About Routable

and Non-

Routable

Network

Protocols

AT-WA7500 and AT-WA7501 Installation and User’s Guide

3.On all other access points on the primary LAN, clear the Enable Ethernet Bridging check box.

4.Make sure that the Root Priority parameter for all other access points is less than the root access point. The range is 1 to 7. The value 1 is the highest priority.

To enable data link tunneling on the secondary LAN

1.Make sure that all access points have the same LAN ID as the ones on the primary LAN.

2.On the designated bridge, on the Spanning Tree Settings screen verify that the Enable Ethernet Bridging check box is checked.

3.On all other access points on the secondary LAN, clear the Enable Ethernet Bridging check box.

4.Make sure that the Secondary LAN Bridge Priority parameter for all other access points is less than the designated bridge.

If you use data link tunneling on the secondary LAN and end devices have IP addresses on the secondary LAN, network monitoring tools and other network components cannot detect their MAC/IP addresses. For more information, see “About IP Tunnels” on page 140.

Hosts that use a routable network protocol such as IP or IPX may be located on any IP subnet; however, triangular routing can be minimized if servers are located on the root IP subnet. (Note that this is also true for standard mobile IP.) You should be able to use default flooding and spanning tree settings if you are using routable protocols, even if hosts are located on remote IP subnets.

135

Page 135
Image 135
Allied Telesis AT-WA7501, AT-WA7500 manual About Routable Non Network Protocols