Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
73 views
34 pages
4-Advanced VLAN Technologies
Uploaded by
moharaki1981
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save 4-Advanced VLAN Technologies For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
73 views
34 pages
4-Advanced VLAN Technologies
Uploaded by
moharaki1981
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save 4-Advanced VLAN Technologies For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save 4-Advanced VLAN Technologies For Later
You are on page 1
/ 34
Search
Fullscreen
Te ot BEE Advanced VLAN Technologies onyght ©2020 Haw Teshnoagies Co, Ld Al rahe reseedForeword + VLAN technologies are widely used on campus networks. Typically, VLANs are used to isolate broadcast domains. Each VLAN belongs to a broadcast domain. During network planning, a gateway needs to be allocated to each broadcast domain. If there are too many VLANs, itis difficult to plan IP addresses and a large number of |P addresses may be wasted. + In addition, in large enterprises, internal employees as well as many partners work in the enterprise ‘campus. Partners cannot directly access each other. Each partner needs to be assigned a VLAN for isolation, which makes network management and maintenance difficult. Are there any better technologies to solve these problems? + This course describes several advanced VLAN technologies, including VLAN aggregation, MUX VLAN, and Qing, page conth © 22 an Tess Cok Alas rene Se nvawerObjectives + Upon completion of this course, you will be able to: ® Describe the working mechanism of VLAN aggregation. ® Describe application scenarios of MUX VLAN. ® Describe QinQ implementation. ® Perform configurations of VLAN aggregation, MUX VLAN, and QinQ. Page? Copyright © 2020 Huai! Teshnoages Co, LA rahe reseed Se nvawer) Contents 1. VLAN Aggregation 2, MUX VLAN 3. QinQ Page Copyright © 2020 Huai! Teshnoages Co, Ld Arai reseed Se Hvaweladdress all cannot be used as IP addresses of hosts in to communicate, This wastes IP addresses Gateway. YIANIF 10: 192.168.1.62/26, VLANIF 20: 192.168.1.126/26, LAN 30: 192.168.1.190/26, VIAN 10 9216819726 Page 4 Copyright © 2020 Musee! Techroages 192.168.154)26, | Ga VIAN 20 VIAN 20 192.168.1.128/26 ll oats eserves & ) Background of VLAN Aggregation Usually, a Layer 3 switch uses a Layer 3 logical interface in each VLAN ta allow hosts in different broadcast domains + Ona subnet corresponding to 2 VLAN, the subnet ID, directed broadcast address, and subnet default gateway the VLAN. In addition, IP addresses available ina subnet may exceed the number of hosts. These excess IP addresses cannot be used by other VLANs. Cando tne ante o¢ _) 2 Se nvawer= Overview of VLAN Aggregation to casper ah prs reas amano mate AN (bo 3 sl ete and pe he supervean, Se nvawer Page S_ Copyright © 2020 Husa! Teshnoage Co, LA rahe reseed‘Sub-VLAN 10 Sub-VLAN 20. Sub-VLAN 30 1921681.0- 19216R1e4- 192.168.1128 192.1681 127/24 192.1681391/24 192.168.165/28 teway address of all hosts is 68.1,254/24. opyght ©2020 HuaweTechnoogies Co, Ld Al ahs reseed Principle of VLAN Aggregation VLAN aggregation maps each sub-VLAN to a broadcast domain, associates a super-VLAN with multiple sub-VLANs, and then assigns just one IP subnet to the super-VLAN, This ensures that all sub-VLANs use the IP address of the associated super-VLAN as the gateway IP address to implement Layer 3 connectivity Se nvawer Sub-VLANs share one gateway address to reduce the number of subnet addresses, subnet default gateway addresses, and directed broadcast IP addresses. The switch assigns IP addresses to hosts in sub-VLANs according to the number of hosts. This ensures that each sub-VLAN acts as an independent broadcast domain, conserves IP addresses, and implements flexible addressing.Application of VLAN Aggregation For traditional VLAN technology, each VLAN needs to be assigned a different P address