XYR301E Wireless Ethernet
User Manual
Page 60
April 2012
To illustrate the redundancy, consider that if Site A needs to send data to Site D it has redundant paths through both B
and C. However, due to the spanning tree protocol only one of B or C will relay the data, with the other taking over in
the event of a failure.
The configuration for Site A and B are shown below. In this example, Site B uses its primary access point to act as an
access point for Virtual Stations on Site A and D, and uses a Virtual Station to act as a client to Site C. Site A uses two
Virtual Stations to act as clients to Site B and to Site C.
Site B configuration – Network Page configured as Primary Access Point
Site B WDS configuration - Repeaters Page configured with Virtual Station to Site C
Site A WDS configuration - Repeaters Page configured with two Virtual Clients to Sites B & C.
Encryption levels and key above are shows as being different however they can be the same as in some of the earlier
examples. One reason why the Encryption level and key would be different is because the Access Point may have
clients that communicate using a different Encryption method e.g. 128 bit WEP and may not support the same
Encryption method.
LAN
LAN
Access Point
192.168.0.2
SSID = SSID_A
STP =
√
,
Priority = 1
Access Point
192.168.0.5
SSID = SSID_D
STP =
√
,
Priority = 3
Access Point
192.168.0.3
SSID = SSID_B
STP =
√
,
Priority = 2
Virtual Station
SSID = SSID_C
Virtual Station
SSID = SSID_C
WDS
Bridg
e
WD
S B
ridg
e
WD
S B
ridg
e
WDS
Bridg
e
Site A
Site B
Site D
Access Point
192.168.0.4
SSID = SSID_C
STP =
√
,
Priority = 2
Site C
Redundant
Networks
Virtual Station
SSID = SSID_B
Virtual Station
SSID = SSID_C
Virtual Station
SSID = SSID_B
Virtual AP
Virtual Station
Summary of Contents for XYR301E
Page 2: ...Page ii April 2012 ...
Page 18: ......