Note: If you have a Pipeline 25-Fx with the IPX Routing option (for connecting to NetWare networks), see the help file for IPX Routing.
Usage: Click the Help button at any time to get online help for the settings in the current tab.
This opens a World Wide Browser, such as Netscape Navigator or Internet Explorer, and displays information about the settings.
To close the help display, close the browser as you would any other program. For example, in Windows 95, click the X button at the upper right of the window or choose Exit from the File menu.
With some browsers, a new window will open each time you click the Help button. If this happens, simply close each window when you're done with it.
Finding setting descriptions: At the beginning of each help window is a table of contents for the window. To go information about a particular setting, click the hyperlink (the underlined text in most browsers) for that setting in the contents. To return to the contents, use the control in your browser for going back, such as the Back button in Netscape Navigator or Internet Explorer 3.0.
Update
Description: Sends configuration settings to the Pipeline.
Usage: Click this button to send the settings shown in the Java-Based Pipeline Configurator to the Pipeline.
These new settings replace the previous settings in the Pipeline. You can use this button at any time; you do not have to enter values for all settings before updating the Pipeline.
Save As
Description: Saves configuration settings in a file.
Usage: Click this to save the settings shown in the Java-Based Pipeline Configurator in a file on your computer.
You then use your operating system's facility for specifying a name and location for the file, such as the Save To dialog box in Windows 95.
You can later open a file in which you've saved settings by clicking the Open a Configuration File button in the first window that appears when you run the Java-Based Pipeline Configurator.
You can use this button at any time; you do not have to enter values for all settings before saving settings.
Open Monitor
Description: Opens the Pipeline Monitor, a program for monitoring the status of the Pipeline unit as well as making and disconnecting ISDN connections manually. You can also use it to view the current status of the ISDN line as well as events that occur during Pipeline operation. For more information about the Pipeline Monitor, see Using the Pipeline Monitor.
Usage: Click this to open the Pipeline Monitor.
Usage: Check the box to enable bridging of protocols that are not routed.
Dependencies: Keep this additional information in mind:
Usage: Enter the IP address of the Pipeline on the local Ethernet network.
Example:
10.2.1.1
Usage: Click the up arrow to add bits to the subnet mask. Click the down arrow to take away bits from the subnet mask. The mask and the number of bits in the mask are shown to the right of the arrows.
Dependencies: Keep this additional information in mind:
The address specified with the IP Address setting is used for authentication. In all other respects, the two IP addresses are treated equally.
Specifying a second address doubles the number of entries in the Pipeline routing table. The Pipeline advertises a route from 2nd Address to IP Address and a route from IP Address to 2nd Address.
One use of 2nd Address is to advertise routes that would not otherwise be advertised. For example, suppose both the Pipeline and Router2 have a route to the network 200.0.2.0. Both are on the same subnet. The device with the lower hop count to the destination network sends all the traffic destined for that network. Now, suppose the value of 2nd Address is 200.0.2.9 and the value of Subnet Mask for this address is 28, and the value of 2nd Address for Router2 on the same subnet is 200.0.2.10 and the value of Subnet Mask for this address is also 28. The Pipeline assumes that all subnets in the 200.0.2.0 network have the same subnet mask (28). In addition, the Pipeline has an address for a router at 200.0.2.129 (whose Subnet Mask value is 28) and Router2 has an address for a router at 200.0.2.65 (whose Subnet Mask value is also 28). The Pipeline routes traffic only to the 200.0.2.129/28 subnet and Router2 routes traffic only to the 200.0.2.65/28 subnet. The traffic to the 200.0.2.0 network is thereby shared.
Using the 2nd Address setting also provides an easy way to change the IP address of the Pipeline. When all routers know the Pipeline by both its IP Address value and its 2nd Address value, you can safely turn off 2nd Address and put the new address in IP Address.
Usage: Enter the second IP address for the Pipeline.
Example:
20.2.1.1
Dependencies: Keep this additional information in mind:
Usage: Click the up arrow to add bits to the subnet mask. Click the down arrow to take away bits from the subnet mask. The mask and the number of bits in the mask are shown to the right of the arrows.
Dependencies: Keep this additional information in mind:
Domain Name Service (DNS) is a TCP/IP service that enables you to specify a symbolic name instead of an IP address. A symbolic name consists of a username and a domain name in the format username@domainname. The username corresponds to the host number in the IP address. The domainname corresponds to the network number in the IP address. A symbolic name might be steve@abc.com or joanne@xyz.edu.
DNS maintains a database of network numbers and corresponding domain names on a domain name server. When you use a symbolic name, DNS translates the domain name into an IP address, and sends it over the network. When the Internet service provider receives the message, it uses its own database to look up the username corresponding to the host number.
Usage: Enter the domain name for your Pipeline.
Example: berkeley.cpusa.gov
Primary DNS
Description:
This setting specifies the IP address of the primary domain name server. 200.207.23.1
Secondary DNS
Description:
This setting specifies the IP address of the secondary domain name server.
Domain Name Service (DNS) is a TCP/IP service that enables you to specify a symbolic name instead of an IP address. A symbolic name consists of a username and a domain name in the format username@domainname. The username corresponds to the host number in the IP address. The domainname corresponds to the network number in the IP address. A symbolic name might be steve@abc.com or joanne@xyz.edu.
