Virtual Lan Domain - Avaya 1000 Series Configuration Manual

Secure router
Hide thumbs Also See for 1000 Series:
Table of Contents

Advertisement

VLAN Forwarding with QOS
MAC address used by the Secure Router will be associated with the Ethernet port associated with the
management VLAN.
In a multi-tenant unit (MTU) where customer Internet access is through the Ethernet interface, some form
of bandwidth control is necessary to prevent a high bandwidth customer from blocking others since the
uplink out of the building will typically be less than 10 Mb/s. Avaya provides QoS support to limit customer
bandwidth using a committed rate and burst rate, ensuring that customers get consistent bandwidth
performance as other customers are activated. Avaya's QoS can be configured based on VLAN IDs, in
increments of 64 kbps providing greater control than what is normally available in Ethernet switches.

Virtual LAN Domain

This version supports VLAN-based data forwarding. Essentially, this feature forwards the
packets from one network to another based on the VLAN identifier (rather than routing)
contained in the VLAN header, as defined by IEEE 802.1q. The VLAN packets are generally
termed as tagged packets referring to the VLAN encapsulation of the Ethernet packets.
This version also supports VLD (Virtual LAN Domain). VLD allows a VLAN packet to be tagged
with another level of VLAN header. This is used by service providers to carry the subscriber's
VLAN packets transparently through the provider's VLAN network. The VLD packets are
generally termed as double tagged packets referring to the two levels of VLAN encapsulation of
the Ethernet packets.
Ethernet packets arriving on an interface (say an Ethernet) configured for VLD tagging, are
also tagged (only one level) with the tag ID configured for VLD tagging on that interface. These
single level tagged VLAN packets can now be forwarded on the trunk port (say a WAN
interface) using the VLD forwarding table itself. In the return path, packets arriving on the trunk
port as VLAN packets can be forwarded to the Ethernet interface (based on VLD forwarding
table) and when they exit through the Ethernet, they are untagged one level (since this VLD
tagged interface would have performed one level of untagging anyway).
This enhancement allows users to handle two different types of subscriber traffic on the same
interface. One traffic type is the VLAN traffic generated by the subscriber and typically meant for
office-to-office communication through a service provider network. The other traffic type is the
Ethernet traffic generated by the subscriber for Internet access through the same service
provider.
The management of Secure Routers through a VLAN remains unaffected due to this
enhancement.
264
Avaya Secure Router 1000 Series Configuration Guide
December 2010

Advertisement

Table of Contents
loading

Table of Contents