Bpdu Tunneling Configuration (Available Only On The A3100 V2; Introduction To Bpdu Tunneling; Background - HP A3100-8 v2 SI Configuration Manual

A3100 v2 switch series layer 2 - lan switching
Hide thumbs Also See for A3100-8 v2 SI:
Table of Contents

Advertisement

BPDU tunneling configuration (available only
on the A3100 v2 EI)

Introduction to BPDU tunneling

As a Layer 2 tunneling technology, BPDU tunneling enables Layer 2 protocol packets from
geographically dispersed customer networks to be transparently transmitted over specific tunnels across
a service provider network.

Background

Customers usually use dedicated lines in a service provider network to build their own Layer 2 networks.
As a result, often a customer network consists of parts located at different sides of the service provider
network. As shown in
VLAN 100. User A's network is divided into network 1 and network 2, which are connected by the
service provider network. When Layer 2 protocol packets cannot be transparently transmitted in the
service provider network, User A's network cannot implement independent Layer 2 protocol calculation
(for example, STP spanning tree calculation). The Layer 2 protocol calculation in User A's network is
mixed with that in the service provider network.
Figure 24 BPDU tunneling application scenario
BPDU tunneling addresses this problem. With BPDU tunneling, Layer 2 protocol packets from customer
networks can be transparently transmitted in the service provider network, as follows:
After receiving a Layer 2 protocol packet from User A network 1, PE 1 in the service provider
1.
network encapsulates the packet, replaces its destination MAC address with a specific multicast
MAC address, and then forwards the packet in the service provider network.
The encapsulated Layer 2 protocol packet (called bridge protocol data unit, BPDU for short) is
2.
forwarded to PE 2 at the other end of the service provider network, which de-encapsulates the
packet, restores the original destination MAC address of the packet, and then sends the packet to
User A network 2.
Figure
24, the devices for User A are CE 1 and CE 2, both of which belong to
87

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the A3100-8 v2 SI and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents

Save PDF