You’re right, I don’t understand this setup, to me, it’s a blatant violation of KISS. I’m at a loss to explain how these parallel bridges create any advantage, and even the consultant who helped design the network scratched his head when I asked, giving a vague “well, how else are you going to connect two access points to the switch?” The original installer and the original operator are unavailable for comments.
And no, there aren’t any major problems, it just looks like a very delicate balancing job… an accident waiting to happen, especially considering that STP is not being used at the switch or on any MT unit. From what I’ve been told, the network has DOSed itself on more than one occassion. Imagine what would happen if just one bridge loop sets up with 80+ units sending out discovery packets. The activity lights on the switch go bonkers, the mac-servers don’t respond, and even the neighbor viewer (for windows) takes so many discovery packets, it actually flickers.
As for the switch configuration, it’s pretty straight forward, just a single VLAN (with customer VLANs allowed). I really don’t even know why they used such high-end switches in most of these locations… any 802.1q aware un-managed switch would have sufficed.
If it was a management interface, I still couldn’t see using 2 ethernet interfaces… I would bridge ether1/wlan1/wlan2, create a vlan on the bridge for the management interface. This isn’t the case.
If it was a bonded interface, I’d bridge bond1/wlan1/wlan2, and go from there. This isn’t the case either.
Maybe the original idea was redundancy.. but if you lose ether1, there goes your power. What good is ether2 doing for you?
I really am trying to keep an open mind about this, but any way I look at this thing, I just can’t see what the original intent was.