i
Table of Contents
1 VLAN-VPN Configuration··························································································································1-1
VLAN-VPN Overview ······························································································································1-1
Introduction to VLAN-VPN···············································································································1-1
Implementation of VLAN-VPN·········································································································1-2
Adjusting the TPID Values of VLAN-VPN Packets ·········································································1-2
VLAN-VPN Configuration························································································································1-3
Configuration Task List····················································································································1-3
Enabling the VLAN-VPN Feature for a Port ····················································································1-3
TPID Adjusting Configuration··········································································································1-4
Displaying and Maintaining VLAN-VPN··································································································1-4
VLAN-VPN Configuration Example·········································································································1-5
Transmitting User Packets through a Tunnel in the Public Network by Using VLAN-VPN·············1-5
2 Selective QinQ Configuration···················································································································2-1
Selective QinQ Overview ························································································································2-1
Selective QinQ Overview·················································································································2-1
Inner-to-Outer Tag Priority Mapping································································································2-2
Selective QinQ Configuration··················································································································2-2
Configuration Task List····················································································································2-2
Enabling the Selective QinQ Feature for a Port··············································································2-2
Configuring the Inner-to-Outer Tag Priority Mapping Feature·························································2-3
Selective QinQ Configuration Example···································································································2-3
Processing Private Network Packets by Their Types ·····································································2-3