Using Layer-2 Protocol Tunneling
  • 09 Aug 2024
  • 12 Minutes to read
  • Contributors
  • PDF

Using Layer-2 Protocol Tunneling

  • PDF

Article summary

You can use the Layer-2 Protocol Tunneling function to allow the client’s Layer-2 Control Protocol (L2CP) frames to be transparently transported (or to perform other actions such as dropping and/or forwarding traffic) across an EVC without interfering with the carrier/operator network and equipment.

For example, the protocol tunneling operates by replacing the protocol's specific destination MAC address with a multicast address that is transparently transported by the transit equipment and reinserted in the original destination MAC when the traffic reaches the destination equipment.

Accedian and the MEF do not use the term tunneling to refer to the same concept:

  • For the MEF, tunneling means that frames are transparently passed to a given EVC for transport across the MEN to the destination UNI port(s). This concept is referred to as forwarding within the framework of Accedian’s L2CP terminology.
  • At Accedian, tunneling occurs when the destination MAC is replaced with the wellknown Cisco MAC (or Accedian's equivalent). This concept is not covered by the MEF, and thus no equivalent exists.

The Protocol Tunneling function works with rules to filter traffic being processed. Each incoming frame is tested against each rule in order until it finds a match. When there is a match, the frame is processed according to the mode of operation (Drop, Forwarding, Tunneling or Peering). If there is no match with any rule, the frame is discarded.

In tunneling mode, tags are unconditionally pushed to processed frames, with userconfigurable fields for Ethertype, VLAN tags and PCP/CFI. When the unit is in forwarding mode, you can set it to perform VLAN tagging on the processed frames. In forwarding mode, the following operations are supported:

  • None: frames are forwarded unmodified.
  • Push: frames are forwarded with an extra VLAN tag added. The tag is defined by the VLAN ID, PCP and CFI fields and the Ethernet type is set to the value specified by the VLAN Ethertype field.
  • Pop: frames are forwarded with the VLAN tag stripped. This mode is only available when VLAN Filtering is enabled as tags cannot be removed from non-tagged frames.
  • Replace: frames are forwarded with their VLAN tag replaced. The replacement tag is defined by the VLAN ID, PCP and CFI fields and the Ethernet type is set to the value specified by the VLAN Ethertype field. This mode is only available when VLAN Filtering is enabled as tags cannot be replaced in non-tagged frames.

To view a list of all existing L2PT rules Access the page Traffic ▶L2PT ▶Configuration. For an example of the display, see the figure below. For more information on specific parameters, see "L2PT Configuration (Traffic ▶L2PT ▶Configuration) ".

Traffic ▶L2PT ▶Configuration
1.bmp

To view statistics for all L2PT rules

  1. Access the page Traffic ▶L2PT ▶Statistics.
    Statistics for all rules in the system are displayed in a grid.

For more information on specific parameters, refer to the following table.

Layer-2 Protocol Tunneling Frame Statistics (Traffic ▶L2PT ▶Statistics)

Viewing Statistics for Layer-2 Tunnel Rules

ParameterDescription
NameThe unique name assigned to the rule.
DroppedThe total number of dropped frames by this rule since its creation. This counter is incremented under the following circumstances:
  • The rule is set for drop operation mode and a matching frame was received.
  • The rule is set for tunnel operation mode and a matching frame was received, but there was a VLAN ID mismatch, i.e. the VLAN tags in the frame could not be matched to any of the VLAN groups in the rule's list.
TunneledThe total number of tunneled frames by this rule since its creation. This counter is incremented under the following circumstance:

The rule is set for tunnel operation mode and a matching frame was received on the incoming port and tunneled (had its destination MAC replaced, had the required VLAN tags added and was sent to the outgoing port).

Note: If there are multiple VLAN groups in the VLAN list, this counter is incremented for each frame transmitted on the outgoing port.

De-tunneledThe total number of de-tunneled frames by this rule since its creation. This counter is incremented when the following event occurs:

The rule is set for tunnel operation,and a matching frame was received on the outgoing port then de-tunneled (i.e. restored to its original state and sent to the incoming port).

ForwardedThe total number of frames forwarded by this rule since its creation. This counter is incremented under the following circumstance:

The rule is set for forward operation and a matching frame was received on the incoming port and forwarded, unmodified, to the outgoing port.

PeeredThe total number of frames peered by this rule since its creation. This counter is incremented under the following circumstance:

The rule is set for peer operation and a matching frame was received on the incoming port and sent to the software layers for further processing.

Setting Up a Layer-2 Tunnel

You can define up to 254 Layer-2 Protocol Tunneling (L2PT) rules. L2PT is configurable on a per-port basis, as described below.

