Chapter 17
| VLAN Commands
Configuring IEEE 802.1Q Tunneling
– 410 –
4.
Set the Tag Protocol Identifier (TPID) value of the tunnel access port. This step is
required if the attached client is using a nonstandard 2-byte ethertype to
identify 802.1Q tagged frames. The standard ethertype value is 0x8100. (See
dot1q-tunnel tpid
.)
5.
Configure the QinQ tunnel access port to join the SPVLAN as an untagged
member (
switchport allowed vlan
).
6.
Configure the SPVLAN ID as the native VID on the QinQ tunnel access port
(
switchport native vlan
).
7.
Configure the QinQ tunnel uplink port to dot1Q-tunnel uplink mode
(
switchport dot1q-tunnel mode
).
8.
Configure the QinQ tunnel uplink port to join the SPVLAN as a tagged member
(
switchport allowed vlan
).
Limitations for QinQ
◆
The native VLAN for the tunnel uplink ports and tunnel access ports cannot be
the same. However, the same service VLANs can be set on both tunnel port
types.
◆
IGMP Snooping should not be enabled on a tunnel access port.
◆
If the spanning tree protocol is enabled, be aware that a tunnel access or tunnel
uplink port may be disabled if the spanning tree structure is automatically
reconfigured to overcome a break in the tree. It is therefore advisable to disable
spanning tree on these ports.
dot1q-tunnel
system-tunnel-control
This command sets the switch to operate in QinQ mode. Use the
no
form to disable
QinQ operating mode.
Syntax
[
no
]
dot1q-tunnel system-tunnel-control
Default Setting
Disabled
Command Mode
Global Configuration
Command Usage
QinQ tunnel mode must be enabled on the switch for QinQ interface settings to be
functional.
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...