L a ye r 2 Pro to c o l T unne ling
32.1 L a ye r 2 Pro to c o l T unne ling O ve rvie w
This chapter shows you how to configure layer 2 protocol tunneling on the Switch.
32.1.1 Wha t Yo u C a n Do
Use the
L a ye r 2 Pro to c o l T unne l
on the Switch and specify a MAC address with which the Switch uses to encapsulate the layer 2
protocol packets by replacing the destination MAC address in the packets.
32.1.2 Wha t Yo u Ne e d to Kno w
Layer 2 protocol tunneling (L2PT) is used on the service provider's edge devices.
L2PT allows edge switches (
CDP (Cisco Discovery Protocol) and VTP (VLAN Trunking Protocol) packets between customer switches
(
,
and
A
B
C
encapsulates layer 2 protocol packets with a specific MAC address before sending them across the
service provider's network to other edge switches.
Fig ure 268
In the following example, if you enable L2PT for STP, you can have switches
Chapter 32 Layer 2 Protocol Tunneling
screen
and
in the following figure) to tunnel layer 2 STP (Spanning Tree Protocol),
1
2
in the following figure) connected through the service provider's network. The edge switch
Layer 2 Protocol Tunneling Network Scenario
XS3800-28 User's Guide
C
HA PTER
(Section 32.2 on page
351) to enable layer 2 protocol tunneling
350
3 2
,
,
and
in the same
A
B
C
D