Chapter 28 Layer 2 Protocol Tunneling
MES-3528 User’s Guide
256
Port
This field displays the port number.
*
Use this row to make the setting the same for all ports. Use this row first
and then make adjustments on a port-by-port basis.
Note: Changes in this row are copied to all the ports as soon as you
make them.
CDP
Select this option to have the Switch tunnel CDP (Cisco Discovery
Protocol) packets so that other Cisco devices can be discovered through
the service provider’s network.
STP
Select this option to have the Switch tunnel STP (Spanning Tree Protocol)
packets so that STP can run properly across the service provider’s
network and spanning trees can be set up based on bridge information
from all (local and remote) networks.
VTP
Select this option to have the Switch tunnel VTP (VLAN Trunking Protocol)
packets so that all customer switches can use consistent VLAN
configuration through the service provider’s network.
Point to Point
The Switch supports PAgP (Port Aggregation Protocol), LACP (Link
Aggregation Control Protocol) and UDLD (UniDirectional Link Detection)
tunneling for a point-to-point topology.
Both PAgP and UDLD are Cisco’s proprietary data link layer protocols.
PAgP is similar to LACP and used to set up a logical aggregation of
Ethernet ports automatically. UDLD is to determine the link’s physical
status and detect a unidirectional link.
PAGP
Select this option to have the Switch send PAgP packets to a peer to
automatically negotiate and build a logical port aggregation.
LACP
Select this option to have the Switch send LACP packets to a peer to
dynamically creates and manages trunk groups.
UDLD
Select this option to have the Switch send UDLD packets to a peer’s port
it connected to monitor the physical status of a link.
Mode
Select Access to have the Switch encapsulate the incoming layer 2
protocol packets and forward them to the tunnel port(s). Select Access
for ingress ports at the edge of the service provider's network.
Note: You can enable L2PT services for STP, LACP, VTP, CDP,
UDLD, and PAGP on the access port(s) only.
Select Tunnel for egress ports at the edge of the service provider's
network. The Switch decapsulates the encapsulated layer 2 protocol
packets received on a tunnel port by changing the destination MAC
address to the original one, and then forward them to an access port. If
the service(s) is not enabled on an access port, the protocol packets are
dropped.
Apply
Click Apply to save your changes to the Switch’s run-time memory. The
Switch loses these changes if it is turned off or loses power, so use the
Save link on the top navigation panel to save your changes to the non-
volatile memory when you are done configuring.
Cancel
Click Cancel to begin configuring this screen afresh.
Table 84
Advanced Application > Layer 2 Protocol Tunneling (continued)
LABEL
DESCRIPTION
Summary of Contents for MES-3528 -
Page 2: ......
Page 8: ...Safety Warnings MES 3528 User s Guide 8 ...
Page 22: ...22 ...
Page 32: ...Chapter 2 Hardware Installation and Connection MES 3528 User s Guide 32 ...
Page 42: ...Chapter 3 Hardware Overview MES 3528 User s Guide 42 ...
Page 44: ...44 ...
Page 60: ...Chapter 5 Initial Setup Example MES 3528 User s Guide 60 ...
Page 76: ...Chapter 7 System Status and Port Statistics MES 3528 User s Guide 76 ...
Page 88: ...Chapter 8 Basic Setting MES 3528 User s Guide 88 ...
Page 90: ...90 ...
Page 109: ...Chapter 9 VLAN MES 3528 User s Guide 109 Figure 57 Port Based VLAN Setup Port Isolation ...
Page 114: ...Chapter 10 Static MAC Forward Setup MES 3528 User s Guide 114 ...
Page 146: ...Chapter 14 Bandwidth Control MES 3528 User s Guide 146 ...
Page 160: ...Chapter 17 Link Aggregation MES 3528 User s Guide 160 ...
Page 168: ...Chapter 19 Port Security MES 3528 User s Guide 168 ...
Page 180: ...Chapter 21 Policy Rule MES 3528 User s Guide 180 ...
Page 192: ...Chapter 23 VLAN Stacking MES 3528 User s Guide 192 ...
Page 231: ...Chapter 26 IP Source Guard MES 3528 User s Guide 231 Figure 120 DHCP Snooping ...
Page 248: ...Chapter 26 IP Source Guard MES 3528 User s Guide 248 ...
Page 257: ...257 PART IV IP Application Static Route 259 Differentiated Services 263 DHCP 267 ...
Page 258: ...258 ...
Page 262: ...Chapter 29 Static Route MES 3528 User s Guide 262 ...
Page 274: ...Chapter 31 DHCP MES 3528 User s Guide 274 ...
Page 276: ...276 ...
Page 284: ...Chapter 32 Maintenance MES 3528 User s Guide 284 ...
Page 306: ...Chapter 33 Access Control MES 3528 User s Guide 306 ...
Page 312: ...Chapter 35 Syslog MES 3528 User s Guide 312 ...
Page 320: ...Chapter 36 Cluster Management MES 3528 User s Guide 320 ...
Page 324: ...Chapter 37 MAC Table MES 3528 User s Guide 324 ...
Page 330: ...330 ...
Page 342: ...Chapter 41 Product Specifications MES 3528 User s Guide 342 ...
Page 344: ...344 ...
Page 346: ...Appendix A Changing a Fuse MES 3528 User s Guide 346 ...
Page 354: ...Appendix C Legal Information MES 3528 User s Guide 354 ...
Page 364: ...Index MES 3528 User s Guide 364 ...