In a warehouse location I have installed 16 Linksys WAP54GPE/WAP200E access points. All these access points are connected to a 2960 switch. Due to the roaming issues with Linksys APs all the ports on 2960 used by APs are in protected port mode.
Mobile devices (Intermec CK31 mobile computers) work good in this situation.
But the customer also has wireless printer (Intermec PF4i) in his environment. I have noticed the following issues with the printer:
1. Printer is switched on, it connects to the AP (WPA-PSK encryption is used, static IP is assigned to the printer).
2. Printer is pinged from the remote server and from a laptop which is directly connected to the same AP.
3. If the printer is not used for more than 10 minutes (nobody prints for 10 minutes) then it can not be pinged from the remote server anymore. However, I can ping and print to the printer from my laptop connected directly to the same AP at any time.
4. If the printer is constantly pinged from the remote server than everything is OK, the printer is always available.
Kindly advise if protected port mode affects this situation and what can be done in order to fix the situation.
I solved the problem by enabling DHCP address on the wireless printer (instead of static IP), started DHCP server in the printers subnet, made a reservation of needed IP to the printers MAC address and setup IP address renewal in the subnet for every 5 minutes.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...