A SERVICE OF

logo

GS2200-24 User’s Guide
245
CHAPTER 28
Layer 2 Protocol Tunneling
28.1 Overview
This chapter shows you how to configure layer 2 protocol tunneling on the Switch.
Layer 2 protocol tunneling (L2PT) is used on the service provider's edge devices.
28.2 What You Can Do
Use the Layer 2 Protocol Tunnel screen (Section 28.4 on page 247) to enable
layer 2 protocol tunneling on the Switch and specify a MAC address with which the
Switch uses to encapsulate the layer 2 protocol packets by replacing the
destination MAC address in the packets.
28.3 What You Need to Know
Layer 2 protocol tunneling (L2PT) is used on the service provider's edge devices.
L2PT allows edge switches (1 and 2 in the following figure) to tunnel layer 2 STP
(Spanning Tree Protocol), CDP (Cisco Discovery Protocol) and VTP (VLAN Trunking
Protocol) packets between customer switches (A, B and C in the following figure)
connected through the service provider’s network. The edge switch encapsulates