Skip to main content

VLAN-Transparent Forwarding


VLANs The Ethernet frames that have to be forwarded may reside in different VLANs. This implies that all Ethernet frames contain a (802.1Q) VLAN ID. Communication between different VLANs is not allowed on the link layer. Only routers can make connections between different VLANs. VLANs create thus separated logical Ethernet segments within a single physical segment.

Ethernet QoS Ethernet frames optionally contain a (802.1p) user priority indication. If Ethernet QoS is taken into account during bridging, it can be based on two steps:

  1. Mapping the user priority of an incoming frame to an internal priority class. This classification can be based on:
    • The type of the interface on which the frame is entering the bridge.
    • The (802.1p) user priority value.
    • The IP Type of Service octet (TOS-byte) for IP packets, using the Precedence or DSCP notation.
  2. Sending out the frame while taking into account its internal priority class. This class can be used to:
    • Perform priority queuing on a single PVC.
    • Perform traffic multiplexing over a range of PVCs.
    Scenario Overview Introduction In this scenario, the Gateway is intended to forward all VLAN-tagged frames between the local Ethernet segment and a PVC transparently. This scenario configures the Thomson Gateway as bridge with one PVC. All incoming frames on all local interfaces have to be forwarded transparently to this PVC. The PVC to which all traffic has to be forwarded, is chosen at configuration time. The exact value of the VLAN ID (VID) or the user priority indication should not influence the result. Following illustration shows the VLAN-transparent forwarding scenario:
    Mechanism To set up this scenario, we use following key mechanism: we explicitly define that the Ethernet bridge is not VLAN aware. Ethernet frames coming in on the Thomson Gateway have a VLAN tag in their header. However, neither the VLAN ID nor the user priority indication should be taken into account. If the Ethernet bridge is VLAN aware, we have to define all VLANs that have to pass through the Thomson Gateway. Otherwise, unknown VLANs are dropped. Configuration overview Following configuration steps have to be performed to configure the Gateway for this scenario:
    1. Define which PVC must be used by configuring an ATM interface for it.
    2. Connect the ATM interface to the Ethernet Bridge.
    3. Define that the bridge is not VLAN aware.
    4. Save the configuration.

Comments

Popular posts from this blog

INSTALL CISCO VPN CLIENT ON WINDOWS 10 (32 & 64 BIT). FIX REASON 442

This article shows how correctly install Cisco VPN Client (32 & 64 bit) on Windows 10 (32 & 64 bit) using simple steps, overcome the ‘ This app can’t run on this PC ’ installation error , plus fix the Reason 442: Failed to enable Virtual Adapter error message . The article applies to New Windows 10 installations or Upgrades from earlier Windows versions and all versions before or after Windows 10 build 1511 .  To simplify the article, we’ve broken it into the following two sections: How to Install Cisco VPN client on Windows 10 (clean installation or upgrade from previous Windows), including Windows 10 build prior or after build 1511 . How to Fix Reason 442: Failed to enable Virtual Adapter on Windows 10 Figure 1. The Cisco VPN Client Reason 442: Failed to enable Virtual Adapter error on Windows 10 HOW TO INSTALL CISCO VPN CLIENT ON WINDOWS 10 (NEW INSTALLATIONS OR O/S UPGRADES) The instructions below are for new or clean Windows 10 inst...

Linux File and Directory Permissions

file & directory protection is a essential of any OS and Linux OS is no exception for it! These authorizations allow you to choose exactly who can access your files & directory, providing an overall improved system security. There was one of the major flaws in the older Windows operating-system where, by standard, all users can see each other people's information (Windows 95, 98, Me). For overcoming it, editions of the Windows based computer system such as NT, 2000, XP and 2003 lot more security features added. They fully support file & directory permissions, just as Linux system has since the beginning. Together, we'll now assess a directory listing from our Lab Linux system hosting server, to help us understand the information provided. a simple 'ls' command will give you the file and directory listing within a given directory, including the option  '-l' will display number of new areas that we are going to discuss here:

How to create a Hirens Boot CD 15.2 USB Disk

Hiren’s BootCD (HBCD) is a bootable CD that contains a set of tools that can help users to fix their computer if their system fails to boot. More specifically, HBCD contains hardware diagnostic programs, partition tools, data recovery utilities, antivirus tools and many other tools to fix your computer problems.  I write this article because I use Hiren’s BootCD frequently to troubleshoot computer problems, specially when a computer doesn’t boot anymore due to a virus attack or due to a corrupted file system. In this article you will find instructions on how to put Hiren’s BootCD on a USB flash drive (stick) in order to troubleshoot computer problems in the future.