User`s guide

SFVRA Connection Manager 53
C
ONFIGURING
U
SERS
Protocols
4. Select the Spoofing Options tab.
Note: The Watchdog Spoofing and Packet Handling options are the same for both IPX and
IPX RLAN. Changing the options on the IPX tab identically changes the options on the
IPX RLAN tab, and vice versa.
5. Change any IPX or SPX watchdog spoofing options that you desire, or accept the defaults.
6. Select the Packet Handling tab.
7. Change any Packet Handling options that you desire, or accept the defaults.
8. Click Update to write the new information for the user to the database, or click Add to create the
newly configured user.
Note: If you are adding a new user to the database, a User Name must be defined on the
Address tab.
9. Click Close.
BRIDGING
You are given the option of either enabling or disabling the MAC layer bridging feature. When
bridging is enabled, the CyberSWITCH bridges data packets to the proper destination, regardless
of the network protocols being used.
Note: If the bridge and any of the routing protocols are enabled, the system will act as a
“brouter.” A brouter operates as a router for protocols it can route, and operates as a bridge
for protocols it cannot route.
With bridging enabled, bridge dial out is supported. Bridge dial out, allows the SFVRA-CONN to
initiate connections to bridge devices at remote sites. The system accepts bridge data received on
the Ethernet LAN or ISDN network, and initiates a data connection to a bridge device specified in
the user data.
The “bridge” determines if a connection already exists, or whether a connection should be initiated.
The MAC frame is simply forwarded if a connection already exists. If a connection does not, the
SFVRA-CONN will map the Bridge Address or User Name to a phone number, and initiate a
connection. The normal connection processing, protocol negotiation, and data forwarding
mechanisms are followed once the connection is requested.