Enabling Layer 2 Protocol Tunneling on ACX Series
To enable L2PT, include the mac-rewrite statement at the [edit protocols layer2-control]
hierarchy level.
For configuring MAC address rewriting for Layer 2 protocol tunneling, the following
guidelines apply:
•
You can enable Layer 2 protocol tunneling for untagged interfaces.
•
You can enable Layer 2 protocol tunneling for single VLAN tagged ports. If a logical
port is tagged, then native VLAN ID must be configured to enable Layer 2 protocol
tunneling on that logical port.
NOTE: Native VLAN ID value set to 0 is not supported.
You cannot enable Layer 2 protocol tunneling for double identifier tagged interfaces.
Related
Documentation
Layer 2 Protocol Tunneling on ACX Series Overview on page 437•
• Configuring a Layer 2 Protocol Tunnel Interface in ACX Series on page 439
• Configuring a Layer 2 Protocol to be Tunneled in ACX Series on page 440
• Configuring Layer 2 Protocol Tunneling on ACX Series on page 441
• Checking for a MAC Rewrite Error Condition Blocking Layer 2 Interface in ACX Series
on page 442
• Clearing a MAC Rewrite Error Condition Blocking a Spanning-Tree Instance Interface
in ACX Series on page 442
Configuring a Layer 2 Protocol Tunnel Interface in ACX Series
To configure the interface where Layer 2 protocol tunneling is enabled, include the
interface ge-fpc/pic/port statement at the [edit protocols layer2-control] hierarchy level.
Keep the following guidelines in mind when configuring Layer 2 protocol tunneling:
•
Layer 2 protocol tunneling must be configured on the interfaces at each end of the
tunnel.
•
You can enable Layer 2 protocol tunneling for untagged interfaces and single VLAN
tagged interfaces only.
•
For single VLAN tagged interfaces, configure a logical interface with the native VLAN
identifier. This configuration associates the untagged control packets with a logical
interface.
•
You cannot enable Layer 2 protocol tunneling for double identifier tagged interfaces.
439Copyright © 2017, Juniper Networks, Inc.
Chapter 13: Configuring Layer 2 Protocol Tunneling