Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
46 views
4-Advanced VLAN Technologies
Uploaded by
moharaki1981
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save 4-Advanced VLAN Technologies For Later
Download
Save
Save 4-Advanced VLAN Technologies For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
46 views
4-Advanced VLAN Technologies
Uploaded by
moharaki1981
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save 4-Advanced VLAN Technologies For Later
Carousel Previous
Carousel Next
Save
Save 4-Advanced VLAN Technologies For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 34
Search
Fullscreen
Te ot BEE Advanced VLAN Technologies onyght ©2020 Haw Teshnoagies Co, Ld Al rahe reseedForeword + VLAN technologies are widely used on campus networks. Typically, VLANs are used to isolate broadcast domains. Each VLAN belongs to a broadcast domain. During network planning, a gateway needs to be allocated to each broadcast domain. If there are too many VLANs, itis difficult to plan IP addresses and a large number of |P addresses may be wasted. + In addition, in large enterprises, internal employees as well as many partners work in the enterprise ‘campus. Partners cannot directly access each other. Each partner needs to be assigned a VLAN for isolation, which makes network management and maintenance difficult. Are there any better technologies to solve these problems? + This course describes several advanced VLAN technologies, including VLAN aggregation, MUX VLAN, and Qing, page conth © 22 an Tess Cok Alas rene Se nvawerObjectives + Upon completion of this course, you will be able to: ® Describe the working mechanism of VLAN aggregation. ® Describe application scenarios of MUX VLAN. ® Describe QinQ implementation. ® Perform configurations of VLAN aggregation, MUX VLAN, and QinQ. Page? Copyright © 2020 Huai! Teshnoages Co, LA rahe reseed Se nvawer) Contents 1. VLAN Aggregation 2, MUX VLAN 3. QinQ Page Copyright © 2020 Huai! Teshnoages Co, Ld Arai reseed Se Hvaweladdress all cannot be used as IP addresses of hosts in to communicate, This wastes IP addresses Gateway. YIANIF 10: 192.168.1.62/26, VLANIF 20: 192.168.1.126/26, LAN 30: 192.168.1.190/26, VIAN 10 9216819726 Page 4 Copyright © 2020 Musee! Techroages 192.168.154)26, | Ga VIAN 20 VIAN 20 192.168.1.128/26 ll oats eserves & ) Background of VLAN Aggregation Usually, a Layer 3 switch uses a Layer 3 logical interface in each VLAN ta allow hosts in different broadcast domains + Ona subnet corresponding to 2 VLAN, the subnet ID, directed broadcast address, and subnet default gateway the VLAN. In addition, IP addresses available ina subnet may exceed the number of hosts. These excess IP addresses cannot be used by other VLANs. Cando tne ante o¢ _) 2 Se nvawer= Overview of VLAN Aggregation to casper ah prs reas amano mate AN (bo 3 sl ete and pe he supervean, Se nvawer Page S_ Copyright © 2020 Husa! Teshnoage Co, LA rahe reseed‘Sub-VLAN 10 Sub-VLAN 20. Sub-VLAN 30 1921681.0- 19216R1e4- 192.168.1128 192.1681 127/24 192.1681391/24 192.168.165/28 teway address of all hosts is 68.1,254/24. opyght ©2020 HuaweTechnoogies Co, Ld Al ahs reseed Principle of VLAN Aggregation VLAN aggregation maps each sub-VLAN to a broadcast domain, associates a super-VLAN with multiple sub-VLANs, and then assigns just one IP subnet to the super-VLAN, This ensures that all sub-VLANs use the IP address of the associated super-VLAN as the gateway IP address to implement Layer 3 connectivity Se nvawer Sub-VLANs share one gateway address to reduce the number of subnet addresses, subnet default gateway addresses, and directed broadcast IP addresses. The switch assigns IP addresses to hosts in sub-VLANs according to the number of hosts. This ensures that each sub-VLAN acts as an independent broadcast domain, conserves IP addresses, and implements flexible