< Home

Summary of Layer 2 Protocol Tunneling Configuration Tasks

Table 1 lists the configuration task summary of Layer 2 protocol tunneling.

Table 1 Layer 2 protocol tunneling configuration tasks

Item

Description

Task

Configuring interface-based Layer 2 protocol tunneling

When each interface of a backbone device is connected to only one user network and Layer 2 protocol packets sent from the user network do not need VLAN tags, configure interface-based Layer 2 protocol tunneling on the interface connected to the user network. This configuration allows Layer 2 protocol packets to be transparently transmitted on the backbone network.

Configuring Interface-based Layer 2 Protocol Tunneling

Configuring VLAN-based Layer 2 protocol tunneling

When each interface of a backbone device is connected to multiple user networks and Layer 2 protocol packets sent from user networks contain VLAN tags, configure VLAN-based Layer 2 protocol tunneling. This configuration allows Layer 2 protocol packets to be transparently transmitted on the backbone network.

Configuring VLAN-based Layer 2 Protocol Tunneling

Configuring basic QinQ-based Layer 2 protocol tunneling

When each interface of a backbone device is connected to multiple user networks and Layer 2 protocol packets sent from user networks contain VLAN tags, configure basic QinQ-based Layer 2 protocol tunneling. This configuration allows Layer 2 protocol packets to be transparently transmitted on the backbone network and reduces VLAN IDs that the carrier uses.

Configuring QinQ-based Layer 2 Protocol Tunneling

Configuring VPLS-based Layer 2 protocol tunneling

When the backbone network is the L2VPN that is built based on VPLS, you can configure VPLS-based Layer 2 protocol tunneling so that Layer 2 protocol packets can be transmitted on the backbone network.

Configuring VPLS-based Layer 2 Protocol Tunneling

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >