1
Configuring L2PT
About L2PT
Layer 2 Protocol Tunneling (L2PT) can transparently send Layer 2 protocol packets from
geographically dispersed customer networks across a service provider network or drop them.
L2PT application scenario
Dedicated lines are used in a service provider network to build user-specific Layer 2 networks. As a
result, a customer network contains sites located at different sides of the service provider network.
As shown in
, Customer A's network is divided into network 1 and network 2, which are
connected by the service provider network. For Customer A's network to implement Layer 2
protocol calculations, the Layer 2 protocol packets must be transmitted across the service provider
network.
Upon receiving a Layer 2 protocol packet, the PEs cannot determine whether the packet is from the
customer network or the service provider network. They must deliver the packet to the CPU for
processing. In this case, the Layer 2 protocol calculation in Customer A's network is mixed with the
Layer 2 protocol calculation in the service provider network. Neither the customer network nor the
service provider network can implement independent Layer 2 protocol calculations.
Figure 1 L2PT application scenario
L2PT is introduced to resolve the problem. L2PT provides the following functions:
•
Multicasts Layer 2 protocol packets from a customer network in a VLAN. Dispersed customer
networks can complete an independent Layer 2 protocol calculation, which is transparent to
the service provider network.
•
Isolates Layer 2 protocol packets from different customer networks through different VLANs.
Supported protocols
H3C devices support L2PT for the following protocols:
•
CDP.
•
DLDP.
•
EOAM.
•
GVRP.
•
LACP.
ISP network
Customer A
network 1
VLAN 100
Customer A
network 2
VLAN 100
CE 1
CE 2
PE 1
PE 2
Summary of Contents for S6850 Series
Page 108: ...48 WGE1 0 3 32768 49153 50100 0x7b 0001 0001 0001 ACDEF...
Page 259: ...21 6 N A 200 6...
Page 337: ...ii...