Layer 2 Protocol Tunneling; L A Ye R 2 Pro To C O L T Unne Ling; Layer 2 Protocol Tunneling Overview; What You Can Do - ZyXEL Communications XS3800-28 User Manual

28-port 10gbe l3 managed switch
Hide thumbs Also See for XS3800-28:
Table of Contents

Advertisement

L a ye r 2 Pro to c o l T unne ling

32.1 L a ye r 2 Pro to c o l T unne ling O ve rvie w
This chapter shows you how to configure layer 2 protocol tunneling on the Switch.
32.1.1 Wha t Yo u C a n Do
Use the
L a ye r 2 Pro to c o l T unne l
on the Switch and specify a MAC address with which the Switch uses to encapsulate the layer 2
protocol packets by replacing the destination MAC address in the packets.
32.1.2 Wha t Yo u Ne e d to Kno w
Layer 2 protocol tunneling (L2PT) is used on the service provider's edge devices.
L2PT allows edge switches (
CDP (Cisco Discovery Protocol) and VTP (VLAN Trunking Protocol) packets between customer switches
(
,
and
A
B
C
encapsulates layer 2 protocol packets with a specific MAC address before sending them across the
service provider's network to other edge switches.
Fig ure 268
In the following example, if you enable L2PT for STP, you can have switches
Chapter 32 Layer 2 Protocol Tunneling
screen
and
in the following figure) to tunnel layer 2 STP (Spanning Tree Protocol),
1
2
in the following figure) connected through the service provider's network. The edge switch
Layer 2 Protocol Tunneling Network Scenario
XS3800-28 User's Guide
C
HA PTER
(Section 32.2 on page
351) to enable layer 2 protocol tunneling
350
3 2
,
,
and
in the same
A
B
C
D

Advertisement

Table of Contents
loading

Table of Contents