Web Management Guide-R02

Table Of Contents
Chapter 5
| VLAN Configuration
L2PT Tunneling
– 181 –
2. Select Configure Interface from the Step list.
3. Set the mode for any tunnel access port to Access and the tunnel uplink port to
Uplink.
4. Click Apply.
Figure 94: Adding an Interface to a QinQ Tunnel
L2PT Tunneling
When Layer 2 Protocol Tunneling (L2PT) is not used, protocol packets (e.g., STP) are
flooded to 802.1Q access ports on the same edge switch, but filtered from 802.1Q
tunnel ports. This creates disconnected protocol domains in the customer’s
network.
L2PT can be used to pass various types of protocol packets belonging to the same
customer transparently across a service providers network. In this way, normally
segregated network segments can be configured to function inside a common
protocol domain.
Command Usage
L2PT encapsulates protocol packets entering ingress ports on the service
provider’s edge switch, replacing the destination MAC address with a
proprietary MAC address (for example, the spanning tree protocol uses 10-12-
CF-00-00-02), a reserved address for other specified protocol types (as defined
in IEEE 802.1ad – Provider Bridges), or a user-defined address. All intermediate
switches carrying this traffic across the service providers network treat these
encapsulated packets in the same way as normal data, forwarding them to the
tunnel’s egress port. The egress port decapsulates these packets, restores the
proper protocol and MAC address information, and then floods them onto the
same VLANs at the customer’s remote site (via all of the appropriate tunnel
ports and access ports
4
connected to the same metro VLAN).
The way in which L2PT processes packets is based on the following criteria
(1) packet is received on a QinQ uplink port, (2) packet is received on a QinQ
4. Access ports in this context are 802.1Q trunk ports.