1-5
Two-to-two VLAN mapping
In two-to-two VLAN mapping, the outer VLAN and the inner VLAN carried in a double-tagged uplink
frame received at the downlink port on the edge device of an SP network are called the original SVLAN
and CVLAN, and the VLANs that the edge device substitutes for the original SVLAN and CVLAN are
called the new SVLAN and CVLAN.
On the downlink port
On the uplink port
For uplink traffic
For downlink traffic
For uplink traffic
Do...
Based on…
Do...
Based
on…
Do...
Based on…
Replace the
original
SVLAN with
the new
SVLAN
Uplink policy
in the
inbound
direction
Replace the
new SVLAN
and CVLAN
with the
original
SVLAN and
CVLAN
Downlink
policy in the
outbound
direction
Replace the
original CVLAN
with the new
CVLAN
Uplink policy in the
outbound direction
VLAN Mapping Configuration Task List
You need to configure VLAN mapping on your device depending on its position in the network.
Complete the following tasks to configure VLAN mapping:
Task
Remarks
Configuring One-to-One
VLAN Mapping
Optional
Perform this configuration on the corridor switches shown in
Figure 1-1
.
Configuring Many-to-One
VLAN Mapping
Optional
Perform this configuration on the campus switches shown in
Figure 1-1
.
Configuring Two-to-Two
VLAN Mapping
Optional
Perform this configuration on an edge device connecting two SP
networks. An example is Device C in the SP 2 network in
Figure 1-2
.
For VLAN mapping to work, you are required to do the following in addition to configuring QoS policies:
z
Enable ARP detection to send ARP packets to the CPU to allow modification of the VLAN attributes
carried in the packets, which is impossible with the normal ARP packet processing procedure. For
information about ARP detection, refer to ARP Attack Protection Configuration in the Security
Volume.
z
Enable the dynamic address binding support of IP Source Guard to filter packets received on a port
based on the source IP address and MAC address bindings created dynamically to prevent illegal
packets from passing through the port. For information about this feature, refer to IP Source Guard
Configuration in the Security Volume.
Содержание 4500G PWR 24-Port
Страница 200: ...1 5 ProviderB GigabitEthernet1 0 2 undo stp enable ProviderB GigabitEthernet1 0 2 bpdu tunnel dot1q stp ...
Страница 252: ...1 7 Clearing ARP entries from the ARP table may cause communication failures ...
Страница 362: ...i Table of Contents 1 Dual Stack Configuration 1 1 Dual Stack Overview 1 1 Configuring Dual Stack 1 1 ...
Страница 407: ...1 8 1 1 ms 1 ms 1 ms 1 1 6 1 2 1 ms 1 ms 1 ms 1 1 4 1 3 1 ms 1 ms 1 ms 1 1 2 2 Trace complete ...
Страница 786: ...1 16 3 In the case of PIM SM use the display current configuration command to check the BSR and RP information ...
Страница 1387: ...1 23 ...
Страница 1443: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 1720: ...ii Single Device Upgrade 3 4 IRF System Upgrade 3 5 ...