MES-3528 User’s Guide
253
C
H A P T E R
2 8
Layer 2 Protocol Tunneling
This chapter shows you how to configure layer 2 protocol tunneling on the Switch.
28.1 Layer 2 Protocol Tunneling Overview
Layer 2 protocol tunneling (L2PT) is used on the service provider's edge devices.
L2PT allows edge switches (1 and 2 in the following figure) to tunnel layer 2 STP
(Spanning Tree Protocol), CDP (Cisco Discovery Protocol) and VTP (VLAN Trunking
Protocol) packets between customer switches (A, B and C in the following figure)
connected through the service provider’s network. The edge switch encapsulates
layer 2 protocol packets with a specific MAC address before sending them across
the service provider’s network to other edge switches.
Figure 135
Layer 2 Protocol Tunneling Network Scenario
In the following example, if you enable L2PT for STP, you can have switches A, B,
C and D in the same spanning tree, even though switch A is not directly
connected to switches B, C and D. Topology change information can be
propagated throughout the service provider’s network.
To emulate a point-to-point topology between two customer switches at different
sites, such as A and B, you can enable protocol tunneling on edge switches 1 and
1
2
A
C
Service Provider's
Network
STP
CDP
B
VTP
STP
VTP
CDP
Summary of Contents for MES-3528 -
Page 2: ......
Page 8: ...Safety Warnings MES 3528 User s Guide 8 ...
Page 22: ...22 ...
Page 32: ...Chapter 2 Hardware Installation and Connection MES 3528 User s Guide 32 ...
Page 42: ...Chapter 3 Hardware Overview MES 3528 User s Guide 42 ...
Page 44: ...44 ...
Page 60: ...Chapter 5 Initial Setup Example MES 3528 User s Guide 60 ...
Page 76: ...Chapter 7 System Status and Port Statistics MES 3528 User s Guide 76 ...
Page 88: ...Chapter 8 Basic Setting MES 3528 User s Guide 88 ...
Page 90: ...90 ...
Page 109: ...Chapter 9 VLAN MES 3528 User s Guide 109 Figure 57 Port Based VLAN Setup Port Isolation ...
Page 114: ...Chapter 10 Static MAC Forward Setup MES 3528 User s Guide 114 ...
Page 146: ...Chapter 14 Bandwidth Control MES 3528 User s Guide 146 ...
Page 160: ...Chapter 17 Link Aggregation MES 3528 User s Guide 160 ...
Page 168: ...Chapter 19 Port Security MES 3528 User s Guide 168 ...
Page 180: ...Chapter 21 Policy Rule MES 3528 User s Guide 180 ...
Page 192: ...Chapter 23 VLAN Stacking MES 3528 User s Guide 192 ...
Page 231: ...Chapter 26 IP Source Guard MES 3528 User s Guide 231 Figure 120 DHCP Snooping ...
Page 248: ...Chapter 26 IP Source Guard MES 3528 User s Guide 248 ...
Page 257: ...257 PART IV IP Application Static Route 259 Differentiated Services 263 DHCP 267 ...
Page 258: ...258 ...
Page 262: ...Chapter 29 Static Route MES 3528 User s Guide 262 ...
Page 274: ...Chapter 31 DHCP MES 3528 User s Guide 274 ...
Page 276: ...276 ...
Page 284: ...Chapter 32 Maintenance MES 3528 User s Guide 284 ...
Page 306: ...Chapter 33 Access Control MES 3528 User s Guide 306 ...
Page 312: ...Chapter 35 Syslog MES 3528 User s Guide 312 ...
Page 320: ...Chapter 36 Cluster Management MES 3528 User s Guide 320 ...
Page 324: ...Chapter 37 MAC Table MES 3528 User s Guide 324 ...
Page 330: ...330 ...
Page 342: ...Chapter 41 Product Specifications MES 3528 User s Guide 342 ...
Page 344: ...344 ...
Page 346: ...Appendix A Changing a Fuse MES 3528 User s Guide 346 ...
Page 354: ...Appendix C Legal Information MES 3528 User s Guide 354 ...
Page 364: ...Index MES 3528 User s Guide 364 ...