1-5VLAN-VPN Configuration ExampleTransmitting User Packets through a Tunnel in the Public Network by UsingVLAN-VPNNetwork requirementsAs shown in Figure 1-3, Switch A and Switch B are both S5600 series switches. They connect the usersto the servers through the public network.z PC users and PC servers are in VLAN 100 created in the private network, while terminal users andterminal servers are in VLAN 200, which is also created in the private network. The VLAN VPNconnection is established in VLAN 1040 of the public network.z Employ VLAN-VPN on Switch A and Switch B to enable the PC users and PC servers tocommunicate with each through a VPN, and employ VLAN-VPN on Switch A and Switch B toenable the Terminal users and Terminal servers to communicate with each other through a VPN.Network diagramFigure 1-3 Network diagram for VLAN-VPN configurationConfiguration procedurez Configure Switch A.# Enable the VLAN-VPN feature on GigabitEthernet 1/0/11 of Switch A and tag the packets received onthis port with the tag of VLAN 1040 as the outer VLAN tag. system-view[SwitchA] vlan 1040[SwitchA-vlan1040] port GigabitEthernet 1/0/11[SwitchA-vlan1040] quit[SwitchA] interface GigabitEthernet 1/0/11[SwitchA-GigabitEthernet1/0/11] vlan-vpn enable[SwitchA-GigabitEthernet1/0/11] quit# Set GigabitEthernet 1/0/12 as a trunk port permitting packets of VLAN 1040.[SwitchA] interface GigabitEthernet 1/0/12[SwitchA-GigabitEthernet1/0/12] port link-type trunk