beautypg.com

About routable and non- routable network protocols, About routable and non-routable network protocols – Allied Telesis AT-WA7501 User Manual

Page 135

background image

AT-WA7500 and AT-WA7501 Installation and User’s Guide

135

3. On all other access points on the primary LAN, clear the Enable

Ethernet Bridging check box.

4. Make sure that the Root Priority parameter for all other access points

is less than the root access point. The range is 1 to 7. The value 1 is
the highest priority.

To enable data link tunneling on the secondary LAN

1. Make sure that all access points have the same LAN ID as the ones on

the primary LAN.

2. On the designated bridge, on the Spanning Tree Settings screen verify

that the Enable Ethernet Bridging check box is checked.

3. On all other access points on the secondary LAN, clear the Enable

Ethernet Bridging check box.

4. Make sure that the Secondary LAN Bridge Priority parameter for all

other access points is less than the designated bridge.

If you use data link tunneling on the secondary LAN and end devices have
IP addresses on the secondary LAN, network monitoring tools and other
network components cannot detect their MAC/IP addresses. For more
information, see “About IP Tunnels” on page 140.

About Routable

and Non-

Routable

Network

Protocols

Hosts that use a routable network protocol such as IP or IPX may be
located on any IP subnet; however, triangular routing can be minimized if
servers are located on the root IP subnet. (Note that this is also true for
standard mobile IP.) You should be able to use default flooding and
spanning tree settings if you are using routable protocols, even if hosts are
located on remote IP subnets.

This manual is related to the following products: