XGS4700-48F User’s Guide
293
C
H A P T E R
2 9
Layer 2 Protocol Tunneling
This chapter shows you how to configure layer-2 protocol tunneling on the Switch.
29.1 Layer 2 Protocol Tunneling Overview
Layer-2 protocol tunneling (L2PT) is used on the service provider's edge devices.
L2PT allows edge switches (1 and 2 in the following figure) to tunnel layer-2 STP
(Spanning Tree Protocol), CDP (Cisco Discovery Protocol) and VTP (VLAN Trunking
Protocol) packets between customer switches (A, B and C in the following figure)
connected through the service provider’s network. The edge switch encapsulates
layer-2 protocol packets with a specific MAC address before sending them across
the service provider’s network to other edge switches.
Figure 142
Layer-2 Protocol Tunneling Network Scenario
In the following example, if you enable L2PT for STP, you can have switches A, B,
C and D in the same spanning tree, even though switch A is not directly
connected to switches B, C and D. Topology change information can be
propagated throughout the service provider’s network.
To emulate a point-to-point topology between two customer switches at different
sites, such as A and B, you can enable protocol tunneling on edge switches 1 and
1
2
A
C
Service Provider's
Network
STP
CDP
B
VTP
STP
VTP
CDP
Summary of Contents for XGS4700 Series
Page 2: ......
Page 8: ...Safety Warnings XGS4700 48F User s Guide 8...
Page 24: ...Table of Contents XGS4700 48F User s Guide 24...
Page 25: ...25 PART I User s Guide...
Page 26: ...26...
Page 32: ...Chapter 1 Getting to Know Your Switch XGS4700 48F User s Guide 32...
Page 54: ...Chapter 3 Hardware Overview XGS4700 48F User s Guide 54...
Page 97: ...97 PART II Technical Reference...
Page 98: ...98...
Page 104: ...Chapter 7 System Status and Port Statistics XGS4700 48F User s Guide 104...
Page 118: ...Chapter 8 Basic Setting XGS4700 48F User s Guide 118...
Page 138: ...Chapter 9 VLAN XGS4700 48F User s Guide 138...
Page 142: ...Chapter 10 Static MAC Forward Setup XGS4700 48F User s Guide 142...
Page 174: ...Chapter 14 Bandwidth Control XGS4700 48F User s Guide 174...
Page 188: ...Chapter 17 Link Aggregation XGS4700 48F User s Guide 188...
Page 198: ...Chapter 18 Port Authentication XGS4700 48F User s Guide 198...
Page 216: ...Chapter 21 Policy Rule XGS4700 48F User s Guide 216...
Page 260: ...Chapter 25 AAA XGS4700 48F User s Guide 260...
Page 284: ...Chapter 26 IP Source Guard XGS4700 48F User s Guide 284...
Page 316: ...Chapter 32 Error Disable XGS4700 48F User s Guide 316...
Page 320: ...Chapter 33 Static Route XGS4700 48F User s Guide 320...
Page 328: ...Chapter 35 RIP XGS4700 48F User s Guide 328...
Page 384: ...Chapter 42 ARP Learning XGS4700 48F User s Guide 384...
Page 420: ...Chapter 45 Access Control XGS4700 48F User s Guide 420...
Page 426: ...Chapter 47 Syslog XGS4700 48F User s Guide 426...
Page 434: ...Chapter 48 Cluster Management XGS4700 48F User s Guide 434...
Page 438: ...Chapter 49 MAC Table XGS4700 48F User s Guide 438...
Page 442: ...Chapter 50 IP Table XGS4700 48F User s Guide 442...
Page 446: ...Chapter 52 Routing Table XGS4700 48F User s Guide 446...
Page 454: ...Chapter 54 Troubleshooting XGS4700 48F User s Guide 454...
Page 464: ...Chapter 55 Product Specifications XGS4700 48F User s Guide 464...
Page 473: ...Appendix B Legal Information XGS4700 48F User s Guide 473...
Page 474: ...Appendix B Legal Information XGS4700 48F User s Guide 474...