User's Manual

RDL-3000 User Manual
70-00158-01-DRAFT Proprietary Redline Communications © 2011 Page 37 of 150 November 25, 2010
TLS (Transparent LAN Services)
Extended TLS and Double Tagging
Fig. 19 displays an extension of this configuration in which the TLS is extended via the
Sector Controller and over the backbone to other locations. In order to keep the TLS
traffic separate from the rest of the network, the Sector Controller port for the TLS Group
is configured 'tagged' by a user-specified VID referred to in this example as TLS VID.
This solution allows unmodified traffic to be exchanged between Network B, Network C,
and a remotely located network called TLS Network. If Subscriber B receives a tagged
Ethernet packet from Network B, or Subscriber C receives a tagged Ethernet packet
from Network C, the packet will exit the Sector Controller port double-tagged (Q-in-Q).
When the Sector Controller receives a double-tagged packet from the TLS network that
is classified into the TLS Group, the outer tag is removed before the packet is forwarded
to Network B or C.
Fig. 19: PMP - Operation - TLS - Extended TLS and Double Tagging