Solved

Proper setup of wireless bridge

Posted on 2008-10-24
6
1,049 Views
Last Modified: 2013-12-21
There is a total of 9 WAP2000, 7 in one building and 2 in the other. 1-6 are standard wap, 7 is setup to bridge to 8 in building 2. In building 2, 8(bridge) and 9 (wap) are connected to a switch.  When connected to building 1 I can ping 1-7 but not 8 or 9. Now When connected to building 2 I can ping 8 but can't see 1-7. How can I make this work?
0
Comment
Question by:Crossroads305
  • 3
  • 3
6 Comments
 
LVL 44

Expert Comment

by:Darr247
Comment Utility
What IP address does each of the 9 WAPs have, and are they all getting them via DHCP?

Do they all have the same SSID?

Most Linksys wireless routers/APs offer a Wireless Isolation option, but this one has 2 options... isolation between SSIDs and isolation within SSID. Are you using either (or both) of those options?

Did you change any of the 9 units' VLAN ID?
0
 
LVL 1

Author Comment

by:Crossroads305
Comment Utility
The ip address for all 9 are static (no DHCP) with the same SSID that is set to Isolation Between only.

Security mode: WEP
Open system
128 bit encryption

We've set both 7 and 8 as bridge to each other, but can't ping across to each other. Set up two new WAP2000 just like 7 and 8 with different ips. These also can't see each other.
0
 
LVL 44

Expert Comment

by:Darr247
Comment Utility
What IP addresses do 7 and 8 have ?
0
Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

 
LVL 1

Author Comment

by:Crossroads305
Comment Utility
7 - 172.19.40.17
8 - 172.19.40.18
0
 
LVL 1

Author Comment

by:Crossroads305
Comment Utility
Got it working after setting it to "isolation between SSID" only.
0
 
LVL 44

Accepted Solution

by:
Darr247 earned 500 total points
Comment Utility
I see.  In message# 22811831 you said that's how it was already.  No prob.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Wireless in windows vista only connect local 15 73
Problem with WiFi setting on a Fortinet wifi router 5 62
Unifi 17 42
internet passcode 14 52
For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now