segment. In this example, four Padres Segrnents and four routes are required. n super-VLAN mode, only one P adéres segment needs tobe allocate. Layer 2 VLANS ofthe super-VLAN share the same IP adress segment and Layer 3 gateway n alton, Layer 2 isolation is implementec between VLANS. ronan aed ree es vans tosoane Page” Copyright © 2020 Huai! Teshnoages Co, Ls Araneae Se HvawelCommunication in a Sub-VLAN ‘A sub-VLAN belongs to a broadcast domain, so devices in the same sub-VLAN can directly communicate with each other at Layer 2. Layer? Lay? 4 3 — ‘Sub-VLAN 10 SUB-VLAN 20 192168.1.0/24 9216810724 page 8 Conth © 22 an Tess Co Al gh rene Se nvawerCommunication Between Sub-VLANs ‘After prony ARP is enabled on VLANIF 100 of the super-VLAN, communication between PC1 and PC2 is as follows: ‘When PC finds that PC2 Ison the same network segment a itself and its [ARP table doesnot contain the entry corresponding to PC2, PCI broadcasts an ARP Request packet to request the MAC address of PC2 2. VLANIF 100 corresponding to super-VLAN 100 receives the ARP Request packet from PCI. Because proxy ARP between sub-VLANS is enabled on the gateway, te gateway broadcasts an ARP Request packet to al sub-VLANS oe of Super-VLAN 100 to request the MAC address of PC2 3 After receiving the ARP Request packet, PC2 returns an ARP Reply packet 4. After receiving the ARP Reply packet rom PC2 the gateway sends is MAC Subvian 10 SubMLAN 20 aderes to PC. Then PC1 sends the packets destine for PC2 tothe eee eae 2912s gateway, and the gateway forwards the packets at Layer 3. page conth © 22 ay esos Co Alas resend Se nvawer + When hosts in different sub-VLANs communicate with each other, the hosts send ARP Request packets because IP addresses of the sub-VLANs belong to the same network segment. Actually, different sub-VLANs belong to different broadcast domains. As a result, ARP packets cannot be transmitted to other sub-VLANs, there is no response to ARP Request packets, and the device cannot learn the MAC address of the peer end. As a result, sub-VLANs cannot communicate with each other. + To implement communication between sub-VLANs, enable proxy ARP on the VLANIF interface of the super-VLAN.Zz Layer 2 Communication Between Hosts in Sub-VLANs and Other Devices {GE0/0/0 (Trunk) + Layer 2 communication between hosts in sub- ‘low-pass van 1020 30 VLANs and other devices is the same as Layer 2 SW2 communication within a common VLAN. + A super-VLAN does not belong to any physical interface. That is, a super-VLAN does not process any packet that carries a super-VLAN tag. aoa a Sz SubVLAN 10 SuD-VIAN 20. Sub-VLAN 20 39216R1.1/24 192168.164/24, 192.168..728/24 Page 10 copyright 2020 Huawei Technologies Ca, Ltd All rahts reseed, Se Hvawel + An example of Layer 2 communication of a sub-VLAN is as follows: 2 Packets sent from Host_1 to Switch_1 are tagged with VLAN 10. Although sub- VLAN 10 belongs to super-VLAN 100, SW1 does not change VLAN 10 to VLAN 100 in packets. Packets sent from GEO/0/0 on SW1 are still tagged with VLAN 10. SW1 does not send packets from VLAN 100. When another device sends packets from VLAN 100 to SW1, SW1 discards the packets because there is no physical interface corresponding to super-VLAN 100 on SW1. © For other devices, only sub-VLANs 10, 20, and 30 are valid and all packets are exchanged in the VLANs. The communication between SW1 configured with VLAN aggregation and other devices is similar to normal Layer 2 communication without the super-VLAN. + When a PC in a sub-VLAN needs to communicate with other networks at Layer 3, the PC sends data to the default gateway, that is, the VLANIF interface corresponding to. the super-VLAN, and then routes the data.VLAN Aggregation Configuration Commands 1. Create a super-VLAN. [Huawei-vlan100) aggregate-vian ‘A super-VLAN cannot contain any physical interface, and VLAN 1 cannot be configured as a super-VLAN, The VLAN ID of a super-VLAN must be different from the VLAN ID of a sub- VLAN. 2. Add sub-VLANS to the supet-VLAN. [Huawei-viant00} access-vlan { vlan-id [ to vlan-id2] } Before adding any sub-VLANS to a super-VLAN, ensure that they are not configured with VLANIF interfaces. 3. (Optional) Enable proxy ARP on the VLANIF interface corresponding to a super-VLAN. [Huawei-vlanif100] arp-proxy inter-sub-vian-proxy enable Enable proxy ARP between sub-VLANS. Page 11 Copyright © 2020 Huawet Technologies Ca, Ltd. All nahts reserve. Me HuAWe!terispea05/24 ceoioy 0/0" sws ceo/or| O O VLAN aggregation is configured on SW/1, as shown in the figure. Page 12 Copyright © 2020 Huai! Teshnoages Co, Ls Alrahte reseed Example for Configuring VLAN Aggregation (1) SW1 configuration: [SW van bate 102 Lb [sw ertace gpstetemet [SW-cgnbtetere1 port eye rank [SA1-cgaitetereo( port trunk alow-pas an Yo [sw nerace Ganonememe9}o72 [sWr-cgabetnemeo}(2 port inky trunk [sAr-cigabtetneeo}2 port rn aom-pas van 20 1 crates siperv.an, [sw terace vari 00| [swtearo0 ip aes 1921681256 28 [swear rp itera lan pony endl Se Hvawelterispea05/24 stoi «oy sw copa Cl C VLAN aggregation is configured on SW/1, as shown in the figure. Page 12 Copyright © 2020 Huai! Teshnoage Co, Ls Alrahte reseed Example for Configuring VLAN Aggregation (2) ‘SW1 configuration: [sw vn 200 [sw terace gnbtetemet}3 [sW-cgabtetereo}(3) port nye acess [sW-cnaittheret8] pot deft van 200 'SW2 configuration: (502 van 10 (sw inerace Ggadtemeneo}j2 [sw2-cgabittineme0}92 port nye acess [sw2-cignittnere0}2 pot deta van 10 (502 eta [sW2.cgebittere0}/) port key tank [SW2.cgaiEtere0}1 pot trunk tom: pas van 10 Se nvawer) Contents 1. VLAN Aggregation 2. MUX VLAN 3. QinQ Page 1 Copyright © 2020 Huai! Teshnoage Co, LA rahe reseed Se nvawerBackground of MUX VLAN Con an enterprise network, networks of different departments need to be independent ofeach other. VLAN technology can be used to meet this equirement 3 large-scale enterprise has 2 large number of partners the parners must be able ta access the servers ofthe lemterrise but cannot access each other. In this case, the traditional VLAN technology requires a large number of VLAN IDs and increases the workload of network administrators and maintenance workload “The Multiple VALAN (MUX VLAN) function used to control network resources based on VLANS, Pc pc2_| PC3_ PC Pce Department A_| Department 8 || Guest area page 8 Connth © 2 ay Tess Co Alas rene Se nvawerBasic Concepts of MUX VLAN MUX VLANS are classified into principal VLANs and subordinate VLANs, Subordinate VLANs are classified into separate VLANs and group VLANs. Principal VLAN MUX VLAN Stara pacpaliwrare age Separate VLAN Separate port ld tom ser pent maces Subordinate VAN Thesame goup WAN, bt cant Group VLAN Group port | Smsseh tetas mabe gmp Page 16 Copyright © 2020 Huawet Technologies Ca, Ltd. All nah reserve. Me HuAWe! + Either the separate VLAN or group VLAN must be bound to a principle VLAN. + Interfaces in a principal VLAN can communicate with other interfaces in the same MUX VLAN.CH CH)CH CCH Ca met pea | pcs Pc || esc opyght ©2020 HuaweTechnoogies Co, Ld Al ahs reseed ED Application of MUX VLAN (On a switch, VIANs of departments A and @ are configured as subordinate group VLANS, the VLAN of the guest area is configured a subordinate separate VIAN, and the VLAN of the Interface connacted to the server is configured as the Principal VIAN. In addition, all the subordinate VLANS are bound te the principal VLAN. In this way, the folowing network design requirements are met any in the quest area can access only the server and canot acess Se HvawelMUX VLAN Configuration Commands 1. Configure a principal VLAN for MUX VLAN. {Huawel-lan00] mux-vian The VLAN is configured as a MUX VLAN, that i, principal VLAN, The VLAN ID assigned to a principal VLAN Cannot be used as the super-VLAN or sub-VLAN. 2. Configure a group VAN. {Huawel-vian’00] subordinate group { vian-idf (to vian-id2) } ‘A maximum of 128 group VLANs can be configured for a principal VLAN 3. Configure a separate VLAN {Huawel-lan100] subordinate separate vlan-id Only one separate VLAN can be configured fora principal VLAN. The IDs ofthe group VLAN and separate VLAN in a MUX VLAN must be citferent. 