addressing.Application of VLAN Aggregation For traditional VLAN technology, each VLAN needs to be assigned a different P address segment. In this example, four Padres Segrnents and four routes are required. n super-VLAN mode, only one P adéres segment needs tobe allocate. Layer 2 VLANS ofthe super-VLAN share the same IP adress segment and Layer 3 gateway n alton, Layer 2 isolation is implementec between VLANS. ronan aed ree es vans tosoane Page” Copyright © 2020 Huai! Teshnoages Co, Ls Araneae Se HvawelCommunication in a Sub-VLAN ‘A sub-VLAN belongs to a broadcast domain, so devices in the same sub-VLAN can directly communicate with each other at Layer 2. Layer? Lay? 4 3 — ‘Sub-VLAN 10 SUB-VLAN 20 192168.1.0/24 9216810724 page 8 Conth © 22 an Tess Co Al gh rene Se nvawerCommunication Between Sub-VLANs ‘After prony ARP is enabled on VLANIF 100 of the super-VLAN, communication between PC1 and PC2 is as follows: ‘When PC finds that PC2 Ison the same network segment a itself and its [ARP table doesnot contain the entry corresponding to PC2, PCI broadcasts an ARP Request packet to request the MAC address of PC2 2. VLANIF 100 corresponding to super-VLAN 100 receives the ARP Request packet from PCI. Because proxy ARP between sub-VLANS is enabled on the gateway, te gateway broadcasts an ARP Request packet to al sub-VLANS oe of Super-VLAN 100 to request the MAC address of PC2 3 After receiving the ARP Request packet, PC2 returns an ARP Reply packet 4. After receiving the ARP Reply packet rom PC2 the gateway sends is MAC Subvian 10 SubMLAN 20 aderes to PC. Then PC1 sends the packets destine for PC2 tothe eee eae 2912s gateway, and the gateway forwards the packets at Layer 3. page conth © 22 ay esos Co Alas resend Se nvawer + When hosts in different sub-VLANs communicate with each other, the hosts send ARP Request packets because IP addresses of the sub-VLANs belong to the same network segment. Actually, different sub-VLANs belong to different broadcast domains. As a result, ARP packets cannot be transmitted to other sub-VLANs, there is no response to ARP Request packets, and the device cannot learn the MAC address of the peer end. As a result, sub-VLANs cannot communicate with each other. + To implement communication between sub-VLANs, enable proxy ARP on the VLANIF interface of the super-VLAN.Zz Layer 2 Communication Between Hosts in Sub-VLANs and Other Devices {GE0/0/0 (Trunk) + Layer 2 communication between hosts in sub- ‘low-pass van 1020 30 VLANs and other devices is the same as Layer 2 SW2 communication within a common VLAN. + A super-VLAN does not belong to any physical interface. That is, a super-VLAN does not process any packet that carries a super-VLAN tag. aoa a Sz SubVLAN 10 SuD-VIAN 20. Sub-VLAN 20 39216R1.1/24 192168.164/24, 192.168..728/24 Page 10 copyright 2020 Huawei Technologies Ca, Ltd All rahts reseed, Se Hvawel + An example of Layer 2 communication of a sub-VLAN is as follows: 2 Packets sent from Host_1 to Switch_1 are tagged with VLAN 10. Although sub- VLAN 10 belongs to super-VLAN 100, SW1 does not change VLAN 10 to VLAN 100 in packets. Packets sent from GEO/0/0 on SW1 are still tagged with VLAN 10. SW1 does not send packets from VLAN 100. When another device sends packets from VLAN 100 to SW1, SW1 discards the packets because there is no physical interface corresponding to super-VLAN 100 on SW1. © For other devices, only sub-VLANs 10, 20, and 30 are valid and all packets are exchanged in the VLANs. The communication between SW1 configured with VLAN aggregation and other devices is similar to normal Layer 2 communication without the super-VLAN. + When a PC in a sub-VLAN needs to communicate with other networks at Layer 3, the PC sends data to the default gateway, that is, the VLANIF interface corresponding to. the super-VLAN, and then routes the data.VLAN Aggregation Configuration Commands 1. Create a super-VLAN. [Huawei-vlan100) aggregate-vian ‘A super-VLAN cannot contain any physical interface, and VLAN 1 cannot be configured as a super-VLAN, The VLAN ID of a super-VLAN must be different from the VLAN ID of a sub- VLAN. 2. Add sub-VLANS to the supet-VLAN. [Huawei-viant00} access-vlan { vlan-id [ to vlan-id2] } Before adding any sub-VLANS to a super-VLAN, ensure that they are not configured with VLANIF interfaces. 3. (Optional) Enable proxy ARP on the VLANIF interface corresponding to a super-VLAN. [Huawei-vlanif100] arp-proxy inter-sub-vian-proxy enable Enable proxy ARP between sub-VLANS. Page 11 Copyright © 2020 Huawet Technologies Ca, Ltd. All nahts reserve. Me HuAWe!terispea05/24 ceoioy 0/0" sws ceo/or| O O VLAN aggregation is configured on SW/1, as shown in the figure. Page 12 Copyright © 2020 Huai! Teshnoages Co, Ls Alrahte reseed Example for Configuring VLAN Aggregation (1) SW1 configuration: [SW van bate 102 Lb [sw ertace gpstetemet [SW-cgnbtetere1 port eye rank [SA1-cgaitetereo( port trunk alow-pas an Yo [sw nerace Ganonememe9}o72 [sWr-cgabetnemeo}(2 port inky trunk [sAr-cigabtetneeo}2 port rn aom-pas van 20 1 crates siperv.an, [sw terace vari 00| [swtearo0 ip aes 1921681256 28 [swear rp itera lan pony endl Se Hvawelterispea05/24 stoi «oy sw copa Cl C VLAN aggregation is configured on SW/1, as shown in the figure. Page 12 Copyright © 2020 Huai! Teshnoage Co, Ls Alrahte reseed Example for Configuring VLAN Aggregation (2) ‘SW1 configuration: [sw vn 200 [sw terace gnbtetemet}3 [sW-cgabtetereo}(3) port nye acess [sW-cnaittheret8] pot deft van 200 'SW2 configuration: (502 van 10 (sw inerace Ggadtemeneo}j2 [sw2-cgabittineme0}92 port nye acess [sw2-cignittnere0}2 pot deta van 10 (502 eta [sW2.cgebittere0}/) port key tank [SW2.cgaiEtere0}1 pot trunk tom: pas van 10 Se nvawer) Contents 1. VLAN Aggregation 2. MUX VLAN 3. QinQ Page 1 Copyright © 2020 Huai! Teshnoage Co, LA rahe reseed Se nvawerBackground of MUX VLAN Con an enterprise network, networks of different departments need to be independent ofeach other. VLAN technology can be used to meet this equirement 3 large-scale enterprise has 2 large number of partners the parners must be able ta access the servers ofthe lemterrise but cannot access each other. In this case, the traditional VLAN technology requires a large number of VLAN IDs and increases the workload of network administrators and maintenance workload “The Multiple VALAN (MUX VLAN) function used to control network resources based on VLANS, Pc pc2_| PC3_ PC Pce Department A_| Department 8 || Guest area page 8 Connth © 2 ay Tess Co Alas rene Se nvawerBasic Concepts of MUX VLAN MUX VLANS are classified into principal VLANs and subordinate VLANs, Subordinate VLANs are classified into separate VLANs and group VLANs. Principal VLAN MUX VLAN Stara pacpaliwrare age Separate VLAN Separate port ld tom ser pent maces Subordinate VAN Thesame goup WAN, bt cant Group VLAN Group port | Smsseh tetas mabe gmp Page 16 Copyright © 2020 Huawet Technologies Ca, Ltd. All nah reserve. Me HuAWe! + Either the separate VLAN or group VLAN must be bound to a principle VLAN. + Interfaces in a principal VLAN can communicate with other interfaces in the same MUX VLAN.CH CH)CH CCH Ca met pea | pcs Pc || esc opyght ©2020 HuaweTechnoogies Co, Ld Al ahs reseed ED Application of MUX VLAN (On a switch, VIANs of departments A and @ are configured as subordinate group VLANS, the VLAN of the guest area is configured a subordinate separate VIAN, and the VLAN of the Interface connacted to the server is configured as the Principal VIAN. In addition, all the subordinate VLANS are bound te the principal VLAN. In this way, the folowing network design requirements are met any in the quest area can access only the server and canot acess Se HvawelMUX VLAN Configuration Commands 1. Configure a principal VLAN for MUX VLAN. {Huawel-lan00] mux-vian The VLAN is configured as a MUX VLAN, that i, principal VLAN, The VLAN ID assigned to a principal VLAN Cannot be used as the super-VLAN or sub-VLAN. 2. Configure a group VAN. {Huawel-vian’00] subordinate group { vian-idf (to vian-id2) } ‘A maximum of 128 group VLANs can be configured for a principal VLAN 3. Configure a separate VLAN {Huawel-lan100] subordinate separate vlan-id Only one separate VLAN can be configured fora principal VLAN. The IDs ofthe group VLAN and separate VLAN in a MUX VLAN must be citferent. 4. Enable the MUX VLAN function on an Interface. {Huawel-Gigabitéthemet0/0/1] port mux-vlan enable vian-id Interfaces of negotiaton-auto and negotiation-desirable types do not support the port mux-vlan enable Page 18 Conyigh 2020 Huse Techno Co, Li. Alles zee Me nvawer + The MUX VLAN function must be enabled to implement the following functions: The principal VLAN and subordinate VLAN can communicate with each other. interfaces in a group VLAN can communicate with each other. Interfaces in a separate VLAN cannot communicate with each other.VIAN 100 Ch C3 CH CF CF CH Department A Department Best area VIAN 10. MAN 20. YAN 0 opyght ©2020 HuaweTechnoogies Co, Ld Al ahs reseed MUX VLAN Configuration Example SW1 configuration: [swt vin bate 1029 30 100 [sa van 100 [sw ner ene) [swr-cgnbitetnere9} port inky acess [sw-cignite nero port taut van 10 ne eon, and arene rode Se Hvawel& ) Verifying the MUX VLAN Configuration Check the VLAN configuration and run the ping command to check the network connectivity between PCS (192.168.15/24) and PC6 (192.168.1.6/24). [sw!}eisplay vlan ‘The total number of vans is:5 U:Up;D:Down, TG: Tagged; UT: Untaggee: MP. Vian-mapaing ST. Vlan-stackng +# ProtocotTransparentvian;* Management-van, Vid Type Ports 0. mux-sub UTSGEO/0/1(U) GE0/0/2(U) 20 mux-sub UTGEO/O/3(¥) —GE0/0/4(U) 30_mux-sub UT-GEO/O/S(U) GE0/0/6(U) 0 ix UTGEO/O/24(U) Page 20. Cepyight © 2020 Huawe! Technologies Co, Lt A ahs reseed PCSpping 192.6816 ing 182,168.16: 32 data bytes, Press CW to break From 192.168.15: Destination host unreachable From 192.1685: Destination host unreachable From 192.168. 5: Destination host unreachable From 192.168.5: Destination host unreachable From 192.168.15: Destination host unreachable ~-192.168.15 ping statistics — ' packets) transmitted © packets) received 100.00% packet loss Se nvawer) Contents 1. VLAN Aggregation 2. MUX VLAN 3. Qing Page 21 Copyright © 2020 Huai! Teshnoages Co, Ls Arai reseed Se nvawer6 ) Overview of QinQ + As Ethernet technologies have been deployed on many networls, using only the VLAN tag defined in IEEE 802.1 cannot effectively identify and isolate a large numberof users. A 12-bit VLAN tag defined in IEEE 802.1Q identifies a maximum of only 4096 VLANs, which is insufficient for a great number of users on the metro Ethernet. 802.1Q-in- 202.10 (Qin) was developed to expand VLAN space beyond 4096 VLANS Qing expands VLAN space by adding an additonal 802.10 tag to 802.10 tagged packets. ‘As shown in the figure, user packets carty double tags an the public network. The Inner tag Isa private netwark tag, and the outer tag Is a public network tag. Public network Enterprise HQ Enterprise branch User packet Private network tag lll Public network tag Page 22 Copyright © 2020 Huai! Teshnoage Co, LA rahe reseed Se nvawerFormat of QinQ Packets In QinQ encapsulation, two VLAN tags are added to the end of the source MAC address field of an untagged Ethernet data frame, Untagged frame DA sa |rvpejtencT| pata | cs Qing DA sa EE) we | pata | rcs encapsulation ec ox6100 pai |r) VLAN ID Ci2bits) meh Pee ro | tr Page 22 Copyright © 2020 usw! Teshnoage Co, LA rahe reseed Me nvawer + Tag Protocol Identifier (TPID): indicates the frame type. The value 0x8100 indicates an 802.1Q-tagged frame. A device that does not support 802.1Q discards 802.1Q frames. For the inner 802.1Q tag, the value is set to 0x8100. For the outer 802.1Q tag, different vendors may use different values. 0x8100: is used by Huawei routers. 0x88A8: 802.1ad specifies that the TPID in the outer 802.1Q tag is 0x88a8. + Ona Huawei device, the default value of the outer 802.1Q tag is 0x8100, which can be changed using a command.ED QinQ Implementation Devices forward packets over the public network based on outer VLAN tags of packets, and learn MAC addresses from the outer VLAN tags. The private VLAN tags in the packets are forwarded as payload of the packets. Even ifthe private network VLAN tags are the same, the public network VLAN tags can be used to differentiate users. [1-10 J =a a WLANs 1-20 IANS 10 TI Packets of enterprise 8 + The private VLANs of enterprise A and enterprise B are VLANs 1 to 10 and VLANs 1 to 20, respectively. The public network allocates public VLANs 3 and 4 to enterprise A and enterprise B respectively. When tagged packets from enterprises A and B arrive at the public network, they are tagged with additional VLAN tags, that is, VLAN 3 for enterprise A's packets and VLAN 4 for enterprise B's packets. In this way, packets from enterprise networks are separately transmitted on the public network, even though the two networks have overlapping VLAN IDs. After packets traverse the public network, public VLAN tags of the packets at the receiving PE are removed. Then the packets are forwarded to the CE of their respective user network.Implementation of QinQ — Basic QinQ Packet processing of basic QinQ: 1. SW receives a packet tagged with VIAN 10 or 20 and sends the packet to sw2 2. When receiving the packet, SW2 adds an outer tag with VLAN 100 tothe packet 3. The packet with double tagsis forwarded according tothe Layer? forwarting process. 4 ter receiving the packet from VLAN 100, SW3 removes the cuter tag with VLAN 100, SW3 then sends the packet that cartes only one tag with VIAN 10 or 20 to Wa 5. After receiving the packet, SW forwards according to its VLAN ID and destination MAC adress. page 25 _conth © 22 an esos Lk. Alas rene Se nvawer + Basic QinQ is implemented based on interfaces. When a packet arrives at an interface that has basic QinQ enabled, the device will tag it with the interface's default VLAN tag, regardless of whether the packet is already tagged or untagged. After being processed by basic QinQ on an interface, single-tagged packets change into double- tagged packets, and untagged packets change into single-tagged packets with the default VLAN tag of the interface. + Interface-based QinQ inflexibly encapsulates the outer VLAN tag. The device on which interface-based QinQ is enabled cannot change the encapsulation method used for the outer VLAN tag based on service types.Implementation of QinQ — Selective QinQ Packet processing of selective QinQ 1. When receiving the packet tagged with VLAN 10 or VLAN 20, WT Forwards the packet to SW2 2. When receiving the packet tagged with VLAN 10, SW2 adds an ‘outer tag With VLAN 100 tothe packet When receiving the packet tagges with VLAN 20, SW2 adds an outer tag with ‘VIAN 200 to the packet. 3. The packet with double tags is forwarded according tothe Layer? forwarding proces. 