Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Configuring Layer 2 Protocol Tunneling

    Layer 2 protocol tunneling (L2PT) allows you to send Layer 2 protocol data units (PDUs) across a service provider network and deliver them to switches at a remote location. This feature is useful when you have a network that includes remote sites that are connected across a service provider network and you want to run Layer 2 protocols on switches connected across the service provider network.

    Note: This task uses Junos OS with support for the Enhanced Layer 2 Software (ELS) configuration style.

    L2PT processing is done by the CPU, and L2PT traffic to the CPU is rate-limited to a maximum of 1000 pps. If traffic is received at a rate faster than this limit, the rate limit causes the traffic to be dropped before it hits the threshold and the dropped packets are not reported in L2PT statistics. This can also occur if you configure a drop threshold that is less than 1000 pps but traffic is received at a faster rate. For example, if you configure a drop threshold of 900 pps and the VLAN receives traffic at rate of 1100 pps, L2PT statistics will show that 100 packets were dropped. The 100 packets dropped because of the rate limit will not be reported. Similarly, if you do not configure a drop threshold and the VLAN receives traffic at rate of 1100 pps, the 100 packets dropped because of the rate limit are not reported.

    Note: If the switch receives untagged Layer 2 control PDUs to be tunneled, then you must configure the switch to map untagged (native) packets to an L2PT-enabled VLAN. Otherwise, the untagged Layer 2 control PDU packets are discarded. .

    To configure Layer 2 protocol tunneling:

    1. Enable MAC address rewriting for Layer 2 protocol tunneling:
      [edit]
      user@host# edit protocols layer2-control mac-rewrite
    2. Configure the Layer 2 protocol tunnel interface:
      [edit ... protocols layer2-control mac-rewrite]
      user@host# edit interface interface-name
    3. Configure the Layer 2 protocol to be tunneled:
      [edit protocols layer2-control mac-rewrite interface interface-name]
      user@host# set protocol (cdp | stp | vtp)
    4. Verify the configuration:

      user@host# show protocols
      layer2-control {mac-rewrite {interface ginterface-name {protocol (cdp | stp | vtp);}}}

    Modified: 2016-12-16