User`s guide

USER’S GUIDE
56 SFVRA Connection Manager
5. Click Update to write the new information for the user to the database, or click Add to create the
newly configured user.
Note: If you are adding a new user to the database, a User Name must be defined on the
Address tab.
6. Click Close.
Note: A WAN (Remote LAN) IP Network Interface must be defined on all Remote Access
Switches that each Bridging with IP RLAN user can access. Refer to the IP RLAN Network
Interfaces section in the CyberSWITCH documentation for further information.
IPX R
EMOTE LAN
An IPX WAN (Remote LAN) interface can be used to connect remote bridge devices to the other
IPX router network interfaces. The IPX router treats all bridge devices connected to the RLAN as if
they were on an Ethernet LAN segment. A CyberSWITCH emulates an Ethernet medium over the
series of ISDN point to point connections in order to accomplish this. The IPX router encapsulates
IPX data for the RLAN interface in Ethernet packets and forwards the data to the remote bridges.
If the user has NetWare Clients attached to its remote LAN, these clients will assume the IPX
network number assigned to the RLAN interface on the Remote Access Server. If the user has both
NetWare servers and clients attached to its remote LAN, the clients will assume the IPX network
number of the remote NetWare server. An explicit IPX Network Number needs to be configured
for the user so that the same network number is applied to the remote LAN each time the user
connects.
Note: IPX RLAN options are only available if Bridging is enabled and IPX is disabled.
IPX Spoofing on a RLAN Interface
In order to maintain NetWare server connectivity, some IPX packets require spoofing. This
spoofing requires special handling by the IPX RLAN interface. The following rules apply to IPX
spoofing on a RLAN interface.
1. If the destination MAC address is unknown, the packet cannot be spoofed. It will be treated as
a normal packet and forwarded to all connected bridges in the RLAN.
2. If the destination MAC address is known, the configured spoofing parameters are applied to
packets forwarded on the RLAN interface.
3. A MAC address will be known for the configured Special Period after Disconnecting spoofing
parameter.
Note: Refer to the IPX Spoofing section for more information.