4, Alter receiving the packet, SW3 removes the outer tag with ‘VLAN 100 of 200, 3 then sends the packet that cartes only jane tag with VLAN 10 ar 20 to SW, Alter receiving the packet, SW forwards it according to its ‘VIAN ID and destination MAC adress. page 26 Conth © 22 an Tego ik. Algae Se nvawer + Selective QinQ allows the device to select whether to tag packets, or determine the type of outer VLAN tags to be encapsulated, according to the traffic classification result, Selective QinQ can classify traffic based on the VLAN tag, priority, MAC address, IP protocol, source IP address, destination IP address, or port number of an application program. + VLAN ID-based selective QinQ: adds outer VLAN tags based on inner VLAN IDs. + 802.1p priority-based selective QinQ: adds outer VLAN tags based on 802.1p priorities in inner VLAN tags. + Traffic policy-based selective Qin: adds different outer VLAN tags based on QoS policies so that differentiated services can be provided based on service types. + Selective QinQ is an extension of basic QinQ and is more flexible. The difference is as follows: = Basic QinQ: adds the same outer VLAN tag to all packets arriving at a Layer 2 interface. © Selective QinQ: adds different outer VLAN tags to packets arriving at a Layer 2 interface based on inner VLAN tagsQinQ Application on Campus Networks Scenario Requirements ee Y a - Solution = 3. Gini depen te cena octane oe 27 cepa ato Hua Techs co, Alla seve Se nvawer + Broadband Remote Access Server (BRAS): The BRAS aggregates and forwards service flows, meeting different user requirements for the transmission rate and broadband utilization. Therefore, it is the core device for broadband user access. + Broadcast, unknown unicast, and multicast (BUM): The switch floods BUM packets.QinQ Configuration Commands 1. Configure the interface as a dottg tunnel interface. [Huawei-Gigabitethemet0/0/1) port link-type dotfq-tunnet rank inter The interface ean be a physical interface or an Eth 2. Enable VLAN translation on an interface. [Huawei-Gigabitéthemet0/0/1] ging vian-translation enable 3. Configure selective Qing [Huawei-igabitethernet0/0/1] port vlan-stacking vlan vlan-id! [ to vlan-id2] stack-vlan vian-id3 [ remark- 2021p 8027p-value | Configure different outer VLAN tags for different inner VLAN tags. By default, the priority of the outer VLAN tag isthe same as that of the inner VLAN tag, Page 28 Copyright © 2020 Huawet Technologies Ca, Ltd. All nah reserve. Me HuAWe! + Selective QinQ must be configured on the hybrid interface and the qing vlan- translation enable command must have been executed to enable VLAN translation. Selective QinQ can only take effect on the interface in the inbound direction. + When an interface configured with VLAN stacking needs to remove the outer tag from ‘outgoing frames, the interface must join the VLAN specified by stack-vlan in untagged mode. If the outer VLAN does not need to be removed, the interface must join the VLAN specified by stack-vlan in tagged mode& ) Example for Configuring Basic QinQ 00 and VAN 20 ae led for ene an rep 2 ee Page 29 Copyright © 2020 Huai! Teshnoages Co, LA rahe reseed ‘SW1 configuration: Sw] van batch 100 200 [SW] interface Gigabitethernet 0/0/1 # Configure VIAN 100 asthe default VLAN on GEO/0/. ism igabitethereto/0/1} port link-type doti-tunne! SW1 -Gigabitethereto/a/1] port default van 100 SW] Interface Gigabitéthemet 0/0/2 # Configure VLAN 200 as the default VLAN on GEO/0/2, [SW/-Gigabitethereto/0/2} pot lnk-lype dotta-tunne SW -Gigabitethernet0/0/2} port default vian 200 SW] interface GigabitEthemet 0/03 SW -Gigabitthernet0/0/3) port ink-type unk ‘SW -Gigabitthernet0/0/3) port trunk alow pass van 100 200 1 Set the TPID value in the olter VIAN tag [SW1-Cigabitethernetoj0/3} ging protocol 9100 “Te cantguation ot Sasa otha of SW, and not rode Se HvawelPage 20 Copyght © 2020 Huai! Teshnoages Co, Ld Al rahe reseed ED Example for Configuring Selective QinQ SW1 configuration: SW] Man bath 23 SW] rfc GgabiEhere 01 or: nkeype yoni or yg utagned van23 pore van-staching an 100 sacevan 2 Gigabit 00/2 her} pre type ark het} pt rank alow pas van 23 ‘SW -cigebecthere0/92} gut Se nvawer3 Quiz (Single) When a sub-VLAN communicates with an external network at Layer 2, what is the VLAN tagged to packets on the outbound interface? A. Sub-VLAN B. Secondary VIAN . Super-VLAN D. Isolate VLAN (Single) Which of the following statements about QinQ is false? 