
C
HAPTER
40
| VLAN Commands
Configuring L2CP Tunneling
– 1361 –
◆
L2PT can be used to pass various types of protocol packets belonging to
the same customer transparently across a service provider’s network.
In this way, normally segregated network segments can be configured
to function inside a common protocol domain.
◆
L2PT encapsulates protocol packets entering ingress ports on the
service provider’s edge switch, replacing the destination MAC address
with a proprietary MAC address (for example, the spanning tree
protocol uses 10-12-CF-00-00-02), a reserved address for other
specified protocol types (as defined in IEEE 802.1ad – Provider
Bridges), or a user-defined address. All intermediate switches carrying
this traffic across the service provider’s network treat these
encapsulated packets in the same way as normal data, forwarding
them across to the tunnel’s egress port. The egress port decapsulates
these packets, restores the proper protocol and MAC address
information, and then floods them onto the same VLANs at the
customer’s remote site (via all of the appropriate tunnel ports and
access ports
27
connected to the same metro VLAN).
◆
The way in which L2PT processes packets is based on the following
criteria – (1) packet is received on a QinQ uplink port, (2) packet is
received on a QinQ access port, or (3) received packet is Cisco-
compatible L2PT (i.e., as indicated by a proprietary MAC address).
Processing protocol packets defined in IEEE 802.1ad – Provider Bridges
◆
When an IEEE 802.1ad protocol packet is received on an uplink port
(i.e., an 802.1Q tunnel ingress port connecting the edge switch to the
service provider network)
■
with the destination address 01-80-C2-00-00-00,0B~0F (C-VLAN
tag), it is forwarded to all QinQ uplink ports and QinQ access ports
in the same S-VLAN for which L2PT is enabled for that protocol.
■
with the destination address 01-80-C2-00-00-01~0A (S-VLAN tag),
it is filtered, decapsulated, and processed locally by the switch if the
protocol is supported.
◆
When a protocol packet is received on an access port (i.e., an 802.1Q
trunk port connecting the edge switch to the local customer network)
■
with the destination address 01-80-C2-00-00-00,0B~0F (C-VLAN),
and
■
L2PT is enabled on the port, the frame is forwarded to all QinQ
uplink ports and QinQ access ports on which L2PT is enabled for
that protocol in the same S-VLAN.
■
L2PT is disabled on the port, the frame is decapsulated and
processed locally by the switch if the protocol is supported.
27. Access ports in this context are 802.1Q trunk ports.
Содержание ECS4660-28F
Страница 1: ...Management Guide www edge core com ECS4660 28F Layer 3 Gigabit Ethernet Switch...
Страница 2: ......
Страница 4: ......
Страница 12: ...ABOUT THIS GUIDE 12...
Страница 64: ...CONTENTS 64...
Страница 90: ...TABLES 90...
Страница 92: ...SECTION I Getting Started 92...
Страница 122: ...SECTION II Web Configuration 122 Multicast Routing on page 825...
Страница 148: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 148...
Страница 224: ...CHAPTER 5 Interface Configuration VLAN Trunking 224 Figure 68 Configuring VLAN Trunking...
Страница 262: ...CHAPTER 6 VLAN Configuration Configuring VLAN Translation 262...
Страница 304: ...CHAPTER 9 Congestion Control Automatic Traffic Control 304...
Страница 340: ...CHAPTER 11 Quality of Service Attaching a Policy Map to a Port 340...
Страница 452: ...CHAPTER 13 Security Measures DHCP Snooping 452...
Страница 740: ...CHAPTER 17 IP Services Configuring the PPPoE Intermediate Agent 740...
Страница 866: ...CHAPTER 21 Multicast Routing Configuring PIMv6 for IPv6 866...
Страница 882: ...CHAPTER 22 Using the Command Line Interface CLI Command Groups 882...
Страница 1024: ...CHAPTER 26 Remote Monitoring Commands 1024...
Страница 1030: ...CHAPTER 27 Flow Sampling Commands 1030...
Страница 1088: ...CHAPTER 28 Authentication Commands PPPoE Intermediate Agent 1088...
Страница 1162: ...CHAPTER 29 General Security Measures Configuring Port based Traffic Segmentation 1162...
Страница 1186: ...CHAPTER 30 Access Control Lists ACL Information 1186...
Страница 1214: ...CHAPTER 31 Interface Commands Transceiver Threshold Configuration 1214...
Страница 1238: ...CHAPTER 33 Port Mirroring Commands RSPAN Mirroring Commands 1238...
Страница 1258: ...CHAPTER 34 Congestion Control Commands Automatic Traffic Control Commands 1258...
Страница 1270: ...CHAPTER 36 UniDirectional Link Detection Commands 1270...
Страница 1276: ...CHAPTER 37 Address Table Commands 1276...
Страница 1336: ...CHAPTER 39 ERPS Commands 1336...
Страница 1386: ...CHAPTER 40 VLAN Commands Configuring Voice VLANs 1386...
Страница 1406: ...CHAPTER 41 Class of Service Commands Priority Commands Layer 3 and 4 1406...
Страница 1424: ...CHAPTER 42 Quality of Service Commands 1424...
Страница 1536: ...CHAPTER 43 Multicast Filtering Commands MLD Proxy Routing 1536...
Страница 1602: ...CHAPTER 45 CFM Commands Delay Measure Operations 1602...
Страница 1624: ...CHAPTER 47 Domain Name Service Commands 1624...
Страница 1646: ...CHAPTER 48 DHCP Commands DHCP Server 1646...
Страница 1974: ...SECTION IV Appendices 1974...
Страница 1980: ...APPENDIX A Software Specifications Management Information Bases 1980...
Страница 2020: ...ECS4660 28F E102013 ST R03 149100000140A...