I have been installing Cisco wireless for some years and recently started to get involved with LAN related switches so a steep learning curve and I have just installed a wired and wireless network in a warehouse that had no LAN so to connect it back to the main LAN I have used a root and non-root wireless bridge. The new LAN has a new SFE2000 switch with access points connected (plus a couple of repeaters) to it along with 2 wireless non-root access points (for resilience) that in turn conect to an existing SB Pro ESW520 switch on the main site LAN via 2 Root access points.
I'm getting started and have run into a problem already! The diagram below outlines the topology and essentially i get the following error generated by the small business pro ESW520 switch when the wireless bridge forms:
Warning %2SWPORT-W-LOCKPORTACTIVE: A packet with source MAC 50:57:a8:ea:4c:02 tried to access through port e8 which is locked.
The MAC address listed belongs to 192.168.6.232 on of the Non-Root access points.
The ESW520 switch is also showing the Root access point connected to port e8 as a "root" which i believe should not be the case?
I suspect the design is fundamentally flawed so would appreciate any pointers such as whether the non-root and or Root access points should be connected to the "G" Uplink ports or whether there is a configuration mismatch between the 2 switches somewhere?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...