'A. Qing packets are forwarded based on outer VLAN tags on the public network. B. Qin packets are forwarded based on inner VLAN tags onthe public network . Qin@ provides a simpler Layer 2 VPN tunneling technology. . Qing can be realized through static configuration, without a signaling protocol cen on ne cope Aas ee Se nvaweriz Summary + To implement VLAN aggregation, you need to configure a super-VLAN and sub-VLANs. To enable communication between different sub-VLANs, you need to enable proxy ARP in the super-VLAN. VLAN aggregation prevents complex network address planning caused by subnet assignment and isolates broadcast domains through VLANs. + The MUX VLAN includes a principal VLAN and subordinate VLANs. Subordinate VLANs are classified into separate and group VLANs. A separate interface can communicate only with a principal interface and is isolated from other types of interfaces. A group interface can communicate with a principal interface and the other interfaces in the same group VLAN, but cannot communicate with i other group VLANs or a separate interface. faces in + Qing technology expands the number of VLANs, and allows user packets tagged with private VLAN IDs to be transparently transmitted on the public network. page 32 _Conth © 22nd Co ik Algae Se nvawerThankiyY éu WWW huawei om
You might also like
Imaster NCE-Campus V300R024C00SPC100 Release Notes
PDF
No ratings yet
Imaster NCE-Campus V300R024C00SPC100 Release Notes
48 pages
Python For Network Engineers - Huawei Presentation - Updated
PDF
No ratings yet
Python For Network Engineers - Huawei Presentation - Updated
44 pages
VLAN Configuration Huawei
PDF
No ratings yet
VLAN Configuration Huawei
61 pages
Basic Huawei OLT Cli
PDF
No ratings yet
Basic Huawei OLT Cli
2 pages
HCNA-HNTD Intermediate Training Materials V2.2
PDF
No ratings yet
HCNA-HNTD Intermediate Training Materials V2.2
343 pages
HCNA
PDF
No ratings yet
HCNA
89 pages
MA5800 Security Hardening and Maintenance Guide 08
PDF
No ratings yet
MA5800 Security Hardening and Maintenance Guide 08
188 pages
Olt Configuration Detail PDF
PDF
No ratings yet
Olt Configuration Detail PDF
108 pages
Huawei OLTs Initial Setup
PDF
No ratings yet
Huawei OLTs Initial Setup
3 pages
07-Huawei FTTO Solution IMaster NCE Platform V1.3- 5月26日
PDF
No ratings yet
07-Huawei FTTO Solution IMaster NCE Platform V1.3- 5月26日
75 pages
Imanager U2000-CME (V200R015) - Northbound Activate Export All Parameters Operation Guide
PDF
No ratings yet
Imanager U2000-CME (V200R015) - Northbound Activate Export All Parameters Operation Guide
9 pages
MA5616 Service Configuration For HSI+IPTV (ADSL)
PDF
No ratings yet
MA5616 Service Configuration For HSI+IPTV (ADSL)
88 pages
BSC6900 GSM V900R011C00SPC720 Parameter Reference
PDF
No ratings yet
BSC6900 GSM V900R011C00SPC720 Parameter Reference
4,519 pages
DPtech FW1000 Series Application Firewall User Manual v5.0
PDF
No ratings yet
DPtech FW1000 Series Application Firewall User Manual v5.0
415 pages
Configuration Dslam ATM Huawei MA5100
PDF
100% (1)
Configuration Dslam ATM Huawei MA5100
3 pages
SMU02C V500R003C00 Site Monitoring Unit User Manual
PDF
No ratings yet
SMU02C V500R003C00 Site Monitoring Unit User Manual
198 pages
Configuration Guide - Interface Management (V200R002C00 - 01) PDF
PDF
No ratings yet
Configuration Guide - Interface Management (V200R002C00 - 01) PDF
70 pages
How To Quickly Configure The OLT Huawei MA5608T With ONT Huawei
PDF
100% (2)
How To Quickly Configure The OLT Huawei MA5608T With ONT Huawei
5 pages
ALCOMA ALxxF Class Carrier Radio Description
PDF
No ratings yet
ALCOMA ALxxF Class Carrier Radio Description
91 pages
NodeB - How To Push Script Changes Huawei
PDF
No ratings yet
NodeB - How To Push Script Changes Huawei
8 pages
Training 2 001-225
PDF
No ratings yet
Training 2 001-225
111 pages
