beautypg.com

H3C Technologies H3C S3100 Series Switches User Manual

Page 838

background image

i

Table of Contents

1 VLAN-VPN Configuration··························································································································1-1

VLAN-VPN Overview ······························································································································1-1

Introduction to VLAN-VPN···············································································································1-1

Implementation of VLAN-VPN·········································································································1-2

Configuring the TPID for VLAN-VPN Packets·················································································1-2

VLAN-VPN Configuration························································································································1-3

VLAN-VPN Configuration Task List·································································································1-3

Enabling the VLAN-VPN Feature for a Port ····················································································1-3

Configuring the TPID Value for VLAN-VPN Packets ······································································1-3

Displaying and Maintaining VLAN-VPN Configuration ···········································································1-4

VLAN-VPN Configuration Example·········································································································1-4

Transmitting User Packets through a Tunnel in the Public Network by Using VLAN-VPN·············1-4

2 Selective QinQ Configuration···················································································································2-1

Selective QinQ Overview ························································································································2-1

Selective QinQ Overview·················································································································2-1

Selective QinQ Configuration··················································································································2-2

Selective QinQ Configuration Task List···························································································2-2

Configuring Global Tag Mapping Rules for Selective QinQ ····························································2-3

Enabling the Selective QinQ Feature for a Port ··············································································2-3

Selective QinQ Configuration Example···································································································2-3

Processing Private Network Packets by Their Types ·····································································2-3

3 BPDU Tunnel Configuration ·····················································································································3-1

BPDU Tunnel Overview ··························································································································3-1

Introduction to the BPDU Tunnel Feature ·······················································································3-1

BPDU Tunnel Fundamental ············································································································3-1

BPDU Tunnel Configuration····················································································································3-3

Configuration Prerequisites ·············································································································3-3

Configuring a BPDU Tunnel ············································································································3-3

Displaying and Maintaining BPDU Tunnel Configuration ·······································································3-4

BPDU Tunnel Configuration Example·····································································································3-4

Transmitting STP Packets Through a Tunnel ·················································································3-4