Binding VLL to the Main Interface, Ethernet Encapsulation Mode

Created Oct 30, 2018 09:26:54Latest reply Oct 31, 2018 16:04:24 291 5 10 2

3.1 Configuration Information:

On PE1:
Interface GigabitEthernet2/0/16
 Undo portswitch
 Mpls l2vc 90
On PE2:
Interface GigabitEthernet4/0/16
 Undo portswitch
 Mpls l2vc 90
3.2 Packets Entering the Tunnel:
1. If the packet sent by CE1 carries a layer of VLAN, as shown in Figure 1, when processing into the tunnel, the V1R2 version is processed as follows:
When the encapsulation mode is Ethernet, the packets in the original packet are stripped and then forwarded to the tunnel. The packets received by PE2 are:
The V1R3 version starts processing differently from V1R2. When entering the tunnel, the VLAN in the original packet is not stripped.
2. If the packet sent by CE1 has two layers of VLANs:
When a packet enters the tunnel, the V1R2 version strips the outer VLAN:
 As of V1R3, PE1 encapsulates the two VLANs in the MPLS packets and forwards them to the peer PE2.
3. If the packet sent by CE1 does not carry a VLAN, the packet encapsulates the MPLS header on the original packet and then forwards it to PE2.
3.3 Packet Outbound Tunnel:
When a packet is sent out of the tunnel, regardless of whether the packet received from the peer PE carries the VLAN information of the original packet, the version does not process any packet. The MPLS header is directly stripped and then transparently transmitted to the packet. The local CE, that is, the number of VLANs of the original packets carried in the packets sent by the PE1, is forwarded to the CE2.
3.4 Supplementary notes:
When a packet is sent to the tunnel, the V1R2 and V1R3 versions are not affected. The V1R3 version does not modify the VLAN information of the packet.


The summary of  Handling of VLANs in Packets in Various Versions of L2VPN Configurations .

This article contains more resources

You need to log in to download or view. No account?Register

  • x
  • convention:

wanglei259     Created Oct 30, 2018 09:33:45 Helpful(0) Helpful(0)

Could you let me know as follow question:
how to confirm step for 3.3 and 3.4
  • x
  • convention:

Our kingdom is young,our stories are not yet legends.
lizhi94     Created Oct 30, 2018 09:47:21 Helpful(0) Helpful(0)

the sharing of technology enrichs my knowledge and the professional answer is totally right to bring me the new viewpoint.
at the sametime ,it is necessary for me to read the posts. within the posts cuting large amouts of fact meterials, which encourage me to be better.
one hand, i have aquired a large number of skills which is very useful for us and is interesting for us to remember it.
another hand, that a good post which is in network technology contains a lot of excellent experience.
thanks very much for your sharing. we are so happy for your next sharing like this.
  • x
  • convention:

Torrent     Created Oct 30, 2018 13:38:50 Helpful(0) Helpful(0)

Can you explain what is the usage of VLL, I am interested at this.
  • x
  • convention:

limgsc     Created Oct 31, 2018 11:41:23 Helpful(0) Helpful(0)

your document is work for me , i get the point , fix my issue by your doc thanks you very much ,
also hope you public more doc that levle like this .
would you please also mention where from the technical detail , i can found it from orignial part .
from orignial part i can found more correct parameter , this is more important .
  • x
  • convention:

No.9527  Mentor   Created Oct 31, 2018 16:04:24 Helpful(0) Helpful(0)

As Ethernet develops rapidly, more Ethernet connections are required between large cities or remote areas. Traditionally, service providers deploy direct leased lines or set up Layer 2 tunnels between two areas. (The Layer 2 tunnels are set up between Layer 2 switching devices.) This solution has a high cost and is difficult to maintain and extend in some areas.
  • x
  • convention:


You need to log in to reply to the post Login | Register

Notice:To ensure the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but not limited to politically sensitive content, content concerning pornography, gambling, drug abuse and trafficking, content that may disclose or infringe upon others' intellectual properties, including commercial secrets, trade marks, copyrights, and patents, and personal privacy. Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see“ Privacy Policy.”
If the attachment button is not available, update the Adobe Flash Player to the latest version!
Fast reply Scroll to top