1-1
1
Tunneling Configuration
When configuring tunneling, go to these sections for information you are interested in:
z
Tunneling Overview
z
Tunneling Configuration Task List
z
Configuring an IPv6 Manual Tunnel
z
Configuring a 6to4 Tunnel
z
Configuring an ISATAP Tunnel
z
Configuring an IPv4 over IPv4 Tunnel
z
Configuring an IPv4 over IPv6 Tunnel
z
Configuring an IPv6 over IPv6 Tunnel
z
Configuring a GRE over IPv4 Tunnel
z
Configuring a GRE over IPv6 Tunnel
z
Displaying and Maintaining Tunneling Configuration
z
Troubleshooting Tunneling Configuration
Tunneling Overview
Introduction to the Tunneling Technology
Tunneling is an encapsulation technology, which utilizes one network protocol to encapsulate packets of
another network protocol and transfer them over the network. A tunnel is a virtual point-to-point
connection providing a channel to transfer encapsulated packets. Packets are encapsulated and
decapsulated at both ends of a tunnel. Tunneling refers to the whole process from data encapsulation to
data transfer to data decapsulation.
Tunneling provides the following:
z
Transition techniques, such as IPv6 over IPv4 tunneling, to interconnect IPv4 and IPv6 networks.
z
Virtual private networks (VPNs) for guaranteeing communication security, such as generic routing
encapsulation (GRE) and dynamic virtual private network (DVPN).
z
Traffic engineering, such as multiprotocol label switching traffic engineering (MPLS TE), thus
preventing network congestion.
The preceding tunneling technologies require that you create virtual Layer 3 interfaces (tunnel
interfaces) at both ends of a tunnel, so that devices at both ends can send, identify, and process packets
transferred through the tunnel.
Содержание S7906E - Switch
Страница 82: ...1 4 DeviceA interface tunnel 1 DeviceA Tunnel1 service loopback group 1...
Страница 200: ...1 11 DeviceB display vlan dynamic No dynamic vlans exist...
Страница 494: ...ii Displaying and Maintaining Tunneling Configuration 1 45 Troubleshooting Tunneling Configuration 1 45...
Страница 598: ...ii...
Страница 1757: ...4 9...
Страница 1770: ...6 4...
Страница 2017: ...2 11 Figure 2 3 SFTP client interface...
Страница 2062: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2...
Страница 2238: ...1 16 DeviceA cfd linktrace service instance 1 mep 1001 target mep 4002...
Страница 2442: ...2 4 Set the interval for sending Syslog or trap messages to 20 seconds Device mac address information interval 20...