4. Enable the MUX VLAN function on an Interface. {Huawel-Gigabitéthemet0/0/1] port mux-vlan enable vian-id Interfaces of negotiaton-auto and negotiation-desirable types do not support the port mux-vlan enable Page 18 Conyigh 2020 Huse Techno Co, Li. Alles zee Me nvawer + The MUX VLAN function must be enabled to implement the following functions: The principal VLAN and subordinate VLAN can communicate with each other. interfaces in a group VLAN can communicate with each other. Interfaces in a separate VLAN cannot communicate with each other.VIAN 100 Ch C3 CH CF CF CH Department A Department Best area VIAN 10. MAN 20. YAN 0 opyght ©2020 HuaweTechnoogies Co, Ld Al ahs reseed MUX VLAN Configuration Example SW1 configuration: [swt vin bate 1029 30 100 [sa van 100 [sw ner ene) [swr-cgnbitetnere9} port inky acess [sw-cignite nero port taut van 10 ne eon, and arene rode Se Hvawel& ) Verifying the MUX VLAN Configuration Check the VLAN configuration and run the ping command to check the network connectivity between PCS (192.168.15/24) and PC6 (192.168.1.6/24). [sw!}eisplay vlan ‘The total number of vans is:5 U:Up;D:Down, TG: Tagged; UT: Untaggee: MP. Vian-mapaing ST. Vlan-stackng +# ProtocotTransparentvian;* Management-van, Vid Type Ports 0. mux-sub UTSGEO/0/1(U) GE0/0/2(U) 20 mux-sub UTGEO/O/3(¥) —GE0/0/4(U) 30_mux-sub UT-GEO/O/S(U) GE0/0/6(U) 0 ix UTGEO/O/24(U) Page 20. Cepyight © 2020 Huawe! Technologies Co, Lt A ahs reseed PCSpping 192.6816 ing 182,168.16: 32 data bytes, Press CW to break From 192.168.15: Destination host unreachable From 192.1685: Destination host unreachable From 192.168. 5: Destination host unreachable From 192.168.5: Destination host unreachable From 192.168.15: Destination host unreachable ~-192.168.15 ping statistics — ' packets) transmitted © packets) received 100.00% packet loss Se nvawer) Contents 1. VLAN Aggregation 2. MUX VLAN 3. Qing Page 21 Copyright © 2020 Huai! Teshnoages Co, Ls Arai reseed Se nvawer6 ) Overview of QinQ + As Ethernet technologies have been deployed on many networls, using only the VLAN tag defined in IEEE 802.1 cannot effectively identify and isolate a large numberof users. A 12-bit VLAN tag defined in IEEE 802.1Q identifies a maximum of only 4096 VLANs, which is insufficient for a great number of users on the metro Ethernet. 802.1Q-in- 202.10 (Qin) was developed to expand VLAN space beyond 4096 VLANS Qing expands VLAN space by adding an additonal 802.10 tag to 802.10 tagged packets. ‘As shown in the figure, user packets carty double tags an the public network. The Inner tag Isa private netwark tag, and the outer tag Is a public network tag. Public network Enterprise HQ Enterprise branch User packet Private network tag lll Public network tag Page 22 Copyright © 2020 Huai! Teshnoage Co, LA rahe reseed Se nvawerFormat of QinQ Packets In QinQ encapsulation, two VLAN tags are added to the end of the source MAC address field of an untagged Ethernet data frame, Untagged frame DA sa |rvpejtencT| pata | cs Qing DA sa EE) we | pata | rcs encapsulation ec ox6100 pai |r) VLAN ID Ci2bits) meh Pee ro | tr Page 22 Copyright © 2020 usw! Teshnoage Co, LA rahe reseed Me nvawer + Tag Protocol Identifier (TPID): indicates the frame type. The value 0x8100 indicates an 802.1Q-tagged frame. A device that does not support 802.1Q discards 802.1Q frames. For the inner 802.1Q tag, the value is set to 0x8100. For the outer 802.1Q tag, different vendors may use different values. 0x8100: is used by Huawei routers. 