118
C
HAPTER
8: VLAN-VPN C
ONFIGURATION
Adjusting the TPID
Values of VLAN-VPN
Packet
Tag protocol identifier (TPID) is a portion of the VLAN tag field. IEEE 802.1Q specifies
the value of TPID to be 0x8100.
Figure 30 illustrates the structure of the Tag field of an Ethernet frame defined by IEEE
802.1Q.
Figure 30
The structure of the Tag field of an Ethernet frame
As for S5600 series switches, the value of the TPID field is 0x8100, which is defined by
IEEE 802.1Q. Other vendors use other TPID values (such as 0x9100 or 0x9200) in the
outer tags of VLAN-VPN packets.
To be compatible with devices coming from other vendors, S5600 series switches can
adjust the TPID values of VLAN-VPN packets. You can configure TPID value for ports
connecting to the public networks to enable these ports to forward received packets
after replacing the TPID values carried in the outer VLAN tags of the received packets
with the user-defined TPID value, through which the VLAN-VPN packets sent to public
networks can be recognized by devices of other vendors.
VLAN-VPN
Configuration
This section contains configuration information for VLAN-VPN.
Configuration
Prerequisites
■
GARP VLAN registration protocol (GVRP), GARP multicast registration protocol
(GMRP), expandable resilient networking (XRN), neighbor topology discovery
protocol (NTDP), spanning tree protocol (STP) and 802.1x protocol are disabled on
the port.
■
The port is not a VLAN-VPN uplink port.
CAUTION: By default, STP and NTDP are enabled on a device. You can disable
these two protocols using the stp disable and undo ntdp enable commands.
Configuration procedure
Table 106
Configure the VLAN-VPN function for a port
Operation
Command
Description
Enter system view
system-view
-
Enter Ethernet port view
interface
interface-type
interface-number
-
Enable the VLAN-VPN
function
vlan-vpn enable
Required
By default, the VLAN-VPN function is disabled
on a port.The VLAN-VPN function is applicable
to access ports only.
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...