Inner VLAN Tag Priority Replication Configuration
119
The VLAN-VPN function is unavailable if the port has any of the protocols among
GVRP, GMRP, XRN, NTDP, STP and 802.1x enabled.
Inner VLAN Tag
Priority Replication
Configuration
You can configure to replicate the tag priority of the inner VLAN tag of a VLAN-VPN
packet to the outer VLAN tag to remain the original tag priority after the packet is
inserted an outer VLAN tag.
Configuration
Prerequisites
The VLAN-VPN function is enabled.
Configuration procedure
TPID Adjusting
Configuration
This Section describes how to configure TPID Adjusting.
Configuration
Prerequisites
Before you configure a VLAN-VPN uplink port, make sure that:
■
The VLAN-VPN function is not enabled.
Configuration Procedure
Display VLAN VPN
configuration information
about all ports
display port vlan-vpn
You can execute the display command in any
view.
Table 106
Configure the VLAN-VPN function for a port (continued)
Operation
Command
Description
Table 107 Configure to replicate the tag priority of the inner VLAN tag
Operation
Command
Description
Enter system view
system-view
-
Enter Ethernet port view
interface
interface-type
interface-number
-
Enable the inner VLAN
Tag priority replication
function
vlan-vpn
inner-cos-trust
enable
Required
By default, the inner VLAN tag priority
replicating function is disabled. And the priority
of a outer VLAN tag is that of the default priority
of the current port.
Display the VLAN-VPN
configuration information
about all ports
display port
vlan-vpn
You can execute the display command in any
view.
Table 108
Adjust TPID values for VLAN-VPN packets
Operation
Command
Description
Enter system view
system-view
-
Enter Ethernet port view
interface
interface-type
interface-number
-
Set a TPID value for the port vlan-vpn tpid value
Required
Do not set the TPID value to a value that
conflicts with known protocol type values.
Set the port to be a
VLAN-VPN uplink port
vlan-vpn uplink
enable
Optional
By default, the VLAN-VPN uplink function is
disabled.
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...