Ipx spoofing configuration elements, Ipx spoofing background information – Enterasys Networks CSX6000 User Manual
Page 338
USER’S GUIDE
338 CyberSWITCH
b.
Press 2 to select the system serialization packet handling level. The default values for all
parameters will be displayed. Enter the Id of any parameters you need to change. Follow
the onscreen instructions for changing the default values. Return to the IPX spoofing menu.
5.
Press 4 to configure the message packet handling. A message packet handling menu will be
displayed.
a.
Press 1 to select the message packet handling configuration level. Follow the onscreen
instructions to select either device level or system level. Return to the message packet
handling menu.
b.
Press 2 to select the system message packet handling level. The default values for all
parameters will be displayed. Enter the Id of any parameters you need to change. Follow
the onscreen instructions for changing the default values. Return to the IPX spoofing menu.
U
SING
M
ANAGE
M
ODE
C
OMMANDS
ipxspoof
Allows you to configure system level spoofing data.
IPX S
POOFING
C
ONFIGURATION
E
LEMENTS
C
ONFIGURATION
L
EVEL
Allows you to choose either device level or system level configuration for the following IPX
elements:
•
IPX watchdog spoofing
•
SPX watchdog spoofing
•
serial packet handling
•
message packet handling
P
ACKET
H
ANDLING
M
ETHOD
Available for Serial Packet Handling and Message Packet Handling. Allows you to select the
system level method of handling packets. You may choose from the following packet handling
methods:
•
always discard
•
forward only when connected
•
always forward
IPX S
POOFING
B
ACKGROUND
I
NFORMATION
NetWare was designed for the LAN environment, and assumes that there is always available
bandwidth. Because of this, NetWare protocols are not well suited to WANs. Special handling must
be given to the NetWare protocols to prevent them from causing excessive ISDN connections. The
special handling of NetWare protocols in a routing environment consists of spoofing and automatic
filters.
Spoofing is a method to prohibit excessive ISDN connections. When a request packet is received
that should be routed over the WAN, yet there is no connection up to the remote device, the
spoofing process internally generates a desired response packet. The NetWare protocols that
require spoofing are the Watchdog Protocol and the Sequence Packet Exchange (SPX) Protocol.
Automatic filters are also used to prohibit excessive ISDN connections caused by the NetWare
protocols.