Usage: Click the Help button at any time to get online help for the settings in the current tab.
This opens a World Wide Browser, such as Netscape Navigator or Internet Explorer, and displays information about the settings.
To close the help display, close the browser as you would any other program. For example, in Windows 95, click the X button at the upper right of the window or choose Exit from the File menu.
With some browsers, a new window will open each time you click the Help button. If this happens, simply close each window when you're done with it.
Finding setting descriptions: At the beginning of each help window is a table of contents for the window. To go information about a particular setting, click the hyperlink (the underlined text in most browsers) for that setting in the contents. To return to the contents, use the control in your browser for going back, such as the Back button in Netscape Navigator or Internet Explorer 3.0.
Update
Description: Sends configuration settings to the Pipeline.
Usage: Click this button to send the settings shown in the Java-Based Pipeline Configurator to the Pipeline.
These new settings replace the previous settings in the Pipeline. You can use this button at any time; you do not have to enter values for all settings before updating the Pipeline.
Save As
Description: Saves configuration settings in a file.
Usage: Click this to save the settings shown in the Java-Based Pipeline Configurator in a file on your computer.
You then use your operating system's facility for specifying a name and location for the file, such as the Save To dialog box in Windows 95.
You can later open a file in which you've saved settings by clicking the Open a Configuration File button in the first window that appears when you run the Java-Based Pipeline Configurator.
You can use this button at any time; you do not have to enter values for all settings before saving settings.
Open Monitor
Description: Opens the Pipeline Monitor, a program for monitoring the status of the Pipeline unit as well as making and disconnecting ISDN connections manually. You can also use it to view the current status of the ISDN line as well as events that occur during Pipeline operation. For more information about the Pipeline Monitor, see Using the Pipeline Monitor.
Usage: Click this to open the Pipeline Monitor.
Usage: Check the box to enable bridging of protocols that are not routed.
Dependencies: Keep this additional information in mind:
Usage: Enter the IP address of the Pipeline on the local Ethernet network.
Example:
10.2.1.1
Usage: Click the up arrow to add bits to the subnet mask. Click the down arrow to take away bits from the subnet mask. The mask and the number of bits in the mask are shown to the right of the arrows.
Dependencies: Keep this additional information in mind:
When DHCP spoofing is enabled, the Pipeline can act as a DHCP server for one IP address. When card-based security is used, the user must interact with the Pipeline to provide the card-based password. This interaction must occur over IP. However, the user doesn't have an IP address yet at the time when the password must be supplied.
To solve this "which came first" problem, the Pipeline supports DHCP spoofing. DHCP spoofing works like this:
Dependencies: For DHCP spoofing to work, you must also provide values for the Spoof Address, Subnet Mask, and Renewal Time settings.
A Pipeline unit returns the following information in its response to a Plug and Play request:
This address is one greater than the IP address of the MAX. For example, if the IP address of the MAX is 200.200.200.100, the IP address of the computer is 200.200.200.101.
This is the same as the subnet mask for the MAX.
This is the IP address of the MAX.
This is the address of the MAX, which serves as a proxy Domain Name Service (DNS) server. This means that DNS requests are sent to the MAX, which forwards them to the domain name servers, if any, on the remote network, receives the results, and then passes the results to the computer.
Dependencies: If Always Spoof is not checked, the Pipeline responds to only the first Plug and Play request from the computer and ignores later requests. If Always Spoof is checked, the Pipeline responds to later requests from the same computer, but not to requests from other computers.
The address must be a valid address on the local network.
Usage: Enter the IP address.
222.65.212.99
Dependencies: For DHCP spoofing to work, you must also provide values for the Enable, Subnet Mask, and Renewal Time settings.
Usage: Enter the number of bits for the subnet mask (a number from 0 to 31). The mask corresponding to this number is shown to the right of the number.
Dependencies: Keep this additional information in mind:
Usage: If checked, the Pipeline advertises itself as the default router in DHCP replies. This is unchecked by default.
Dial If Link Down
Description: The Dial If Link Down setting determines whether the Pipeline dials the first Connection Profile when it receives a request from a DHCP client and the WAN link is down.
Usage: If checked, the Pipeline dials the first Connection Profile if required. This is unchecked by default.
