i
Table of Contents
1 VLAN-VPN Configuration··························································································································1-1
VLAN-VPN Overview······························································································································1-1
Introduction to VLAN-VPN···············································································································1-1
Implementation of VLAN-VPN·········································································································1-2
Configuring the TPID for VLAN-VPN Packets·················································································1-2
VLAN-VPN Configuration························································································································1-3
VLAN-VPN Configuration Task List·································································································1-3
Enabling the VLAN-VPN Feature for a Port····················································································1-3
Configuring the TPID Value for VLAN-VPN Packets ······································································1-3
Displaying and Maintaining VLAN-VPN Configuration ···········································································1-4
VLAN-VPN Configuration Example·········································································································1-4
Transmitting User Packets through a Tunnel in the Public Network by Using VLAN-VPN·············1-4
2 Selective QinQ Configuration···················································································································2-1
Selective QinQ Overview························································································································2-1
Selective QinQ Overview·················································································································2-1
Selective QinQ Configuration··················································································································2-2
Selective QinQ Configuration Task List···························································································2-2
Configuring Global Tag Mapping Rules for Selective QinQ····························································2-3
Enabling the Selective QinQ Feature for a Port··············································································2-3
Selective QinQ Configuration Example···································································································2-3
Processing Private Network Packets by Their Types ·····································································2-3
3 BPDU Tunnel Configuration·····················································································································3-1
BPDU Tunnel Overview··························································································································3-1
Introduction to the BPDU Tunnel Feature ·······················································································3-1
BPDU Tunnel Fundamental ············································································································3-1
BPDU Tunnel Configuration····················································································································3-3
Configuration Prerequisites·············································································································3-3
Configuring a BPDU Tunnel············································································································3-3
Displaying and Maintaining BPDU Tunnel Configuration ·······································································3-4
BPDU Tunnel Configuration Example·····································································································3-4
Transmitting STP Packets Through a Tunnel ·················································································3-4