Enterasys Networks CSX7000 Manuel d'utilisateur Page 338

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 729
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 337
USER’S GUIDE
338 CyberSWITCH
b. Press 2 to select the system serialization packet handling level. The default values for all
parameters will be displayed. Enter the Id of any parameters you need to change. Follow
the onscreen instructions for changing the default values. Return to the IPX spoofing menu.
5. Press 4 to configure the message packet handling. A message packet handling menu will be
displayed.
a. Press 1 to select the message packet handling configuration level. Follow the onscreen
instructions to select either device level or system level. Return to the message packet
handling menu.
b. Press 2 to select the system message packet handling level. The default values for all
parameters will be displayed. Enter the Id of any parameters you need to change. Follow
the onscreen instructions for changing the default values. Return to the IPX spoofing menu.
U
SING MANAGE MODE COMMANDS
ipxspoof
Allows you to configure system level spoofing data.
IPX SPOOFING CONFIGURATION ELEMENTS
CONFIGURATION LEVEL
Allows you to choose either device level or system level configuration for the following IPX
elements:
IPX watchdog spoofing
SPX watchdog spoofing
serial packet handling
message packet handling
P
ACKET HANDLING METHOD
Available for Serial Packet Handling and Message Packet Handling. Allows you to select the
system level method of handling packets. You may choose from the following packet handling
methods:
always discard
forward only when connected
always forward
IPX SPOOFING BACKGROUND INFORMATION
NetWare was designed for the LAN environment, and assumes that there is always available
bandwidth. Because of this, NetWare protocols are not well suited to WANs. Special handling must
be given to the NetWare protocols to prevent them from causing excessive ISDN connections. The
special handling of NetWare protocols in a routing environment consists of spoofing and automatic
filters.
Spoofing is a method to prohibit excessive ISDN connections. When a request packet is received
that should be routed over the WAN, yet there is no connection up to the remote device, the
spoofing process internally generates a desired response packet. The NetWare protocols that
require spoofing are the Watchdog Protocol and the Sequence Packet Exchange (SPX) Protocol.
Automatic filters are also used to prohibit excessive ISDN connections caused by the NetWare
protocols.
Vue de la page 337
1 2 ... 333 334 335 336 337 338 339 340 341 342 343 ... 728 729

Commentaires sur ces manuels

Pas de commentaire