Binding VLL to the Main Interface, Ethernet Encapsulation Mode

Latest reply: Oct 31, 2018 08:04:24 353 5 10 2

3.1 Configuration Information:

On PE1:
#
Interface GigabitEthernet2/0/16
 Undo portswitch
 Mpls l2vc 111.111.111.111 90
#
On PE2:
#
Interface GigabitEthernet4/0/16
 Undo portswitch
 Mpls l2vc 90.90.90.90 90
#
3.2 Packets Entering the Tunnel:
1. If the packet sent by CE1 carries a layer of VLAN, as shown in Figure 1, when processing into the tunnel, the V1R2 version is processed as follows:
When the encapsulation mode is Ethernet, the packets in the original packet are stripped and then forwarded to the tunnel. The packets received by PE2 are:
 figure52
The V1R3 version starts processing differently from V1R2. When entering the tunnel, the VLAN in the original packet is not stripped.
2. If the packet sent by CE1 has two layers of VLANs:
 figure53
When a packet enters the tunnel, the V1R2 version strips the outer VLAN:
 figure54
 As of V1R3, PE1 encapsulates the two VLANs in the MPLS packets and forwards them to the peer PE2.
3. If the packet sent by CE1 does not carry a VLAN, the packet encapsulates the MPLS header on the original packet and then forwards it to PE2.
3.3 Packet Outbound Tunnel:
When a packet is sent out of the tunnel, regardless of whether the packet received from the peer PE carries the VLAN information of the original packet, the version does not process any packet. The MPLS header is directly stripped and then transparently transmitted to the packet. The local CE, that is, the number of VLANs of the original packets carried in the packets sent by the PE1, is forwarded to the CE2.
3.4 Supplementary notes:
When a packet is sent to the tunnel, the V1R2 and V1R3 versions are not affected. The V1R3 version does not modify the VLAN information of the packet.

 

The summary of  Handling of VLANs in Packets in Various Versions of L2VPN Configurations .http://forum.huawei.com/enterprise/en/forum.php?mod=viewthread&tid=453137

This article contains more resources

You need to log in to download or view. No account?Register

x
  • x
  • convention:

wanglei259
Created Oct 30, 2018 01:33:45 Helpful(0) Helpful(0)

Could you let me know as follow question:
how to confirm step for 3.3 and 3.4
  • x
  • convention:

Our kingdom is young,our stories are not yet legends.
lizhi94
Created Oct 30, 2018 01:47:21 Helpful(0) Helpful(0)


the sharing of technology enrichs my knowledge and the professional answer is totally right to bring me the new viewpoint.
at the sametime ,it is necessary for me to read the posts. within the posts cuting large amouts of fact meterials, which encourage me to be better.
one hand, i have aquired a large number of skills which is very useful for us and is interesting for us to remember it.
another hand, that a good post which is in network technology contains a lot of excellent experience.
thanks very much for your sharing. we are so happy for your next sharing like this.
  • x
  • convention:

Torrent
Created Oct 30, 2018 05:38:50 Helpful(0) Helpful(0)

Can you explain what is the usage of VLL, I am interested at this.
  • x
  • convention:

limgsc
Created Oct 31, 2018 03:41:23 Helpful(0) Helpful(0)

your document is work for me , i get the point , fix my issue by your doc thanks you very much ,
also hope you public more doc that levle like this .
would you please also mention where from the technical detail , i can found it from orignial part .
from orignial part i can found more correct parameter , this is more important .
  • x
  • convention:

No.9527
Created Oct 31, 2018 08:04:24 Helpful(0) Helpful(0)

As Ethernet develops rapidly, more Ethernet connections are required between large cities or remote areas. Traditionally, service providers deploy direct leased lines or set up Layer 2 tunnels between two areas. (The Layer 2 tunnels are set up between Layer 2 switching devices.) This solution has a high cost and is difficult to maintain and extend in some areas.
  • x
  • convention:

Reply

Reply
You need to log in to reply to the post Login | Register

Notice Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " Privacy."
If the attachment button is not available, update the Adobe Flash Player to the latest version!
Login and enjoy all the member benefits

Login and enjoy all the member benefits

Login