User guide

Chapter 2. Planning for Router Configuration 33
IPX Routing Network Protocol
¥ System Names and Authentication Passwords
For the Target Router
This information is defined by the user. You must choose a name and authentication password for the
target router. They are used by a remote router to authenticate the target router.
For the Remote Site(s)
This information is obtained from the Network Service Provider. For each remote site, you must have the
site name and its authentication password. They are used by this target router to authenticate the remote
end. The name and password are used in both PAP and CHAP authentication. Refer to the diagrams
under General Security Authentication, on page 17 to see how this information is used.
Note 1: A sample configuration containing names and passwords is provided in the section Sample
Configurations, on page 59.
Note 2: If the ISP does not support the authentication of the ISP system by the caller, use the command
remote disauthen <remoteName> to disable the authentication.
¥ VPI and VCI Numbers
Your router may have been preconfigured with VPI/VCI numbers. If not, you will have to obtain these
numbers from your Network Service Provider and then configure them.
If you are connecting to multiple remote sites, you will need to obtain additional VPI and VCI numbers
from your Network Service Provider and/or Network Access Provider. These numbers identify the
remote destination and must, therefore, be unique for each remote.
¥ DLCI (for Frame-Relay Routers)
The DLCI number applies to Frame-Relay routers only. Your Network Service Provider or your
Network Access Provider will provide you with a Data Link Connection Identifier (DLCI). The DLCI is
an address identifying your connection.
¥ IPX Routing Entries
These numbers are defined by the Network Administrator. You will need to obtain the following
information (most likely from your network administrator) for IPX Routing.
Note: IPX routes define a path to a specific destination. They are primarily needed by the routers to
allow the servers and clients to exchange packets. A path to a file server will be based on the Internal
Network Number of the server. A path to a client will be based on the External Network Number
(Ethernet) of the client.