EasyManua.ls Logo

ZyXEL Communications XS1930 Series - Layer 2 Protocol Tunneling; Layer 2 Protocol Tunneling Overview; What You Can Do; What You Need to Know

ZyXEL Communications XS1930 Series
381 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
XS1930 Series User’s Guide
214
CHAPTER 27
Layer 2 Protocol Tunneling
27.1 Layer 2 Protocol Tunneling Overview
This chapter shows you how to configure layer 2 protocol tunneling on the Switch.
27.1.1 What You Can Do
Use the Layer 2 Protocol Tunnel screen (Section 27.2 on page 215) to enable layer 2 protocol tunneling
on the Switch and specify a MAC address with which the Switch uses to encapsulate the layer 2
protocol packets by replacing the destination MAC address in the packets.
27.1.2 What You Need to Know
Layer 2 protocol tunneling (L2PT) is used on the service provider's edge devices.
L2PT allows edge switches (1 and 2 in the following figure) to tunnel layer 2 STP (Spanning Tree Protocol),
CDP (Cisco Discovery Protocol) and VTP (VLAN Trunking Protocol) packets between customer switches
(A, B and C in the following figure) connected through the service provider’s network. The edge switch
encapsulates layer 2 protocol packets with a specific MAC address before sending them across the
service provider’s network to other edge switches.
Figure 152 Layer 2 Protocol Tunneling Network Scenario
In the following example, if you enable L2PT for STP, you can have switches A, B, C and D in the same
spanning tree, even though switch A is not directly connected to switches B, C and D. Topology change
information can be propagated throughout the service provider’s network.

Table of Contents

Related product manuals