Solved

Minimizing  Appletalk

Posted on 2001-08-07
5
347 Views
Last Modified: 2013-11-13
Currently I have 150 systems on my network.40 of those systems are Macintosh. I am trying to find a solution to segment the appletalk protocol and still have the Macintoshs be able to access files and print from my NT/2000 servers.
I have already tried ExtremeZ-ip and dave client but they still fail at minimizing appletalk on the network.

What avalible solutions does anyone have that I can try?

I have 5 NT\2000 servers the macs access.



Thx


0
Comment
Question by:chadoz
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 63

Expert Comment

by:SysExpert
ID: 6361839
I would add a second NIC on your server and have it dedicated for appletalk only.

I hope this helps !
0
 
LVL 1

Expert Comment

by:krytical
ID: 6362370
chadoz,

Are these MACs on the same network segment now, and your just trying to limit its damage on network performance? If so, would a small router be in the budget to put in the path between the Macs and the rest of the network? This would increase the network proformance, since the constant broadcasts given by Appletalk would be stopped at the router, but of course still allow the Macs to communicate with the rest of the network. Just an idea...
0
 
LVL 4

Expert Comment

by:jwalsh88
ID: 6362432
It sounds like you only want the appletalk protocol on one segment , but you want that segment able to talk with another segment using TCP/IP?  If that's right , the only way I know how is with a router.  It will route the TCP/IP packets but not the Appletalk.  Any device you need will have to be layer 3 so it will need a router.  ofcourse, you could use a server as the router.  It will only route the TCP/IP traffic, I don't recommend that, but if money is very tight then you really have no choice.
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 9017198
chadoz,
No comment has been added lately (719 days), so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area for this question:

RECOMMENDATION: PAQ/No Refund

Please leave any comments here within 7 days.

-- Please DO NOT accept this comment as an answer ! --

Thanks,

lrmoore
EE Cleanup Volunteer
0
 

Accepted Solution

by:
YensidMod earned 0 total points
ID: 9114872
Question is PAQ'd and no points refunded.

YensidMod
Community Support Moderator @Experts Exchange
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question