Creating cvlan to spvlan mapping entries, Figure 86 – Brocade Communications Systems Brocate Ethernet Access Switch 6910 User Manual

Page 784

Advertising
background image

734

Brocade 6910 Ethernet Access Switch Configuration Guide

53-1002581-01

IEEE 802.1Q Tunneling

34

Use this field to set a custom 802.1Q ethertype value for the 802.1Q Tunnel TPID. This feature
allows the switch to interoperate with third-party switches that do not use the standard 0x8100
ethertype to identify 802.1Q-tagged frames. For example, if 0x1234 is set as the custom
802.1Q ethertype on a trunk port, incoming frames containing that ethertype are assigned to
the VLAN contained in the tag following the ethertype field, as they would be with a standard
802.1Q trunk. Frames arriving on the port containing any other ethertype are looked upon as
untagged frames, and assigned to the native VLAN of that port.

The specified ethertype only applies to ports configured in Uplink mode (see

“Adding an

Interface to a QinQ Tunnel” on page 736

). If the port is in normal mode, the TPID is always

8100. If the port is in Access mode, received packets are processes as untagged packets.

Interface

To enable QinQ Tunneling on the switch:

1. Click VLAN, Tunnel.

2. Select Configure Global from the Step list.

3. Enable Tunnel Status, and specify the TPID if a client attached to a tunnel port is using a

non-standard ethertype to identify 802.1Q tagged frames.

4. Click Apply.

FIGURE 86

Enabling QinQ Tunneling

Creating CVLAN to SPVLAN Mapping Entries

Use the VLAN > Tunnel (Configure Service) page to create a CVLAN to SPVLAN mapping entry.

CLI References

“switchport dot1q-tunnel service match cvid” on page 390

Command Usage

The inner VLAN tag of a customer packet entering the edge router of a service provider’s
network is mapped to an outer tag indicating the service provider VLAN that will carry this
traffic across the 802.1Q tunnel. By default, the outer tag is based on the default VID of the
edge router’s ingress port. This process is performed in a transparent manner as described
under

“IEEE 802.1Q Tunneling” on page 730

.

When priority bits are found in the inner tag, these are also copied to the outer tag. This allows
the service provider to differentiate service based on the indicated priority and appropriate
methods of queue management at intermediate nodes across the tunnel.

Advertising