0x88A8: 802.1ad specifies that the TPID in the outer 802.1Q tag is 0x88a8. + Ona Huawei device, the default value of the outer 802.1Q tag is 0x8100, which can be changed using a command.ED QinQ Implementation Devices forward packets over the public network based on outer VLAN tags of packets, and learn MAC addresses from the outer VLAN tags. The private VLAN tags in the packets are forwarded as payload of the packets. Even ifthe private network VLAN tags are the same, the public network VLAN tags can be used to differentiate users. [1-10 J =a a WLANs 1-20 IANS 10 TI Packets of enterprise 8 + The private VLANs of enterprise A and enterprise B are VLANs 1 to 10 and VLANs 1 to 20, respectively. The public network allocates public VLANs 3 and 4 to enterprise A and enterprise B respectively. When tagged packets from enterprises A and B arrive at the public network, they are tagged with additional VLAN tags, that is, VLAN 3 for enterprise A's packets and VLAN 4 for enterprise B's packets. In this way, packets from enterprise networks are separately transmitted on the public network, even though the two networks have overlapping VLAN IDs. After packets traverse the public network, public VLAN tags of the packets at the receiving PE are removed. Then the packets are forwarded to the CE of their respective user network.Implementation of QinQ — Basic QinQ Packet processing of basic QinQ: 1. SW receives a packet tagged with VIAN 10 or 20 and sends the packet to sw2 2. When receiving the packet, SW2 adds an outer tag with VLAN 100 tothe packet 3. The packet with double tagsis forwarded according tothe Layer? forwarting process. 4 ter receiving the packet from VLAN 100, SW3 removes the cuter tag with VLAN 100, SW3 then sends the packet that cartes only one tag with VIAN 10 or 20 to Wa 5. After receiving the packet, SW forwards according to its VLAN ID and destination MAC adress. page 25 _conth © 22 an esos Lk. Alas rene Se nvawer + Basic QinQ is implemented based on interfaces. When a packet arrives at an interface that has basic QinQ enabled, the device will tag it with the interface's default VLAN tag, regardless of whether the packet is already tagged or untagged. After being processed by basic QinQ on an interface, single-tagged packets change into double- tagged packets, and untagged packets change into single-tagged packets with the default VLAN tag of the interface. + Interface-based QinQ inflexibly encapsulates the outer VLAN tag. The device on which interface-based QinQ is enabled cannot change the encapsulation method used for the outer VLAN tag based on service types.Implementation of QinQ — Selective QinQ Packet processing of selective QinQ 1. When receiving the packet tagged with VLAN 10 or VLAN 20, WT Forwards the packet to SW2 2. When receiving the packet tagged with VLAN 10, SW2 adds an ‘outer tag With VLAN 100 tothe packet When receiving the packet tagges with VLAN 20, SW2 adds an outer tag with ‘VIAN 200 to the packet. 3. The packet with double tags is forwarded according tothe Layer? forwarding proces. 4, Alter receiving the packet, SW3 removes the outer tag with ‘VLAN 100 of 200, 3 then sends the packet that cartes only jane tag with VLAN 10 ar 20 to SW, Alter receiving the packet, SW forwards it according to its ‘VIAN ID and destination MAC adress. page 26 Conth © 22 an Tego ik. Algae Se nvawer + Selective QinQ allows the device to select whether to tag packets, or determine the type of outer VLAN tags to be encapsulated, according to the traffic classification result, Selective QinQ can classify traffic based on the VLAN tag, priority, MAC address, IP protocol, source IP address, destination IP address, or port number of an application program. + VLAN ID-based selective QinQ: adds outer VLAN tags based on inner VLAN IDs. + 802.1p priority-based selective QinQ: adds outer VLAN tags based on 802.1p priorities in inner VLAN tags. + Traffic policy-based selective Qin: adds different outer VLAN tags based on QoS policies so that differentiated services can be provided