No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

ME60 V800R010C10SPC500 Configuration Guide - LAN Access and MAN Access 01

This is ME60 V800R010C10SPC500 Configuration Guide - LAN Access and MAN Access
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Overview of Layer 2 Protocol Tunneling

Overview of Layer 2 Protocol Tunneling

Layer 2 protocol tunneling allows Layer 2 devices to use Layer 2 tunneling technology to transparently transmit Layer 2 protocol data units (PDUs) across a backbone network. Layer 2 protocol tunneling supports standard protocols, such as Spanning Tree Protocol (STP) and Link Aggregation Control Protocol (LACP), as well as user-defined protocols.

Layer 2 protocols running between user networks, such as Spanning Tree Protocol (STP) and Link Aggregation Control Protocol (LACP), must traverse a backbone network to perform Layer 2 protocol calculation.

On the network shown in Figure 1, User Network 1 and User Network 2 both run a Layer 2 protocol, Multiple Spanning Tree Protocol (MSTP). Layer 2 protocol data units (PDUs) on User Network 1 must traverse a backbone network to reach User Network 2 to build a spanning tree. Generally, the destination MAC addresses in Layer 2 PDUs of the same Layer 2 protocol are the same. For example, the MSTP PDUs are BPDUs with the destination MAC address 0180-C200-0000. Therefore, when a Layer 2 PDU reaches an edge device on a backbone network, the edge device cannot identify whether the PDU comes from a user network or the backbone network and sends the PDU to the CPU to calculate a spanning tree.

In Figure 1, CE1 on User Network 1 builds a spanning tree together with PE1 but not with CE2 on User Network 2. As a result, the Layer 2 PDUs on User Network 1 cannot traverse the backbone network to reach User Network 2.

Figure 6-1 Layer 2 protocol tunneling over a backbone network

To resolve the preceding problem, use Layer 2 protocol tunneling. The ME60 supports tunneling for the following Layer 2 protocols:

  • Cisco Discovery Protocol (CDP)
  • Ethernet Local Management Interface (E-LMI)
  • Ethernet in the First Mile OAM (EOAM3AH)
  • Device link detection protocol (DLDP)
  • Dynamic Trunking Protocol (DTP)
  • Ethernet in the First Mile (EFM)
  • GARP Multicast Registration Protocol (GMRP)
  • GARP VLAN Registration Protocol (GVRP)
  • Huawei Group Management Protocol (HGMP)
  • Link Aggregation Control Protocol (LACP)
  • Link Layer Discovery Protocol (LLDP)
  • Multiple MAC Registration Protocol (MMRP)
  • Multiple VLAN Registration Protocol (MVRP)
  • Port Aggregation Protocol (PAgP)
  • Per VLAN Spanning Tree Plus (PVST+)
  • Secure Socket Tunneling Protocol (SSTP)
  • Spanning Tree Protocol (STP)
  • Unidirectional Link Detection (UDLD)
  • VLAN Trunking Protocol (VTP)
  • 802.1X
Layer 2 PDUs can be tunneled across a backbone network if all of the following conditions are met:
  • All sites of a user network can receive Layer 2 PDUs from one another.

  • Layer 2 PDUs of a user network are not processed by the CPUs of backbone network devices.

  • Layer 2 PDUs of different user networks must be isolated and not affect each other.

Layer 2 protocol tunneling allows Layer 2 protocol data units (PDUs) to be transparently transmitted based on the following principles:
  • When Layer 2 PDUs enter a backbone network,

    1. The ingress device replaces the multicast destination MAC address in the Layer 2 PDUs with a specified multicast MAC address so that it does not send the Layer 2 PDUs to its CPU for processing.

      NOTE:

      The specified multicast MAC address cannot be a multicast MAC address used by well-known protocols.

    2. The ingress device then determines whether to add an outer VLAN tag to the Layer 2 PDUs with a specified multicast MAC address based on the configured Layer 2 protocol tunneling type.
  • When Layer 2 PDUs leave the backbone network,

    1. The egress device restores the original multicast destination MAC address in the Layer 2 PDUs based on the configured mapping between the multicast destination MAC address and the specified multicast MAC address.
    2. The egress device then determines whether to remove the outer VLAN tag from the Layer 2 PDUs with the original multicast destination MAC address based on the configured Layer 2 protocol tunneling type.
Translation
Download
Updated: 2019-01-04

Document ID: EDOC1100059440

Views: 26562

Downloads: 18

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next