menu.

5.

Press 4 to configure the message packet handling. A message packet handling menu will be
displayed.
a.

Press 1 to select the message packet handling configuration level. Follow the onscreen
instructions to select either device level or system level. Return to the message packet
handling menu.

b.

Press 2 to select the system message packet handling level. The default values for all
parameters will be displayed. Enter the Id of any parameters you need to change. Follow
the onscreen instructions for changing the default values. Return to the IPX spoofing menu.

U

SING

M

ANAGE

M

ODE

C

OMMANDS

ipxspoof

Allows you to configure system level spoofing data.

IPX S

POOFING

C

ONFIGURATION

E

LEMENTS

C

ONFIGURATION

L

EVEL

Allows you to choose either device level or system level configuration for the following IPX
elements:

IPX watchdog spoofing

SPX watchdog spoofing

serial packet handling

message packet handling

P

ACKET

H

ANDLING

M

ETHOD

Available for Serial Packet Handling and Message Packet Handling. Allows you to select the
system level method of handling packets. You may choose from the following packet handling
methods:

always discard

forward only when connected

always forward

IPX S

POOFING

B

ACKGROUND

I

NFORMATION

NetWare was designed for the LAN environment, and assumes that there is always available
bandwidth. Because of this, NetWare protocols are not well suited to WANs. Special handling must
be given to the NetWare protocols to prevent them from causing excessive ISDN connections. The
special handling of NetWare protocols in a routing environment consists of spoofing and automatic
filters.

Spoofing is a method to prohibit excessive ISDN connections. When a request packet is received
that should be routed over the WAN, yet there is no connection up to the remote device, the
spoofing process internally generates a desired response packet. The NetWare protocols that
require spoofing are the Watchdog Protocol and the Sequence Packet Exchange (SPX) Protocol.
Automatic filters are also used to prohibit excessive ISDN connections caused by the NetWare
protocols.

Advertising
This manual is related to the following products: