Bridge Configuration Settings
4-16
1. In the Web Interface, click the
Configure
Configure
Configure
Configure
button and select the
Alarms
Alarms
Alarms
Alarms
tab.
2. Select the
Syslog
Syslog
Syslog
Syslog
sub-tab.
3. Place a checkmark in the box provided to
Enable Syslog
Enable Syslog
Enable Syslog
Enable Syslog.
4. Enter the IP address of the Syslog server.
5. Enter the
Syslog Lowest Priority Logged
Syslog Lowest Priority Logged
Syslog Lowest Priority Logged
Syslog Lowest Priority Logged.
The WL520 will send event messages to the Syslog server that correspond to the
selected priority and below. For example, if set to 6, the WL520 will transmit event messages labeled priority 0 to 6 to the
Syslog server.
6. Click
OK
OK
OK
OK
.
bridge configuration settings
bridge configuration settings
bridge configuration settings
bridge configuration settings
The WL520 device can be set up as a simple bridge between your wired and wireless network devices. As a bridge, the
functions performed by the WL520 device include:
— MAC address learning
— Forward and filtering decision making
— Spanning Tree protocol used for loop avoidance
Figure 4-17
Figure 4-17
Figure 4-17
Figure 4-17 Simple Bridge Setup
Simple Bridge Setup
Simple Bridge Setup
Simple Bridge Setup
mac address learning
mac address learning
mac address learning
mac address learning
Once the WL520 unit is connected to your network, it learns which devices are connected to it by recording the MAC
addresses of each device to which it sends packets during the course of a normal session. To view the Learn Table, click on the
Monitor button in the web interface and select the Learn Table tab. The table can hold up to 10,000 entries.
static mac address filter
static mac address filter
static mac address filter
static mac address filter
The Static MAC Address filter optimizes the performance of a wireless (and wired) network. The filter is an advanced Bridge
setup parameter for WL520 devices that enables you to deny data traffic between two specific devices via the wireless
interface(s) of the WL520 bridge.
For example, to prevent redundant traffic from being transmitted over the wireless network, you could deny traffic between two
particular servers, identified by their MAC Address and their location as perceived by the WL520 (on the ‘wired’ or wireless’
port of the bridge). In most situations, however, it is easier to control redundant traffic via other filtering options, such as
Protocol Filtering.
–
Wired MAC Address
Wired MAC Address
Wired MAC Address
Wired MAC Address
. Enter the device MAC Address.
–
Wired Mask
Wired Mask
Wired Mask
Wired Mask
. Enter the Wired Mask value.
–
Wireless MAC Address
Wireless MAC Address
Wireless MAC Address
Wireless MAC Address
. Enter the device MAC Address.
–
Wireless Mask
Wireless Mask
Wireless Mask
Wireless Mask
. Enter the Wireless Mask value
–
Comment
Comment
Comment
Comment
. Enter related information.