1-2
Implementation of VLAN-VPN
With the VLAN-VPN feature enabled, no matter whether or not a received packet already carries a
VLAN tag, the switch will tag the received packet with the default VLAN tag of the receiving port and add
the source MAC address to the MAC address table of the default VLAN. When a packet reaches a
VLAN-VPN-enabled port:
z
If the packet already carries a VLAN tag, the packet becomes a dual-tagged packet.
z
Otherwise, the packet becomes a packet carrying the default VLAN tag of the port.
VLAN-VPN Configuration
Enabling the VLAN-VPN Feature for a Port
Follow these steps to enable the VLAN-VPN feature for a port:
To do...
Use the command...
Remarks
Enter system view
system-view
—
Enter Ethernet port view
interface
interface-type
interface-number
—
Enable the VLAN-VPN feature
on the port
vlan-vpn enable
Required
By default, the VLAN-VPN
feature is disabled on a port.
Displaying and Maintaining VLAN-VPN Configuration
To do...
Use the command...
Remarks
Display the VLAN-VPN
configurations of all the ports
display port vlan-vpn
Available in any view
VLAN-VPN Configuration Example
Transmitting User Packets through a Tunnel in the Public Network by Using
VLAN-VPN
Network requirements
As shown in
Figure 1-3
, Switch A and Switch B are both Switch 4210 series switches. They connect the
users to the servers through the public network.
z
PC users and PC servers are in VLAN 100 created in the private network, while terminal users and
terminal servers are in VLAN 200, which is also created in the private network. The VLAN VPN
connection is established in VLAN 1040 of the public network.
z
Employ VLAN-VPN on Switch A and Switch B to enable the PC users and PC servers to
communicate with each through a VPN, and employ VLAN-VPN on Switch A and Switch B to
enable the Terminal users and Terminal servers to communicate with each other through a VPN.