30-15
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
Chapter 30 Configuring 802.1Q Tunneling, VLAN Mapping, and Layer 2 Protocol Tunneling
Configuring Layer 2 Protocol Tunneling
Configuring Layer 2 Protocol Tunneling
You can enable Layer 2 protocol tunneling (by protocol) on access ports, tunnel ports, or trunk ports that
are connected to the customer in the edge switches of the service provider network. The service provider
edge switches connected to the customer switch perform the tunneling process. Edge-switch tunnel ports
or normal trunk ports can be connected to customer 802.1Q trunk ports. Edge-switch access ports are
connected to customer access ports.
When the Layer 2 PDUs that entered the service provider inbound edge switch through the tunnel port
or the access port exit through its the trunk port into the service provider network, the switch overwrites
the customer PDU-destination MAC address with a well-known Cisco proprietary multicast address
(01-00-0c-cd-cd-d0). If 802.1Q tunneling is enabled, packets are also double-tagged; the outer tag is the
customer metro tag, and the inner tag is the customer’s VLAN tag. The core switches ignore the inner
tags and forward the packet to all trunk ports in the same metro VLAN. The edge switches on the
outbound side restore the proper Layer 2 protocol and MAC address information and forward the packets
to all tunnel or access ports in the same metro VLAN. This section includes these topics. The Layer 2
PDUs remain intact and are delivered across the service provider network to the other side of the
customer network.
shows Customer A and Customer B in access VLANs 30 and 40. Asymmetric links connect
the Customers in Site 1 to edge switches in the service provider network. The Layer 2 PDUs (for
example, BPDUs) coming into Switch 2 from Customer B in Site 1 are forwarded to the infrastructure
as double-tagged packets with the well-known MAC address as the destination MAC address. These
double-tagged packets have the metro VLAN tag of 40, as well as an inner VLAN tag (for example,
VLAN 100). When the double-tagged packets enter Switch 4, the metro VLAN tag 40 is removed. The
well-known MAC address is replaced with the respective Layer 2 protocol MAC address, and the packet
is sent to Customer B on Site 2 as a single-tagged frame in VLAN 100.
You can also enable Layer 2 protocol tunneling on access ports on the edge switch connected to access
ports on the customer switch. The encapsulation and de-encapsulation process is the same as described
in the previous paragraph, except that the packets are not double-tagged in the service provider network.
The single tag is the customer-specific access VLAN tag.
In an SP (service-provider) network, you can use Layer 2 protocol tunneling to enhance the creation of
EtherChannels by emulating a point-to-point network topology. When you enable protocol tunneling
(PAgP or LACP) on the SP switch, remote customer switches receive the PDUs and can negotiate the
automatic creation of EtherChannels.
For example, in the following figure (Layer 2 Protocol Tunneling for EtherChannels), Customer A has
two switches in the same VLAN that are connected through the SP network. When the network tunnels
PDUs, switches on the far ends of the network can negotiate the automatic creation of EtherChannels
without needing dedicated lines.
Содержание Catalyst 4500 Series
Страница 2: ......
Страница 4: ......
Страница 2086: ...Index IN 46 Software Configuration Guide Release IOS XE 3 9 0E and IOS 15 2 5 E ...