L2PT frames are transported transparently if the unit does not have a Tunneling rule for the service. If an L2PT rule with the Operation Mode set to Tunnel has been created, the L2PT frames entering the unit via the rule’s Outgoing Port (using the VID configured in the rule) will be terminated and forwarded for processing as described in the rule. If not, these frames are treated as service traffic.

To specify the ports to which L2PT applies

  1. Access the page Traffic ▶L2PT ▶Configuration.
    The L2PT Configuration page appears. All ports are listed in the Layer-2 Protocol Tunneling Port States frame at the top of the page.

  2. For each port on which you want to enable L2PT, select its corresponding box by clicking it.


    Note: You can select both traffic ports and management ports.

  3. Click Apply.

To add or edit an L2PT rule

  1. Access the page Traffic ▶L2PT ▶Configuration.
    The tunneling rules are displayed in a grid.

  2. Click the Add button to add a new L2PT rule or click the Name of an existing rule to edit its settings.
    The L2PT Configuration page appears.

  3. Complete all required fields, then click Apply.

For more information on specific parameters, refer to the following table.

L2PT Configuration (Traffic ▶L2PT ▶Configuration)

ParameterDescription
Enable L2PT RuleSelect this box to enable the processing of the Layer-2 Control Protocols according to L2PT rules. Use this field to enable or disable a rule without actually deleting it.
Catchall RuleSelect this box to make this L2PT rule a catchall rule.

Catchall rules operate on all frames that were not matched by a specific rule and can be set for either the Forward or Drop operation modes.

L2PT Rule NameThe name assigned to the L2PT rule.
Operation ModeThis parameter controls how the L2PT rule handles traffic associated with the specified protocol. The operation mode you select can be one of the following:
  • Drop: Frames matching the specific rule are dropped.
  • Forward: Frames are sent unaltered from the incoming to the outgoing port. Optionally, EVC mapping can be enabled on forwarding rules (see "Setting Up a Layer-2 Tunnel" below).
  • Tunnel: When received on the specified client port, frames matching the specific rule have their destination MAC address replaced by the MAC address supplied in the rule's parameters. When received on the specified network port, frames matching the specific rule have their original destination MAC address replaced.
  • Peer: The frames are sent to software layers for further processing.
L2PT frames are transported transparently if the unit does not have a Tunneling rule for the service. If an L2PT rule with the Operation Mode set to Tunnel has been created, the L2PT frames entering the unit via the rule’s Outgoing Port (using the VID configured in the rule) will be terminated and forwarded for processing as described in the rule. If not, these frames are treated as service traffic.
ProtocolIndicate the Layer-2 Control Protocol to be processed by a specific rule by making a selection from the drop-down list:
  • STP/RSTP/MSTP
  • LACP
  • LAMP
  • Link OAM 802.3ah
  • Port auth 802.1x
  • E-LMI
  • LLDP 802.lab
  • CDP
  • Cisco BPDU
  • GMRP
  • GVRP
  • ULD
  • PAgP
  • PVST/PVST+
  • VTP
  • DTP
  • STP Uplink Fast
  • Provider Bridge GA
  • Provider Bridge GVRP
  • Cisco CFM
  • Pause
  • ESMC
  • PTP
Replacement MACThe multicast MAC address to use as a replacement when protocol tunneling is performed.

The following replacement MAC addresses can be used:

  • Cisco: A replacement MAC address of 01:00:0C:CD:CD:D0 is used. As this MAC address is unique, it can only be used once per protocol.
  • Accedian: A replacement MAC address of* 01:15:AD:CC:xx:yy* is used. As this replacement MAC address has variable elements, it can be used for multiple rules. The variable elements allow matching to a specific rule when a tunneled frame is received on the network port.
The variables in the MAC addresses are set as follows:
  • xx: The unique ID specified in the configuration (see the Unique ID parameter below). When creating a tunnel between two units, the unique ID is used to match the replacement frames going both ways on the network port. As such, it is important that the matching rules on both end points be assigned the same unique ID.
  • yy: The protocol ID. This value is automatically generated depending on the Layer-2 control protocol handled by the rule.
Incoming PortIndicate which incoming port the rule will use by making a selection in the drop-down list.

The incoming port is considered to be the port where the Layer-2 control protocols will be received.

Outgoing PortIndicate which outgoing port the rule will use by making a selection in the drop-down list.

The outgoing port is considered to be the port where the tunneled frames. Those containing a replacement destination MAC address, will be transmitted.

Unique IDSelect the ID of a rule to use when performing tunneling by making a selection in the drop-down list. This value is used when building the replacement destination MAC address if the Accedian multicast address is used. Note: The same ID value must be used on both sides when performing tunneling between a pair of units.