based on service types. + Selective QinQ is an extension of basic QinQ and is more flexible. The difference is as follows: = Basic QinQ: adds the same outer VLAN tag to all packets arriving at a Layer 2 interface. © Selective QinQ: adds different outer VLAN tags to packets arriving at a Layer 2 interface based on inner VLAN tagsQinQ Application on Campus Networks Scenario Requirements ee Y a - Solution = 3. Gini depen te cena octane oe 27 cepa ato Hua Techs co, Alla seve Se nvawer + Broadband Remote Access Server (BRAS): The BRAS aggregates and forwards service flows, meeting different user requirements for the transmission rate and broadband utilization. Therefore, it is the core device for broadband user access. + Broadcast, unknown unicast, and multicast (BUM): The switch floods BUM packets.QinQ Configuration Commands 1. Configure the interface as a dottg tunnel interface. [Huawei-Gigabitethemet0/0/1) port link-type dotfq-tunnet rank inter The interface ean be a physical interface or an Eth 2. Enable VLAN translation on an interface. [Huawei-Gigabitéthemet0/0/1] ging vian-translation enable 3. Configure selective Qing [Huawei-igabitethernet0/0/1] port vlan-stacking vlan vlan-id! [ to vlan-id2] stack-vlan vian-id3 [ remark- 2021p 8027p-value | Configure different outer VLAN tags for different inner VLAN tags. By default, the priority of the outer VLAN tag isthe same as that of the inner VLAN tag, Page 28 Copyright © 2020 Huawet Technologies Ca, Ltd. All nah reserve. Me HuAWe! + Selective QinQ must be configured on the hybrid interface and the qing vlan- translation enable command must have been executed to enable VLAN translation. Selective QinQ can only take effect on the interface in the inbound direction. + When an interface configured with VLAN stacking needs to remove the outer tag from ‘outgoing frames, the interface must join the VLAN specified by stack-vlan in untagged mode. If the outer VLAN does not need to be removed, the interface must join the VLAN specified by stack-vlan in tagged mode& ) Example for Configuring Basic QinQ 00 and VAN 20 ae led for ene an rep 2 ee Page 29 Copyright © 2020 Huai! Teshnoages Co, LA rahe reseed ‘SW1 configuration: Sw] van batch 100 200 [SW] interface Gigabitethernet 0/0/1 # Configure VIAN 100 asthe default VLAN on GEO/0/. ism igabitethereto/0/1} port link-type doti-tunne! SW1 -Gigabitethereto/a/1] port default van 100 SW] Interface Gigabitéthemet 0/0/2 # Configure VLAN 200 as the default VLAN on GEO/0/2, [SW/-Gigabitethereto/0/2} pot lnk-lype dotta-tunne SW -Gigabitethernet0/0/2} port default vian 200 SW] interface GigabitEthemet 0/03 SW -Gigabitthernet0/0/3) port ink-type unk ‘SW -Gigabitthernet0/0/3) port trunk alow pass van 100 200 1 Set the TPID value in the olter VIAN tag [SW1-Cigabitethernetoj0/3} ging protocol 9100 “Te cantguation ot Sasa otha of SW, and not rode Se HvawelPage 20 Copyght © 2020 Huai! Teshnoages Co, Ld Al rahe reseed ED Example for Configuring Selective QinQ SW1 configuration: SW] Man bath 23 SW] rfc GgabiEhere 01 or: nkeype yoni or yg utagned van23 pore van-staching an 100 sacevan 2 Gigabit 00/2 her} pre type ark het} pt rank alow pas van 23 ‘SW -cigebecthere0/92} gut Se nvawer3 Quiz (Single) When a sub-VLAN communicates with an external network at Layer 2, what is the VLAN tagged to packets on the outbound interface? A. Sub-VLAN B. Secondary VIAN . Super-VLAN D. Isolate VLAN (Single) Which of the following statements about QinQ is false? 