65 VLAN-VPN ConfigurationWh n configuring VLAN-VPN,e go to these sections for information you are interested in:z VLAN-VPN Overviewz VLAN-VPN ConfigurationDisplaying and Maintaining VLAN-VPN Configurationzn Examplez VLAN-VPN ConfiguratioIntrodspecify to processags. In public networks, packets of this type arehe inner VLANFigure 65-1VLAN-VPN Overviewuction to VLAN-VPNVirtual private network (VPN) is a new technology that emerges with the expansion of the Internet. It canbe used for establishing private networks over the public network. With VPN, you canpackets on the client or the access end of the service provider in specific ways, establish dedicatedtunnels for user traffic on public network devices, and thus improve data security.VLAN-VPN feature is a simple yet flexible Layer 2 tunneling technology. It tags private network packetswith outer VLAN tags, thus enabling the packets to be transmitted through the service providers’backbone networks with both inner and outer VLAN ttransmitted by their outer VLAN tags (that is, the VLAN tags of public networks), and ttags are treated as part of the payload.shows the structure of single-tagged and double-tagged Ethernet frames.Figure 65-1 Single-tagged frame structure vs. double-tagged Ethernet frame structurez els that are simpler.n. That is, signaling protocol-relatedz You can have VLAN IDs of your own, which is independent of public network VLAN IDs.Compared with MPLS-based Layer 2 VPN, VLAN-VPN has the following features:It provides Layer 2 VPN tunnz VLAN-VPN can be implemented through manual configuratioconfiguration is not needed.The VLAN-VPN feature provides you with the following benefits:z Saves public network VLAN ID resource.65-1