Huawei Esight Full Product Datasheet
PDF
No ratings yet
Huawei Esight Full Product Datasheet
50 pages
Ma5612configurationguidev800r308c0004 120820003950 Phpapp02
PDF
100% (1)
Ma5612configurationguidev800r308c0004 120820003950 Phpapp02
488 pages
Install Open VPN On Ubuntu
PDF
No ratings yet
Install Open VPN On Ubuntu
11 pages
Configuration MSAN
PDF
No ratings yet
Configuration MSAN
31 pages
NetEco App User Guide (PMS Site)
PDF
No ratings yet
NetEco App User Guide (PMS Site)
87 pages
6.FTTx GPON System Troubleshooting
PDF
No ratings yet
6.FTTx GPON System Troubleshooting
33 pages
HC120115011 QinQ Principles
PDF
No ratings yet
HC120115011 QinQ Principles
21 pages
FTTM Configuration Guide 02
PDF
No ratings yet
FTTM Configuration Guide 02
148 pages
OLT2412 UsersGuide 4.00
PDF
100% (1)
OLT2412 UsersGuide 4.00
326 pages
I Manager Huawei
PDF
No ratings yet
I Manager Huawei
289 pages
(Brochure) Huawei RTN 950
PDF
No ratings yet
(Brochure) Huawei RTN 950
2 pages
Huawei Technologies Co., Ltd. 1
PDF
No ratings yet
Huawei Technologies Co., Ltd. 1
426 pages
Chapter 9: Determining IP Routes
PDF
No ratings yet
Chapter 9: Determining IP Routes
70 pages
SMU02B and SMU02C V500R001C30 Site Monitoring Unit User Manual
PDF
No ratings yet
SMU02B and SMU02C V500R001C30 Site Monitoring Unit User Manual
186 pages
Product Description (Super, Compatible With X86) : Imaster Nce V100R019C00
PDF
No ratings yet
Product Description (Super, Compatible With X86) : Imaster Nce V100R019C00
245 pages
3 HH 044590172 Fmzza 01
PDF
No ratings yet
3 HH 044590172 Fmzza 01
176 pages
Huawei Guide - Basic Configuration
PDF
No ratings yet
Huawei Guide - Basic Configuration
233 pages
Huawei HG8247 Huawei Router Default Configuration
PDF
No ratings yet
Huawei HG8247 Huawei Router Default Configuration
3 pages
Imaster Nce v100r019c10spc200 Tl1 Nbi User Guide 01
PDF
No ratings yet
Imaster Nce v100r019c10spc200 Tl1 Nbi User Guide 01
5,203 pages
(15PG) IManager U2000 Basic Operation Practice Guide
PDF
100% (1)
(15PG) IManager U2000 Basic Operation Practice Guide
39 pages
Internet Config Guide For Gpon
PDF
No ratings yet
Internet Config Guide For Gpon
4 pages
HCIA-WLAN V3.0 Lab Guide
PDF
No ratings yet
HCIA-WLAN V3.0 Lab Guide
70 pages
Pico Celdas BTS3900B GSM User Guide - (V600R012 - 01)
PDF
No ratings yet
Pico Celdas BTS3900B GSM User Guide - (V600R012 - 01)
32 pages
RL8008G V20 Start The Template
PDF
No ratings yet
RL8008G V20 Start The Template
6 pages
BSC6900 GSM Hardware Description (V900R013C00 - 09) (PDF) - en
PDF
No ratings yet
BSC6900 GSM Hardware Description (V900R013C00 - 09) (PDF) - en
281 pages
Mimosa B5c
PDF
No ratings yet
Mimosa B5c
55 pages
Northbound CORBA Interface User Guide (V200R007C03 03) PDF
PDF
No ratings yet
Northbound CORBA Interface User Guide (V200R007C03 03) PDF
299 pages
Cisco Commands Cheat Sheet
PDF
No ratings yet
Cisco Commands Cheat Sheet
13 pages
ZXR10 M6000 (V2.00.20) Carrier-Class Router Configuration Guide (IPv4 BRAS)
PDF
No ratings yet
ZXR10 M6000 (V2.00.20) Carrier-Class Router Configuration Guide (IPv4 BRAS)
362 pages
MA5800 X17 Datasheet
PDF
No ratings yet
MA5800 X17 Datasheet
8 pages
Huawei
PDF
No ratings yet
Huawei
49 pages
01-06 VLAN Aggregation Configuration
PDF
No ratings yet
01-06 VLAN Aggregation Configuration
20 pages
01-04 VLAN Aggregation Configuration
PDF
No ratings yet
01-04 VLAN Aggregation Configuration
16 pages
Vlans (Virtual Lans)
PDF
No ratings yet
Vlans (Virtual Lans)
36 pages
How To Configure VLAN
PDF
No ratings yet
How To Configure VLAN
38 pages
CCNA New Version Part 3
PDF
No ratings yet
CCNA New Version Part 3
82 pages
Dell FTOS 03c VLAN Configuration
PDF
No ratings yet
Dell FTOS 03c VLAN Configuration
10 pages
Vlans (Virtual Lans)
PDF
No ratings yet
Vlans (Virtual Lans)
36 pages
3-Example For Configuring VLAN Aggregation
PDF
No ratings yet
3-Example For Configuring VLAN Aggregation
2 pages