DNS maintains a database of network numbers and corresponding domain names on a domain name server. When you use a symbolic name, DNS translates the domain name into an IP address, and sends it over the network. When the Internet service provider receives the message, it uses its own database to look up the username corresponding to the host number.
Usage: Enter the IP address of the secondary domain name server.
The address consists of four numbers between 0 and 255, separated by periods. The default value is 0.0.0.0. Accept this default if you do not have a secondary domain name server.
Example:
200.207.23.1
Dependencies: Keep this additional information in mind:
A terminal server is a computing device to which a terminal can connect over a LAN or WAN link. The Pipeline supports all the common capabilities of standard terminal servers, including Telnet, Domain Name Services (DNS), login and password control, call detail reporting, and authentication services.
Telnet is a protocol used to link two computers in order to provide a terminal with a connection to the remote device. The remote device is known as the Telnet host. When you start a Telnet session, you connect to the Telnet host and log in. The connection enables you to work with the remote machine as though you were at a terminal connected to it.
List Attempt
Description: This checkbox controls whether the Domain Name System (DNS) List Attempt feature is enabled.
DNS can return multiple addresses for a hostname in response to a DNS query. Unfortunately, DNS has no information about the availability of those hosts. Users typically attempt to access the first address in the list. If that host is unavailable, the connection fails and the user must initiate a new DNS query or Telnet attempt. If the login attempt occurs automatically as part of Immediate Telnet, the Pipeline tears down the physical connection when the initial connection attempt fails.
The DNS List Attempt feature helps the Pipeline avoid tearing down physical links by enabling the user to try one entry in the DNS list of hosts when logging in through Telnet from the terminal server; if that connection fails, the user can try each succeeding entry.
Usage: Check the checkbox to enable the DNS List Attempt feature.
When DHCP spoofing is enabled, the Pipeline can act as a DHCP server for one IP address. When card-based security is used, the user must interact with the Pipeline to provide the card-based password. This interaction must occur over IP. However, the user doesn't have an IP address yet at the time when the password must be supplied.
To solve this "which came first" problem, the Pipeline supports DHCP spoofing. DHCP spoofing works like this:
Dependencies: For DHCP spoofing to work, you must also provide values for the Spoof Address, Subnet Mask, and Renewal Time settings.
A Pipeline unit returns the following information in its response to a Plug and Play request:
This address is one greater than the IP address of the MAX. For example, if the IP address of the MAX is 200.200.200.100, the IP address of the computer is 200.200.200.101.
This is the same as the subnet mask for the MAX.
This is the IP address of the MAX.
This is the address of the MAX, which serves as a proxy Domain Name Service (DNS) server. This means that DNS requests are sent to the MAX, which forwards them to the domain name servers, if any, on the remote network, receives the results, and then passes the results to the computer.
Dependencies: If Always Spoof is not checked, the Pipeline responds to only the first Plug and Play request from the computer and ignores later requests. If Always Spoof is checked, the Pipeline responds to later requests from the same computer, but not to requests from other computers.
The address must be a valid address on the local network.
Usage: Enter the IP address.
222.65.212.99
Dependencies: For DHCP spoofing to work, you must also provide values for the Enable, Subnet Mask, and Renewal Time settings.
Usage: Enter the number of bits for the subnet mask (a number from 0 to 31). The mask corresponding to this number is shown to the right of the number.
Dependencies: Keep this additional information in mind:
Usage: If checked, the Pipeline advertises itself as the default router in DHCP replies. This is unchecked by default.
Dial If Link Down
Description: The Dial If Link Down setting determines whether the Pipeline dials the first Connection Profile when it receives a request from a DHCP client and the WAN link is down.
Usage: If checked, the Pipeline dials the first Connection Profile if required. This is unchecked by default.
Usage: If checked, the Pipeline responds to multiple DHCP requests from a single host. If unchecked, the Pipeline responds to only the first DHCP request and ignores all subsequent requests. This is unchecked by default.
This value represents the amount of time the address will be assigned to the requesting client. After the specified number of seconds, the client must attempt to secure the IP address again. If an authenticated dial-up session is active, the Pipeline refuses the request, forcing the client to obtain its real IP address from the DHCP server on the remote network.
Usage: Enter a number between 3 and 65535.
60
Dependencies: For DHCP spoofing to work, you must also provide values for the Enable, Spoof Address, and Subnet Mask settings.
Usage: Check the box to make the Pipeline ignore RIP updates to the default route.
ARP Proxy Mode
Description: This setting specifies the conditions in which the Pipeline performs a proxy Address Resolution Protocol (ARP) resolution. The Pipeline serves as a proxy when it recognizes the IP address of a remote device in an ARP request and then responds to the ARP request by sending its own MAC address.
Usage: Choose one of the following:
Disables proxy mode.
Specifies that the Pipeline responds to an ARP request only if a connection to the remote site is up, regardless of whether a Connection Profile exists for the link.
Specifies that the Pipeline responds to an ARP request only for a remote IP address specified in a Connection Profile, and only if there is no connection to the remote site.
Specifies that the Pipeline responds to an ARP request regardless of whether a connection to the remote site is up.
The Pipeline should not accept ICMP Redirect messages if it maintains a routing table, because counterfeit ICMP Redirect messages pose a potential security threat.
The Pipeline should accept ICMP Redirects only when it has a single default route to another device.
Usage: Check the box to cause the Pipeline to accept Internet ICMP Redirect messages.