VLAN-VPN Tunnel Configuration
855
Because Switch B is produced by other vendor, related commands may differ from
those available to Switch 8800 Family switches. So only the operation is listed, as
shown below:
■
Configure GigabitEthernet3/1/1 and GigabitEthernet3/1/3 ports of Switch B to
be trunk ports.
■
Add the two ports to VLAN 10.
n
The following describes how a packet is forwarded from Switch A to Switch C.
■
As the GigabitEthernet2/1/1 port of Switch A is a VLAN VPN port, when a
packet reaches GigabitEthernet2/1/1 port of Switch A, it is tagged with the
default VLAN tag (VLAN 10, the outer tag) and is then forwarded to
GigabitEthernet2/1/2 port.
■
Because GigabitEthernet2/1/2 port is a VLAN-VPN uplink port with a TPID of
0x9100, Switch A changes the TPID value in the outer VLAN Tag of the packet
to 0x9100, and forwards the packet to the public network.
■
The packet reaches GigabitEthernet3/1/2 port of Switch B. Switch B sends the
packet to its GigabitEthernet3/1/1 port by forwarding the packet in VLAN 10.
■
The packet is forward from GigabitEthernet3/1/1 port of Switch B to the
network on the other side and enters GigabitEthernet2/1/2 port of Switch C,
Switch C sends the packet to its GigabitEthernet2/1/1 port by forwarding the
packet in VLAN 10. As GigabitEthernet2/1/1 port is an access port, Switch C
strip off the outer VLAN tag of the packet and restores the original packet.
It is the same case when a packet travel from Switch C to Switch A.
Verification
The configuration is successful if packets sourced from the networks connected to
Switch A can reach those connected to Switch C, or packets sourced from the
networks connected to Switch C can reach those connected to Switch A.
VLAN-VPN Tunnel
Configuration
Introduction to
VLAN-VPN Tunnel
The function of VLAN-VPN tunnel is that user networks in different regions can
transmit BPDU packets transparently through VLAN VPN designated in the
operator’s network.
Figure 201 shows the hierarchy diagram of VLAN-VPN tunnel: operator’s network
and user network. The operator’s network involves packet input and output
devices. The user network includes network A and network B. Through the
configuration on the devices at both ends of the operator’s network, the
destination MAC address of the BPDU packet is replaced with a MAC address in a
special format at one end, and the MAC address is converted back to the original
destination MAC address at the other end. In this way the packet is transmitted
transparently over the operator’s network.
Summary of Contents for Switch 8807
Page 14: ......
Page 32: ...32 CHAPTER 2 COMMAND LINE INTERFACE...
Page 50: ...50 CHAPTER 5 MANAGEMENT INTERFACE CONFIGURATION...
Page 54: ...54 CHAPTER 6 CONFIGURATION FILE MANAGEMENT...
Page 64: ...64 CHAPTER 8 SUPER VLAN CONFIGURATION...
Page 70: ...70 CHAPTER 9 ISOLATE USER VLAN CONFIGURATION...
Page 78: ...78 CHAPTER 10 IP ADDRESS CONFIGURATION...
Page 82: ...82 CHAPTER 11 IP PERFORMANCE CONFIGURATION flag ACK window 16079...
Page 100: ...100 CHAPTER 13 ETHERNET PORT CONFIGURATION...
Page 114: ...114 CHAPTER 15 PORT ISOLATION CONFIGURATION...
Page 158: ...158 CHAPTER 18 DIGEST SNOOPING CONFIGURATION...
Page 162: ...162 CHAPTER 19 FAST TRANSITION...
Page 219: ......
Page 220: ...220 CHAPTER 24 VLAN ACL CONFIGURATION...
Page 234: ...234 CHAPTER 25 802 1X CONFIGURATION...
Page 284: ...284 CHAPTER 28 IP ROUTING PROTOCOL OVERVIEW...
Page 290: ...290 CHAPTER 29 STATIC ROUTE CONFIGURATION...
Page 338: ...338 CHAPTER 31 OSPF CONFIGURATION...
Page 392: ...392 CHAPTER 33 BGP CONFIGURATION...
Page 404: ...404 CHAPTER 34 IP ROUTING POLICY CONFIGURATION...
Page 406: ...406 CHAPTER 35 ROUTE CAPACITY CONFIGURATION...
Page 408: ...408 CHAPTER 36 RECURSIVE ROUTING CONFIGURATION...
Page 416: ...416 CHAPTER 37 IP MULTICAST OVERVIEW...
Page 430: ...430 CHAPTER 39 IGMP SNOOPING CONFIGURATION...
Page 454: ...454 CHAPTER 42 IGMP CONFIGURATION...
Page 462: ...462 CHAPTER 43 PIM DM CONFIGURATION...
Page 506: ...506 CHAPTER 46 MBGP MULTICAST EXTENSION CONFIGURATION...
Page 528: ...528 CHAPTER 48 MPLS BASIC CAPABILITY CONFIGURATION...
Page 632: ...632 CHAPTER 51 MPLS VLL...
Page 652: ...652 CHAPTER 52 VPLS CONFIGURATION...
Page 666: ...666 CHAPTER 53 VRRP CONFIGURATION...
Page 680: ...680 CHAPTER 56 ARP TABLE SIZE CONFIGURATION...
Page 718: ...718 CHAPTER 59 NETSTREAM CONFIGURATION...
Page 728: ...728 CHAPTER 61 POE CONFIGURATION...
Page 736: ...736 CHAPTER 63 UDP HELPER CONFIGURATION...
Page 746: ...746 CHAPTER 64 SNMP CONFIGURATION...
Page 792: ...792 CHAPTER 68 FILE SYSTEM MANAGEMENT...
Page 800: ...800 CHAPTER 69 DEVICE MANAGEMENT...
Page 810: ...810 CHAPTER 70 FTP TFTP CONFIGURATION...
Page 840: ...840 CHAPTER 72 SYSTEM MAINTENANCE AND DEBUGGING...
Page 844: ...844 CHAPTER 74 PACKET STATISTICS CONFIGURATION...
Page 846: ...846 CHAPTER 75 ETHERNET PORT LOOPBACK DETECTION...
Page 860: ...860 CHAPTER 76 QINQ CONFIGURATION...
Page 866: ...866 CHAPTER 77 NQA CONFIGURATION...
Page 876: ...876 CHAPTER 78 PASSWORD CONTROL CONFIGURATION...