1-3
Figure 1-2
Scenario for one-to-two/two-to-two VLAN mapping
The VPN A user in Site 1 belongs to VLAN 10. When the packet tagged with VLAN 10 arrives at the
edge of the SP 1 network, PE 1 tags the packet with VLAN 100, the VLAN ID assigned to the VPN A
user in SP 1. The packet thus becomes double-tagged and this single-tag to double-tag translation
process is called one-to-two VLAN mapping. One-to-two VLAN mapping enables VPN users to plan
their own CVLAN IDs independent of SP network VLAN IDs, thus saving the VLAN resources of SPs.
When the double-tagged packet enters the SP 2 network, PE 3 replaces the outer VLAN tag (VLAN 100)
with VLAN 200, the VLAN ID assigned by SP 2 to the VPN A user. For the packet to reach the VPN A
user in Site 2, which belongs to VLAN 30, PE 3 replaces the inner tag (VLAN 10) of the packet with
VLAN 30. This double-tag to double-tag replacement is called two-to-two VLAN mapping.
You can use QinQ to achieve the same effect of one-to-two VLAN mapping. For more information about
QinQ, refer to
QinQ Configuration
in the
Access Volume
.
Содержание S7906E - Switch
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45...
Страница 598: ...ii...
Страница 1757: ...4 9...
Страница 1770: ...6 4...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20...