Quote:
My limited understanding of them is that they can be used as routers and/or bridges in our application they're used as a bridge.

If they are configured as bridges then a computer at site A would typically use the same IP network and netmask ask computers at site B. Is that so?
_________________________
Jim


'Tis the exceptional fellow who lies awake at night thinking of his successes.