Understanding Layer 2 Protocol Tunneling - Cisco Catalyst 3560-X Software Configuration Manual

Hide thumbs Also See for Catalyst 3560-X:
Table of Contents

Advertisement

Understanding Layer 2 Protocol Tunneling

Understanding Layer 2 Protocol Tunneling
Customers at different sites connected across a service-provider network need to use various Layer 2
protocols to scale their topologies to include all remote sites, as well as the local sites. STP must run
properly, and every VLAN should build a proper spanning tree that includes the local site and all remote
sites across the service-provider network. Cisco Discovery Protocol (CDP) must discover neighboring
Cisco devices from local and remote sites. VLAN Trunking Protocol (VTP) must provide consistent
VLAN configuration throughout all sites in the customer network.
When protocol tunneling is enabled, edge switches on the inbound side of the service-provider network
encapsulate Layer 2 protocol packets with a special MAC address and send them across the
service-provider network. Core switches in the network do not process these packets but forward them
as normal packets. Layer 2 protocol data units (PDUs) for CDP, STP, or VTP cross the service-provider
network and are delivered to customer switches on the outbound side of the service-provider network.
Identical packets are received by all customer ports on the same VLANs with these results:
To provide interoperability with third-party vendors, you can use the Layer 2 protocol-tunnel bypass
Note
feature. Bypass mode transparently forwards control PDUs to vendor switches that have different ways
of controlling protocol tunneling. You implement bypass mode by enabling Layer 2 protocol tunneling
on the egress trunk port. When Layer 2 protocol tunneling is enabled on the trunk port, the encapsulated
tunnel MAC address is removed and the protocol packets have their normal MAC address.
Layer 2 protocol tunneling can be used independently or can enhance IEEE 802.1Q tunneling. If protocol
tunneling is not enabled on IEEE 802.1Q tunneling ports, remote switches at the receiving end of the
service-provider network do not receive the PDUs and cannot properly run STP, CDP, and VTP. When
protocol tunneling is enabled, Layer 2 protocols within each customer's network are totally separate
from those running within the service-provider network. Customer switches on different sites that send
traffic through the service-provider network with IEEE 802.1Q tunneling achieve complete knowledge
of the customer's VLAN. If IEEE 802.1Q tunneling is not used, you can still enable Layer 2 protocol
tunneling by connecting to the customer switch through access ports and by enabling tunneling on the
service-provider access port.
For example, in
the service-provider network. If the network does not tunnel PDUs, switches on the far ends of the
network cannot properly run STP, CDP, and VTP. For example, STP for a VLAN on a switch in Customer
X, Site 1, will build a spanning tree on the switches at that site without considering convergence
parameters based on Customer X's switch in Site 2. This could result in the topology shown in
Figure
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
1-8
Users on each of a customer's sites can properly run STP, and every VLAN can build a correct
spanning tree based on parameters from all sites and not just from the local site.
CDP discovers and shows information about the other Cisco devices connected through the
service-provider network.
VTP provides consistent VLAN configuration throughout the customer network, propagating to all
switches through the service provider.
Figure
1-4, Customer X has four switches in the same VLAN, that are connected through
1-5.
Chapter 1
Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling
OL-25303-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3750-x

Table of Contents