
Chapter 21
| VLAN Commands
Configuring L2PT Tunneling
– 582 –
■
other access ports for which L2PT is enabled after decapsulating the
packet and restoring the proper protocol and MAC address
information.
■
all uplink ports.
◆
When a Cisco-compatible L2PT packet is received on an access port, and
■
recognized as a CDP/VTP/STP/PVST+ protocol packet, and
■
L2PT is enabled on this port, it is forwarded to the following ports in the
same S-VLAN: (a) other access ports for which L2PT is enabled, and
(b) uplink ports after rewriting the destination address to make it a
GBPT protocol packet (i.e., setting the destination address to 01-00-0C-
CD-CD-D0).
■
L2PT is disabled on this port, it is forwarded to the following ports in
the same S-VLAN: (a) other access ports for which L2PT is disabled, and
(b) all uplink ports.
■
recognized as a GBPT protocol packet (i.e., having the destination address
01-00-0C-CD-CD-D0), and
■
L2PT is enabled on this port, it is forwarded to other access ports in the
same S-VLAN for which L2PT is enabled
■
L2PT is disabled on this port, it is forwarded to the following ports in
the same S-VLAN: (a) other access ports for which L2PT is disabled, and
(b) all uplink ports.
◆
For L2PT to function properly, QinQ must be enabled on the switch using the
dot1q-tunnel system-tunnel-control
command, and the interface configured to
802.1Q tunnel mode using the
command.
Example
Console(config)#dot1q-tunnel system-tunnel-control
Console(config)#l2protocol-tunnel tunnel-dmac 01-80-C2-00-00-01
Console(config-)#
switchport
l2protocol-tunnel
This command enables Layer 2 Protocol Tunneling (L2PT) for the specified protocol.
Use the
no
form to disable L2PT for the specified protocol.
Syntax
switchport l2protocol-tunnel
{
cdp
|
lldp
|
pvst+
|
spanning-tree
|
vtp
}
cdp
- Cisco Discovery Protocol
lldp
- Link Layer Discovery Protocol
pvst+
- Cisco Per VLAN Spanning Tree Plus
spanning-tree
- Spanning Tree (STP, RSTP, MSTP)
Summary of Contents for ECS4120-28F
Page 36: ...Contents 36...
Page 38: ...Figures 38...
Page 46: ...Section I Getting Started 46...
Page 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Page 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Page 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 216: ...Chapter 7 Flow Sampling Commands 216...
Page 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Page 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Page 384: ...Chapter 10 Access Control Lists ACL Information 384...
Page 424: ...Chapter 11 Interface Commands Power Savings 424...
Page 446: ...Chapter 13 Power over Ethernet Commands 446...
Page 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Page 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Page 494: ...Chapter 18 Address Table Commands 494...
Page 554: ...Chapter 20 ERPS Commands 554...
Page 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Page 638: ...Chapter 23 Quality of Service Commands 638...
Page 772: ...Chapter 25 LLDP Commands 772...
Page 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Page 836: ...Chapter 28 Domain Name Service Commands 836...
Page 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Page 902: ...Section III Appendices 902...
Page 916: ...Glossary 916...
Page 926: ...CLI Commands 926...
Page 937: ......
Page 938: ...E092017 CS R02...