beautypg.com

About routable and non- routable network protocols, About routable and non-routable network protocols – Allied Telesis AT-WA7500 User Manual

Page 112

background image

5 - Configuring the Spanning Tree

112

To enable data link tunneling, disable Ethernet bridging. When an access
point receives data from an end device, it encapsulates the data into an
OWL data frame. This frame is then forwarded via the Ethernet port to
the next access point on the path and so on until the frame reaches the
root access point or designated bridge. The root access point or
designated bridge unencapsulates the frame and forwards it to the host.
When the root access point or designated bridge receives data on the
Ethernet network for an end device, it reverses this process.

Unless you need to use data link tunneling, Allied Telesyn recommends
that you enable Ethernet bridging on all access points. Data link
tunneling increases network traffic.

To enable data link tunneling on the primary LAN

1. Make sure that all access points have the same LAN ID.

2. On the root access point, on the Spanning Tree Settings screen verify

that the Enable Ethernet Bridging box is checked.

3. On all other access points on the primary LAN, clear the Enable

Ethernet Bridging box.

4. Make sure that the Root Priority parameter for all other access points

is less than the root access point.

To enable data link tunneling on the secondary LAN

1. Make sure that all access points have the same LAN ID as the ones on

the primary LAN.

2. On the designated bridge, on the Spanning Tree Settings screen

verify that the Enable Ethernet Bridging box is checked.

3. On all other access points on the secondary LAN, clear the Enable

Ethernet Bridging box.

4. Make sure that the Secondary LAN Bridge Priority parameter for all

other access points is less than the designated bridge.

If you use data link tunneling on the secondary LAN and end devices
have IP addresses on the secondary LAN, network monitoring tools and
other network components cannot detect their MAC/IP addresses. For
more information, see About IP Tunnels on page 116.

About Routable

and Non-

Routable

Network

Protocols

Hosts that use a routable network protocol such as IP or IPX may be
located on any IP subnet; however, triangular routing can be minimized
if servers are located on the root IP subnet. (Note that this is also true for
standard mobile IP.) You should be able to use default flooding and
spanning tree settings if you are using routable protocols, even if hosts
are located on remote IP subnets.