'A. Qing packets are forwarded based on outer VLAN tags on the public network. B. Qin packets are forwarded based on inner VLAN tags onthe public network . Qin@ provides a simpler Layer 2 VPN tunneling technology. . Qing can be realized through static configuration, without a signaling protocol cen on ne cope Aas ee Se nvaweriz Summary + To implement VLAN aggregation, you need to configure a super-VLAN and sub-VLANs. To enable communication between different sub-VLANs, you need to enable proxy ARP in the super-VLAN. VLAN aggregation prevents complex network address planning caused by subnet assignment and isolates broadcast domains through VLANs. + The MUX VLAN includes a principal VLAN and subordinate VLANs. Subordinate VLANs are classified into separate and group VLANs. A separate interface can communicate only with a principal interface and is isolated from other types of interfaces. A group interface can communicate with a principal interface and the other interfaces in the same group VLAN, but cannot communicate with i other group VLANs or a separate interface. faces in + Qing technology expands the number of VLANs, and allows user packets tagged with private VLAN IDs to be transparently transmitted on the public network. page 32 _Conth © 22nd Co ik Algae Se nvawerThankiyY éu WWW huawei om
You might also like
GPON Huawei OLT Basic Troubleshooting Commands
PDF
No ratings yet
GPON Huawei OLT Basic Troubleshooting Commands
23 pages
06 Huawei VRP and Device Upgrade
PDF
0% (1)
06 Huawei VRP and Device Upgrade
68 pages
Python For Network Engineers - Huawei Presentation - Updated
PDF
No ratings yet
Python For Network Engineers - Huawei Presentation - Updated
44 pages
U2020 Northbound Command Line Interface Developer Guide
PDF
No ratings yet
U2020 Northbound Command Line Interface Developer Guide
49 pages
Counters Related To The Number of RRC Connection Requests For Various Reasons
PDF
No ratings yet
Counters Related To The Number of RRC Connection Requests For Various Reasons
7 pages
Imanager U2000-CME (V200R015) - Northbound Activate Export All Parameters Operation Guide
PDF
No ratings yet
Imanager U2000-CME (V200R015) - Northbound Activate Export All Parameters Operation Guide
9 pages
HCNA-HNTD Intermediate Training Materials V2.2
PDF
No ratings yet
HCNA-HNTD Intermediate Training Materials V2.2
343 pages
5g Shmoocon Final
PDF
No ratings yet
5g Shmoocon Final
61 pages
NetEco App User Guide (PMS Site)
PDF
No ratings yet
NetEco App User Guide (PMS Site)
87 pages
Pico Celdas BTS3900B GSM User Guide - (V600R012 - 01)
PDF
No ratings yet
Pico Celdas BTS3900B GSM User Guide - (V600R012 - 01)
32 pages
HCNA
PDF
No ratings yet
HCNA
89 pages
SMU02B and SMU02C V500R001C30 Site Monitoring Unit User Manual
PDF
No ratings yet
SMU02B and SMU02C V500R001C30 Site Monitoring Unit User Manual
186 pages
NodeB - How To Push Script Changes Huawei
PDF
No ratings yet
NodeB - How To Push Script Changes Huawei
8 pages
Configure Nodeb Through Cme
PDF
No ratings yet
Configure Nodeb Through Cme
9 pages
Configuring Huawei Quidway s3900 Switches - HTML
PDF
No ratings yet
Configuring Huawei Quidway s3900 Switches - HTML
10 pages
Northbound CORBA Interface User Guide (V200R007C03 03) PDF
PDF
No ratings yet
Northbound CORBA Interface User Guide (V200R007C03 03) PDF
299 pages
MA5616 Basic Operation
PDF
No ratings yet
MA5616 Basic Operation
115 pages
DPtech FW1000 Series Application Firewall User Manual v5.0
PDF
No ratings yet
DPtech FW1000 Series Application Firewall User Manual v5.0
415 pages
SoftX3000 Hardware Installation Manual
PDF
No ratings yet
SoftX3000 Hardware Installation Manual
199 pages
NetEco 1000S Inverter Management System Smart I-V Curve Diagnosis User Manual
PDF
No ratings yet
NetEco 1000S Inverter Management System Smart I-V Curve Diagnosis User Manual
41 pages
BSC6900 GSM V900R011C00SPC720 Parameter Reference
PDF
No ratings yet
BSC6900 GSM V900R011C00SPC720 Parameter Reference
4,519 pages
Gpon - Onu: Administration-Manual
PDF
No ratings yet
Gpon - Onu: Administration-Manual
105 pages
Training M2000 (M2000V200R012C00) Configuration Management-20120417-C V1.0
PDF
No ratings yet
Training M2000 (M2000V200R012C00) Configuration Management-20120417-C V1.0
32 pages
Huawei Commands
PDF
No ratings yet
Huawei Commands
4 pages
Book-Level PDF Cisco IOS Interface Command Reference, Release 12.2 T
PDF
No ratings yet
