Configuring VLANs
567
additional tag on the traffic, the switch can differentiate between customers
in the MAN while preserving an individual customer’s VLAN identification
when the traffic enters the customer’s 802.1Q domain.
With the introduction of this second tag, customers are no longer required to
divide the 4-byte VLAN ID space to send traffic on a Ethernet-based MAN.
In short, every frame that is transmitted from an interface has a double-VLAN
tag attached, while every packet that is received from an interface has a tag
removed (if one or more tags are present).
In Figure 21-2, two customers share the same metro core. The service
provider assigns each customer a unique ID so that the provider can
distinguish between the two customers and apply different rules to each.
When the configurable EtherType is assigned to something different than the
802.1Q (0x8100) EtherType, it allows the traffic to have added security from
misconfiguration while exiting the metro core. For example, if the edge
device on the other side of the metro core is not stripping the second tag, the
packet would never be classified as a 802.1Q tag, so the packet would be
dropped rather than forwarded in the incorrect VLAN.
Summary of Contents for PowerConnect M6220
Page 52: ...52 Introduction ...
Page 86: ...86 Switch Features ...
Page 100: ...100 Hardware Overview ...
Page 116: ...116 Using the Command Line Interface ...
Page 121: ...Default Settings 121 ...
Page 122: ...122 Default Settings ...
Page 142: ...142 Setting Basic Network Information ...
Page 206: ...206 Configuring Authentication Authorization and Accounting ...
Page 292: ...292 Managing General System Settings Figure 11 31 Verify MOTD ...
Page 296: ...296 Managing General System Settings ...
Page 332: ...332 Configuring SNMP ...
Page 408: ...408 Monitoring Switch Traffic ...
Page 560: ...560 Configuring Access Control Lists ...
Page 591: ...Configuring VLANs 591 Figure 21 17 GVRP Port Parameters Table ...
Page 597: ...Configuring VLANs 597 Figure 21 24 Double VLAN Port Parameter Table ...
Page 693: ...Configuring Port Based Traffic Control 693 Figure 24 3 Storm Control 5 Click Apply ...
Page 780: ...780 Configuring Connectivity Fault Management ...
Page 804: ...804 Snooping and Inspecting Traffic Figure 27 17 DAI Interface Configuration Summary ...
Page 818: ...818 Snooping and Inspecting Traffic ...
Page 836: ...836 Configuring Link Aggregation ...
Page 860: ...860 Configuring Data Center Bridging Features ...
Page 906: ...906 Configuring DHCP Server Settings ...
Page 940: ...940 Configuring L2 and L3 Relay Features Figure 34 3 DHCP Relay Interface Summary ...
Page 1080: ...1080 Configuring VRRP ...
Page 1104: ...1104 Configuring IPv6 Routing ...
Page 1131: ...Configuring Differentiated Services 1131 Figure 40 5 DiffServ Class Criteria ...
Page 1158: ...1158 Configuring Class of Service Figure 41 1 Mapping Table Configuration CoS 802 1P ...
Page 1174: ...1174 Configuring Auto VoIP Figure 42 2 Auto VoIP Interface Configuration ...
Page 1240: ...1240 Managing IPv4 and IPv6 Multicast Figure 43 51 DVMRP Next Hop Summary ...
Page 1266: ...1266 Managing IPv4 and IPv6 Multicast ...
Page 1274: ...1274 System Process Definitions ...
Page 1294: ...1294 Index ...