No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


AR500, AR510, and AR530 V200R007 CLI-based Configuration Guide - Ethernet Switching

This document describes the configuration of Ethernet services, including configuring transparent bridge, MAC table, link aggregation, VLANs, STP/RSTP/MSTP, and so on.The document provides the configuration procedures and configuration examples to illustrate the service configuration methods and application scenario.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).


This section describes the principles of Layer 2 protocol transparent transmission.

As shown in Figure 14-2, each PE interface connects to a user network, and all user networks do not belong to the same LAN. PEs need to distinguish from which user network Layer 2 protocol packets come from. Layer 2 protocol packets of a user network of LAN-A must be sent to the other user networks of LAN-A. In addition, Layer 2 protocol packets cannot be processed by PEs on the ISP network.

Figure 14-2  Networking Layer 2 protocol transparent transmission

Layer 2 protocol packets need to be transparently transmitted on the backbone network. The following requirements must be met:

  • All branches of a user network can receive Layer 2 protocol packets from other branches.

  • Layer 2 protocol packets of a user network cannot be processed by the CPU of devices on the ISP network.

  • Layer 2 protocol packets of different user networks must be isolated and do not affect each other.

You can configure Layer 2 protocol transparent transmission to meet the preceding requirements.
  1. PE1 on the backbone network receives Layer 2 protocol packets from user networks. PE1 replaces the standard multicast destination MAC address of Layer 2 protocol packets with a specified multicast MAC address according to the mappings between multicast destination MAC addresses and Layer 2 protocols.

  2. Internal nodes on the backbone network forward the packets across the backbone network as common Layer 2 packets.

  3. The egress device PE2 of the backbone network restores the original destination MAC address of the packets according to the mappings between multicast destination MAC addresses and Layer 2 protocols, and then forwards the packets to user networks.

Updated: 2019-05-25

Document ID: EDOC1000097279

Views: 20533

Downloads: 64

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next