
Chapter 40 Layer 2 Protocol Tunneling
XS3800-28 User’s Guide
280
C
HAPTER
40
Layer 2 Protocol Tunneling
40.1 Layer 2 Protocol Tunneling Overview
This chapter shows you how to configure layer 2 protocol tunneling on the Switch.
40.1.1 What You Can Do
Use the
Layer 2 Protocol Tunneling
) to enable layer 2 protocol
tunneling on the Switch and specify a MAC address with which the Switch uses to encapsulate the layer
2 protocol packets by replacing the destination MAC address in the packets.
40.1.2 What You Need to Know
Layer 2 protocol tunneling (L2PT) is used on the service provider's edge devices.
L2PT allows edge switches (
1
and
2
in the following figure) to tunnel layer 2 STP (Spanning Tree Protocol),
CDP (Cisco Discovery Protocol) and VTP (VLAN Trunking Protocol) packets between customer switches
(
A
,
B
and
C
in the following figure) connected through the service provider’s network. The edge switch
encapsulates layer 2 protocol packets with a specific MAC address before sending them across the
service provider’s network to other edge switches.
Figure 194
Layer 2 Protocol Tunneling Network Scenario
In the following example, if you enable L2PT for STP, you can have switches
A
,
B
,
C
and
D
in the same
Summary of Contents for XS3800-28
Page 29: ...29 PART I User s Guide...
Page 54: ...54 PART II Technical Reference...
Page 88: ...Chapter 4 Web Configurator XS3800 28 User s Guide 88 Figure 51 Online Web Help...
Page 148: ...Chapter 20 Cloud Management XS3800 28 User s Guide 148 Figure 94 SYSTEM Cloud Management...
Page 263: ...Chapter 36 OAM XS3800 28 User s Guide 263 Figure 182 PORT OAM OAM Status OAM Details...
Page 540: ...Chapter 72 VRRP XS3800 28 User s Guide 540 Figure 434 VRRP Example 2 VRRP Status on Switch B...
Page 581: ...Chapter 77 Policy Rule XS3800 28 User s Guide 581 Figure 456 Policy Example...