8
VLAN-VPN C
ONFIGURATION
This chapter contains configuration information to create VLAN-VPNs.
VLAN-VPN Overview
The VLAN-VPN function enables packets to be transmitted across the operators'
backbone networks with VLAN tags of private networks nested in those of public
networks. In public networks, packets of this type are transmitted by their outer VLAN
tags (that is, the VLAN tags of public networks). And those of private networks, which
are nested in the VLAN tags of public networks, remain intact.
Figure 28 describes the structure of the packets with single VLAN tags.
Figure 28
Structure of packets with private network VLAN tags only
Figure 29 describes the structure of the packets with nested VLAN tags.
Figure 29
Structure of packets with nested VLAN tags
Compared with MPLS-based L2VPN, VLAN-VPN has the following features:
■
It allows Layer 2 VPN tunnels that are simpler.
■
VLAN-VPN can be implemented without the support of signalling protocols. You
can enable VLAN-VPN by static configuring.
The VLAN-VPN function provides you with the following benefits:
■
Saves public network VLAN ID resource.
■
You can have VLAN IDs of your own, which is independent of public network
VLAN IDs.
■
Provides simple Layer 2 VPN solutions for small-sized MANs or intranets.
Implementation of
VLAN-VPN
VLAN-VPN can be implemented by enabling the VLAN-VPN function on ports.
With the VLAN-VPN function enabled, a received packet is tagged with the default
VLAN tag of the receiving port no matter whether or not the packet already carries a
VLAN tag. If the packet already carries a VLAN tag, the inserted VLAN tag becomes a
nested VLAN tag in the packet. Otherwise, the packet is then transmitted with the
default VLAN tag of the port carried.
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...