LAN Access and MAN Access
-
About This Document
-
-
MAC Configuration
-
Each workstation or server connected to an Ethernet interface on a device has a unique Media Access Control (MAC) address. The MAC address table on this device contains the MAC addresses of all these workstations and servers. The MAC address table is used for data forwarding.
-
Ethernet Interface Configuration
-
Ethernet has become the most important local area network (LAN) networking technology because it is flexible, simple, and easy to implement.
-
Eth-Trunk Interface Configuration
-
An Eth-Trunk interface can perform load balancing among member links, which increases the interface bandwidth and improves reliability.
-
GVRP Configuration
-
-
Layer 2 Protocol Tunneling Configuration
-
Layer 2 protocol tunneling ensures transparent transmission of private Layer 2 PDUs over a public network. To prevent a backbone network edge device from sending the received Layer 2 protocol data units (PDUs) to its CPU for processing and ensure that the Layer 2 PDUs are tunneled across the backbone network, configure the edge device to replace the multicast destination MAC address in Layer 2 PDUs with a specified multicast MAC address.
-
VLAN Configuration
-
Virtual local area networks (VLANs) have advantages of broadcast domain isolation, security improvement, flexible networking, and good extensibility.
-
QinQ Configuration
-
802.1Q-in-802.1Q (QinQ) is a technology that addresses the shortage of public VLAN ID resources. This technology applies to a number of services in metropolitan area network (MAN) implementation.
-
EVC Configuration
-
Ethernet virtual connection (EVC) provides uniform Ethernet service and configuration models, simplifies configuration and management, improves operation and maintenance efficiency, and increases expansibility of service access.
-
ERPS (G.8032) Configuration
-
Ethernet Ring Protection Switching (ERPS) is a standard protocol issued by the ITU-T to prevent loops on ring networks. It meets carrier-class reliability requirements for network convergence. All ERPS-capable devices on a ring network can communicate.
-
MAC Flapping-based Loop Detection Configuration
-
MAC flapping-based loop detection is a method for detecting Ethernet loops based on the frequency of MAC address entry flapping.
-
STP and RSTP Configuration
-
The Spanning Tree Protocol (STP) trims a ring network into a loop-free tree network. It prevents replication and circular propagation of packets, provides multiple redundant paths for Virtual LAN (VLAN) data traffic, and enables load balancing. The Rapid Spanning Tree Protocol (RSTP) develops rapid convergence and introduces the edge port and its protection function based on STP.
-
MSTP Configuration
-
The Multiple Spanning Tree Protocol (MSTP) trims a ring network into a loop-free tree network. It prevents replication and circular propagation of packets, provides multiple redundant paths for Virtual LAN (VLAN) data traffic, and enables load balancing.
-
RRPP Configuration
-
The Rapid Ring Protection Protocol (RRPP) features fast convergence, because the convergence time is irrelevant to the number of the nodes on the ring.
-
BPDU Tunnel Configuration
-
Bridge protocol data units (BPDUs) are used to transmit information for the spanning tree calculation on user networks. The path along which BPDUs are transparently transmitted over a carrier network is known as a Layer 2 protocol tunnel or a BPDU tunnel.
-
VXLAN Configuration
-
This section describes how to configure VXLAN on devices, without any controller.