iTable of Contents1 VLAN-VPN Configuration··························································································································1-1VLAN-VPN Overview ······························································································································1-1Introduction to VLAN-VPN···············································································································1-1Implementation of VLAN-VPN·········································································································1-2Adjusting the TPID Values of VLAN-VPN Packets ·········································································1-2VLAN-VPN Configuration························································································································1-3Configuration Task List····················································································································1-3Enabling the VLAN-VPN Feature for a Port ····················································································1-3TPID Adjusting Configuration ··········································································································1-3Displaying VLAN-VPN Configuration ······································································································1-4VLAN-VPN Configuration Example·········································································································1-4Transmitting User Packets through a Tunnel in the Public Network by Using VLAN-VPN·············1-42 Selective QinQ Configuration···················································································································2-1Selective QinQ Overview ························································································································2-1Selective QinQ Overview·················································································································2-1Inner-to-Outer Tag Priority Mapping································································································2-2Selective QinQ Configuration··················································································································2-2Configuration Task List····················································································································2-2Enabling the Selective QinQ Feature for a Port ··············································································2-2Configuring the Inner-to-Outer Tag Priority Mapping Feature·························································2-3Selective QinQ Configuration Example···································································································2-3Processing Private Network Packets by Their Types ·····································································2-3