Usage: If checked, the Pipeline responds to multiple DHCP requests from a single host. If unchecked, the Pipeline responds to only the first DHCP request and ignores all subsequent requests. This is unchecked by default.
This value represents the amount of time the address will be assigned to the requesting client. After the specified number of seconds, the client must attempt to secure the IP address again. If an authenticated dial-up session is active, the Pipeline refuses the request, forcing the client to obtain its real IP address from the DHCP server on the remote network.
Usage: Enter a number between 3 and 65535.
60
Dependencies: For DHCP spoofing to work, you must also provide values for the Enable, Spoof Address, and Subnet Mask settings.
Dependencies:
Keep this additional information in mind:
When you enter a value for WAN Network Number, the Pipeline advertises a route to this network.
Usage:
Enter an Ethernet network number using an 8-digit (4-byte) hexadecimal value. The default is 00000000.
The number you specify must be unique within your wide area IPX network, and must match the configuration of other routers on the local Ethernet network.
Dependencies: Keep this additional information in mind:
When a Pipeline is used to connect NetWare clients to a very large IPX network, the SAP table created by the Pipeline can become very large and unmanageable. As an alternative, the Pipeline operating in proxy mode discards all SAP broadcasts seen on the network and resolves SAP queries from NetWare clients as it receives them, by forwarding the queries over the WAN link.
SAP proxy mode is recommended when only NetWare clients (not servers) are on the Ethernet side of Pipeline.
If the Pipeline running in SAP proxy mode has NetWare servers on its Ethernet, it stores the relevant SAP entries for those servers and advertises them across the WAN interface as a normal SAP broadcast.
Usage: Choose one of the following
Enables IPX SAP Proxy mode.
Disables IPX SAP Proxy mode.
Usage: Enter an 8-digit hexadecimal IPX network number.
Example:
Dependencies: This setting is dimmed if the IPX SAP Proxy setting is No.
IPX settings
Enable IPX
Description:
This checkbox specifies whether the Pipeline can perform these functions:Leave the box unchecked if your network uses a protocol other than IPX, or if your IPX network maintains such large RIP and SAP tables that the Pipeline is spending too much time maintaining them.
Frame Type
Description:
This setting specifies the Ethernet frame type to use for IPX on the Ethernet interface. If you do not specify an Ethernet frame type, the Pipeline cannot route IPX or perform watchdog spoofing for its IPX clients.
This setting indicates that IPX clients and servers on the local Ethernet network follow the Ethernet II protocol for the MAC header.
This setting indicates that the IPX clients and servers on the local Ethernet cable follow the IEEE 802.2 protocol for the MAC header. The framer contains the LLC (Logical Link Control) header in addition to the MAC (Media Access Control) header.
For NetWare 3.12 or later, select Ethernet 802.2.This setting indicates that IPX clients and servers on the local Ethernet cable follow the IEEE 802.3 protocol for the MAC header, also called Raw 802.3. The frame does not contain the LLC (Logical Link Control) header in addition to the MAC (Media Access Control) header.
For NetWare 3.11 or earlier, select 802.3. This setting indicates that the IPX clients and servers on the local Ethernet network follow the SNAP (SubNetwork Access Protocol) for the MAC header. This specification includes the IEEE 802.3 protocol format plus additional information in the MAC header.
If you choose this setting, the Pipeline can bridge IPX, but without watchdog spoofing or the automatic RIP (Routing Information Protocol) and SAP (Service Advertising Protocol) data filters described in Discard RIP, SAP.
Dependencies: Keep this additional information in mind:
LAN Network Number
Description:
This setting specifies a unique IPX network number for the Ethernet interface. DE040600
WAN Network Number
Description:
This setting specifies a unique IPX network number for all NetWare clients that are running PPP encapsulation and dialing in directly. The Pipeline assigns network addresses to dial-in NetWare clients when they connect to the Pipeline; these addresses are derived from this network number.
Example: FF000003
SAP Proxy settings
IPX SAP Proxy
Description: This setting enables or disables IPX SAP proxy mode in the Pipeline.
Dependencies: Keep the following in mind:
IPX SAP Proxy Network #
Description: This setting specifies the IPX network number of the remote network. The IPX network number must also be specified in an IPX Route profile.A1236B59