VLAN Filtering

ParameterDescription
EnableSelect this box to enable the filtering of incoming frames with matching VLAN ID and Ethertype for this L2PT rule.

Only the frames with a VLAN ID and Ethertype matching the ones specified in the VLAN ID range, PCP, CFI and Ethertype are accepted.

EthertypeThe VLAN Ethertype accepted by this specific rule in the inbound Layer-2 Control Protocol frames.
VLAN ID RangeIndicate the VLAN IDs that this specific rule accepts in the inbound Layer-2 Control Protocol frames.

If you want to filter on a single VID, enter the same value in both the From and To fields.

PCPIndicate the Priority Code Point that this rule accepts in the inbound Layer-2 Control Protocol frames by making a selection in the drop-down list.
  • 0–7: For a specific priority
  • All: To accept any PCP value
CFIIndicate the Canonical Format Indicator that this rule accepts in the inbound Layer-2 Control Protocol frames by making a selection in the drop-down list.
  • 0–7: For a specific priority
  • All: To accept any PCP value

EVC Mapping

ParameterDescription
EVC Mapping ModeNote: Only applies to the "Forward" operation mode. Select a mapping mode by making a selection in the dropdown list:
  • None: Frames are forwarded unmodified.
  • Push: Frames are forwarded with an extra VLAN tag added. This tag is defined by the VLAN ID, PCP and CFI fields; the Ethernet type is set to the value specified by the VLAN Ethertype field.
  • Pop: Frames are forwarded with the VLAN tag stripped. This mode is only available when VLAN Filtering is enabled as tags cannot be removed from non-tagged frames.
  • Replace: Frames are forwarded with their VLAN tag replaced. The replacement tag is defined by the VLAN ID, PCP and CFI fields and the Ethernet type is set to the value specified by the VLAN Ethertype field. This mode is only available when VLAN Filtering is enabled as tags cannot be replaced in non-tagged frames.
VLAN EthertypeNote: Only applies to the "Forward" operation mode.

Select the Ethertype of the tag inserted in the forwarded frame by making a selection in the drop-down list.

VLAN 1 EthertypeNote: Only applies to the "Forward" operation mode.

Select the Ethertype of the first tag inserted in the tunneled frame by making a selection in the drop-down list.

VLAN 2 EthertypeNote: Only applies to the "Forward" operation mode.

Select the Ethertype of the second tag inserted in the tunneled frame (for Q-in-Q) by making a selection in the drop-down list.

VLAN ListNote: Only applies to the "Tunnel" operation mode. Indicate the VLAN tags to insert in the tunneled frames.

The syntax is a list of comma-separated groups formatted as vlan1:vlan2. Entry of the second tag (Q-in-Q) is optional. For example, if you wanted to single-tag tunneled frames with VLAN ID 3, and double-tag frames with VLAN IDs 5–6 and 22–88, you would specify: 3, 5:6, 22:88.

The frames are duplicated for each entry in the VLAN list. In the example above, three frames would be transmitted on the network port for each incoming frame matching the rule on the client port.

There should be at least one entry in the list as tunneling untagged frames is currently not supported.

VLAN IDNote: Only applies to the "Forward" operation mode.

The VLAN tags to insert in the forwarded frames when the mode is set to Pop or Replace.

CoS Mapping

ParameterDescription
ModeNote: Only applies to the "Tunnel" operation mode, or to the "Forward" operation mode when the EVC mapping mode is set to "Push".

This field allows you to control the PCP and CFI fields of the forwarding and tunneling rules.

The following operations are supported:

  • Map: The PCP and CFI fields of the processed frame are replaced by the ones specified in the PCP and CFI fields. The Map operation is available when the forwarding mode is set to either Push or Replace and is mandatory when using tunneling mode
  • Preserve: The PCP and CFI fields of the processed frame are copied from the ones in the incoming frame. This mode is only available when the forwarding mode is set to Replace.
PCPIndicate the Priority Code Point (PCP) mapped to the processed frame in CoS Map mode by making a selection in the drop-down list. Range: 0–7.

Note: Only applies to the "Tunnel" operation mode, or to the "Forward" operation mode when the EVC mapping mode is set to "Push".

CFIIndicate the Canonical Format Indicator (CFI) mapped to the processed frame in CoS Map mode by making a selection in the drop-down list.

The CFI is defined by 1 bit in the Ethernet frame.

Note: Only applies to the "Tunnel" operation mode, or to the "Forward" operation mode when the EVC mapping mode is set to "Push".

© 2024 Cisco and/or its affiliates. All rights reserved.
 
For more information about trademarks, please visit: Cisco trademarks
For more information about legal terms, please visit: Cisco legal terms

For legal information about Accedian Skylight products, please visit: Accedian legal terms and tradmarks



Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.