Book-Level PDF Cisco IOS Interface Command Reference, Release 12.2 T
636 pages
ONT Configuration - Nokia
PDF
No ratings yet
ONT Configuration - Nokia
2 pages
GSM Data Transmission Troubleshooting Guide
PDF
No ratings yet
GSM Data Transmission Troubleshooting Guide
88 pages
Gateway ONT Quick Start 13
PDF
No ratings yet
Gateway ONT Quick Start 13
16 pages
HC120115011 QinQ Principles
PDF
No ratings yet
HC120115011 QinQ Principles
21 pages
Training 2 001-225
PDF
No ratings yet
Training 2 001-225
111 pages
Config CISCO ASA5505 PDF
PDF
No ratings yet
Config CISCO ASA5505 PDF
1,638 pages
Huawei OLTs Initial Setup
PDF
No ratings yet
Huawei OLTs Initial Setup
3 pages
(15PG) IManager U2000 Basic Operation Practice Guide
PDF
100% (1)
(15PG) IManager U2000 Basic Operation Practice Guide
39 pages
HCS-Field-R&S V1.1 Training Materials (March.4,2016)
PDF
No ratings yet
HCS-Field-R&S V1.1 Training Materials (March.4,2016)
821 pages
Use NETCONF Python Ncclient To Retrieve The Configuration of IOS
PDF
No ratings yet
Use NETCONF Python Ncclient To Retrieve The Configuration of IOS
13 pages
HCNA-Security-CBSN Constructing Basic Security Network Training
PDF
100% (1)
HCNA-Security-CBSN Constructing Basic Security Network Training
509 pages
Basic Huawei OLT Cli
PDF
No ratings yet
Basic Huawei OLT Cli
2 pages
03 OZO035301 Imanager M2000 Client Application Operation and Maintenance ISSUE6.00
PDF
No ratings yet
03 OZO035301 Imanager M2000 Client Application Operation and Maintenance ISSUE6.00
127 pages
ATN 910&910I&910B&950B V200R003C00 Product Description 01 (CLI)
PDF
No ratings yet
ATN 910&910I&910B&950B V200R003C00 Product Description 01 (CLI)
119 pages
Configuration Guide - Interface Management (V200R002C00 - 01) PDF
PDF
No ratings yet
Configuration Guide - Interface Management (V200R002C00 - 01) PDF
70 pages
Huawei Guide - Basic Configuration
PDF
No ratings yet
Huawei Guide - Basic Configuration
233 pages
Huawei Technologies Co., Ltd. 1
PDF
No ratings yet
Huawei Technologies Co., Ltd. 1
426 pages
SMU02C V500R003C00 Site Monitoring Unit User Manual
PDF
100% (1)
SMU02C V500R003C00 Site Monitoring Unit User Manual
198 pages
Huawei 227463419 RRU Cascading and RRU Interconnection
PDF
No ratings yet
Huawei 227463419 RRU Cascading and RRU Interconnection
4 pages
Huawei CX Frequently Used Commands
PDF
No ratings yet
Huawei CX Frequently Used Commands
14 pages
Configuração OLT DATACOM Com Provisionamento Automático Vlan para Cada PON.
PDF
No ratings yet
Configuração OLT DATACOM Com Provisionamento Automático Vlan para Cada PON.
7 pages
I Manager Huawei
PDF
No ratings yet
I Manager Huawei
289 pages
OSMU User Guide (EulerOS, x86 Rack Server)
PDF
100% (1)
OSMU User Guide (EulerOS, x86 Rack Server)
916 pages
MAG9811 Hardware Description (V100R006C00 - 01) (PDF) - EN
PDF
0% (1)
MAG9811 Hardware Description (V100R006C00 - 01) (PDF) - EN
62 pages
IMaster NetEco V600R022C00 Product Training Slides (O&M)
PDF
No ratings yet
IMaster NetEco V600R022C00 Product Training Slides (O&M)
239 pages
Route Selection and Control On NE Series Routers
PDF
No ratings yet
Route Selection and Control On NE Series Routers
79 pages
Automatic OMCH Establishment (SRAN9.0 - 01) PDF
PDF
No ratings yet
Automatic OMCH Establishment (SRAN9.0 - 01) PDF
131 pages
01-06 VLAN Aggregation Configuration
PDF
No ratings yet
01-06 VLAN Aggregation Configuration
20 pages
01-04 VLAN Aggregation Configuration
PDF
No ratings yet
01-04 VLAN Aggregation Configuration
16 pages
VLAN Configuration Huawei
PDF
No ratings yet
VLAN Configuration Huawei
61 pages
Vlans (Virtual Lans)
PDF
No ratings yet
Vlans (Virtual Lans)
36 pages
How To Configure VLAN
PDF
No ratings yet
How To Configure VLAN
38 pages
CCNA New Version Part 3
PDF
No ratings yet
CCNA New Version Part 3
82 pages
Vlans (Virtual Lans)
PDF
No ratings yet
Vlans (Virtual Lans)
36 pages
3-Example For Configuring VLAN Aggregation
PDF
No ratings yet
3-Example For Configuring VLAN Aggregation
2 pages