Chapter 28 Layer 2 Protocol Tunneling
GS1920v2 Series User’s Guide
262
C
HA PTER
2 8
La ye r 2 Pro to c o l Tunne ling
28.1 La ye r 2 Pro to c o l Tunne ling O ve rvie w
This chapter shows you how to configure layer 2 protocol tunneling on the Switch.
28.1.1 Wha t Yo u C a n Do
Use the
La ye r 2 Pro to c o l Tunne l
screen (
Section 28.2 on page 263
) to enable layer 2 protocol tunneling
on the Switch and specify a MAC address with which the Switch uses to encapsulate the layer 2
protocol packets by replacing the destination MAC address in the packets.
28.1.2 Wha t Yo u Ne e d to Kno w
Layer 2 protocol tunneling (L2PT) is used on the service provider's edge devices.
L2PT allows edge switches (
1
and
2
in the following figure) to tunnel layer 2 STP (Spanning Tree Protocol),
CDP (Cisco Discovery Protocol) and VTP (VLAN Trunking Protocol) packets between customer switches
(
A
,
B
and
C
in the following figure) connected through the service provider’s network. The edge switch
encapsulates layer 2 protocol packets with a specific MAC address before sending them across the
service provider’s network to other edge switches.
Fig ure 189
Layer 2 Protocol Tunneling Network Scenario
In the following example, if you enable L2PT for STP, you can have switches
A
,
B
,
C
and
D
in the same
spanning tree, even though switch
A
is not directly connected to switches
B
,
C
and
D
. Topology change
information can be propagated throughout the service provider’s network.
Содержание GS1920-48HPv2
Страница 19: ...19 PA RT I Use r s Guide...
Страница 43: ...43 PA RT II T e c hnic al Re fe re nc e...
Страница 124: ...Chapter 9 VLAN GS1920v2 Series User s Guide 124 Figure 97 Advanced Application VLAN Port Based VLAN Setup Port Isolation...
Страница 155: ...Chapter 13 Spanning Tree Protocol GS1920v2 Series User s Guide 155 Figure 118 MSTP and Legacy RSTP Network Example...
Страница 193: ...GS1920v2 Series User s Guide 193 Figure 140 Classifier Example...
Страница 224: ...Chapter 24 Multicast GS1920v2 Series User s Guide 224 Figure 162 MVR Group Configuration Example 2 EXAMPLE...
Страница 367: ...Chapter 40 Access Control GS1920v2 Series User s Guide 367 Figure 271 Example Lock Denoting a Secure Connection EXAMPLE...
Страница 388: ...Chapter 48 Configure Clone GS1920v2 Series User s Guide 388 Figure 284 Management Configure Clone...