Layer 2 Protocol Tunneling; Layer 2 Protocol Tunneling Overview; What You Can Do; What You Need To Know - ZyXEL Communications XS1930-12HP User Manual

Hide thumbs Also See for XS1930-12HP:
Table of Contents

Advertisement

Layer 2 Protocol Tunneling

27.1 Layer 2 Protocol Tunneling Overview

This chapter shows you how to configure layer 2 protocol tunneling on the Switch.

27.1.1 What You Can Do

Use the Layer 2 Protocol Tunnel screen
on the Switch and specify a MAC address with which the Switch uses to encapsulate the layer 2
protocol packets by replacing the destination MAC address in the packets.

27.1.2 What You Need to Know

Layer 2 protocol tunneling (L2PT) is used on the service provider's edge devices.
L2PT allows edge switches (1 and 2 in the following figure) to tunnel layer 2 STP (Spanning Tree Protocol),
CDP (Cisco Discovery Protocol) and VTP (VLAN Trunking Protocol) packets between customer switches
(A, B and C in the following figure) connected through the service provider's network. The edge switch
encapsulates layer 2 protocol packets with a specific MAC address before sending them across the
service provider's network to other edge switches.
Figure 152 Layer 2 Protocol Tunneling Network Scenario
In the following example, if you enable L2PT for STP, you can have switches A, B, C and D in the same
spanning tree, even though switch A is not directly connected to switches B, C and D. Topology change
information can be propagated throughout the service provider's network.
C
(Section 27.2 on page
XS1930 Series User's Guide
214
H A P T E R
215) to enable layer 2 protocol tunneling
27

Advertisement

Table of Contents
loading

Table of Contents