Double VLAN Mapping Subinterfaces Access VSIs and VLAN Encapsulation Modes

Created Jun 30, 2018 11:37:34 275 0 0 0

1.13.1 Configuration Information:
On PE1:
Interface GigabitEthernet2/0/16.1
 Vlan-mapping vlan 16 inner-vlan 17 map-vlan 18 (The V1R6, V2R1 command line is changed to qinq mapping pe-vid 16 ce-vid 17 map-vlan vid 18)
 L2 binding vsi test
On PE2:
Interface GigabitEthernet2/0/16.1
 Vlan-mapping vlan 19 inner-vlan 20 map-vlan 21 (The V1R6, V2R1 command line is changed to qinq mapping pe-vid 19 ce-vid 20 map-vlan vid 21)
 L2 binding vsi test
1.13.2 Packets into the Tunnel:
The packet sent by CE1 encapsulates two VLANs. The outer VLAN is 16 and the inner VLAN is 17:
 
After receiving the packet, PE1 changes the outer VLAN to the configured map-vlan 18, and then encapsulates the MPLS label information and sends it to PE2:
 
If the packet sent by CE1 carries no VLAN or single VLAN, it will be discarded.
1.13.3 Message Out of the Tunnel:
After PE2 receives the packet from PE1, PE2 strips off the MPLS encapsulation information, replaces the outer VLAN ID with the outer VLAN tag of the map configured on the port, that is, 19, and forwards it to CE2:
 
1.13.4 Supplementary Explanation:
The same applies to each version.

 

The summary of  Handling of VLANs in Packets in Various Versions of L2VPN Configurations .http://forum.huawei.com/enterprise/en/forum.php?mod=viewthread&tid=453137

This post was last edited by Barret at 2018-6-30 11:46.

This article contains more resources

You need to log in to download or view. No account?Register

x
  • x
  • convention:

Responses

Reply
You need to log in to reply to the post Login | Register

Notice:To ensure the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but not limited to politically sensitive content, content concerning pornography, gambling, drug abuse and trafficking, content that may disclose or infringe upon others' intellectual properties, including commercial secrets, trade marks, copyrights, and patents, and personal privacy. Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see“ Privacy Policy.”
If the attachment button is not available, update the Adobe Flash Player to the latest version!
Fast reply Scroll to top