I have been auditing internet security. I have been told by several technical employees that IPX systems are not vulnerable to IP attacks. Does anyone know of situations where this is not true. I have also heard the same about Banyon. Actual ways of accessing IPX would be appreciated, to prove our findings we usually have to demonstrate how the access could be done. Thanks