VPLS, PPB, EVPN and VxLAN Diagrams
|
|
- Alexandra Fox
- 6 years ago
- Views:
Transcription
1 VLS, B, EVN and VxLAN Diagrams Contents 1. VLS Signalling: An overview of how VLS is signalled to create the pseudowires and how the different labels are chosen. This based on the following document: VLS with BG Signalling - Cisco TAC Document ID VLS Issues: Common issues experienced within a VLS setup. 3. B Switching: A look at the path a packet will take through a BB Switched network, including the different labels and identifiers used. This is partially based on Any images marked with taken from the document, I claim no credit for their creation. are 4. EVN Overview: Shows the operation and principles involved in EVN. This is partially based on apricot-evpn-presentation_ pdf. Any images marked with credit for their creation. are taken from the document, I claim no 5. EVN Operation: More detailed notes on the processes involved in EVN. 6. BB-EVN: Some of the basic processes involved when the above two technologies work together (MAC learning and advertisements) 7. Inter-operation: A conceptual diagram showing how B-EVN and VLS technologies could interrelated in a Service rovider core. 8. VxLAN: A very brief overview of a VxLAN packet. by Steven Crutchley
2 router bgp 1 l2vpn context ONE vpn id 100 autodiscovered bgp singaling bgp ve id 1001 ve range 50 route-target export 32:64 route-target import 32:64 If A BG Router Reflector runs software that does not support RFC 4761, but does have support for RFC 4762, the special BG neighbor x.x.x.x prefixlength-size 2 configuration command is needed on the Route Reflector so it can reflect the BG updates used for RFC RFC 4762: VLS Discovery = BG (auto) Signalling = LD RFC 4761: VLS Discovery = BG (auto) Signalling = BG (auto) VLS - BG Signalling Operation Based on VLS with BG Signalling - Cisco TAC Document ID LD still used as hop-by-hop used for tunnel labels 3 If the process of selecting a label fails 1 will notice, when it gets an update from 3. Knowing its own advertised label range, it will see that the VE-ID will fall outside of the VBO <= VE-ID < (VBO + VBS) test. So in reaction, 1 will send a new update with new VBO and LB values. It should now accommodate the VE-ID of 3. 3 may do the same in the opposite direction. Both advertised blocks will show in show bgp commands. Blocks of contiguous VE-IDs are less likely to require second BG messages to be sent. mpls label range router bgp 1 roblem Statement VLS needs point-to-mutlipoint Ws. s within one VLS Realm could be manually configured or discovered using BG. But targeted LD would still be needed for signalling. This diagram shows how to use BG for signalling (RFC4761). ibg is used because of its full mesh requirement with Router Reflectors. There would be two methods to send updates: 1. Send one update per W. But this goes to all routers and only one of them can use this information (the that is the other end of the W in question) 2. To avoid a high level of updates, one local router sends a set/block of local VC labels to all remote routers. Each remote picks a VC label in a unique fashion, so that no other picks the same one. There must be enough labels and they must not be wasted. This diagram describes this second method. ID N L R I C o m m u n i t i e s Signalling (octets) Indentity Length (2) RD (8) VE ID (2) VE Block Offset (2) VE Block Size (2) Label Base (3) Extended Comm Type (2) Encapsulation Type (1) Control Flags (1) Layer 2 MTU (2) Reservered (2) Additional RTs (import, export ) BG Signalling Update BG sender - afi/safi 25/65. l2 router-id <id> identity of the VLS domain. If not configured format is ASN:vpn_id (VE-ID) must be a unique to each to identify it within the VLS domain RR (VBO) gap used if more than one block needs to be sent. VBO = RND (VE-ID/VBS) * VBS (VBS) size of the block set (default 10). ve range (LB) first free label in the block 0x800A Encapsulation Type (1) 0-5 must be zero. 6 = C for control word. 7 = S for sequencing imports and exports from an L2VN like MLS L3VN RND = the maximum value out of the division result, rounded down or 1. Full mesh reflection 2 To select VC label from block sent by 1, it must determine if VBO is within range of its configuration. Note the VBO will be very close to the LB. This is essentially the range the 1 is offering 2. VBO <= VE-ID < (VBO + VBS) If this passes, VC label is determined using: LB + VE-ID - VBO Examples VBS of 20, VBO of 5 and LB of 10. VBO + VBS = 25. VE-ID of 6 succeeds. 5<=6<25 Label = =11 VE-ID of 26 fails. 26>25 Label = =31 (above block) VE-ID of 3 fails. 3<5 Label = =8 (below block) The successful label is used as the remote label in the output (10002 in the example shown) The same process is done in the opposite direction l2vpn context ONE vpn id 100 autodiscovered bgp singaling bgp ve id 1002 ve range 50 route-target export 32:64 route-target import 32:64 mpls label range VE-ID = 3 (VC Label 8) VE-ID = 6 (VC Label 11) VE-ID = 26 (VC Label 31)
3 VLS Issues MAC Learning Flood ARs and BUM traffic Learn Source MAC Multihoming BDUs Multi homed s can get their own packet back from the core MAC Move MAC moves - wait for MaxAge
4 acket ath through Switched BB Network Customer C Legend S = Assigned by supplier for bridged network B = Assigned by supplier for backbone bridged network C = Assigned by customer DA = Destination MAC Address SA = Source MAC Address TAG = VLAN tag (also termed VLAN) SID = Service ID C-Switch BUM = Broadcast, Multicast or Unknown Unicast (when referring to traffic) 802.1ad QinQ Devices B = rovider Edge Bridge CB = Core rovider Bridge 802.1ah BB Devices BEB = rovider Backbone Edge Bridge BCB = rovider Backbone Core Bridge Customer switch adds a VLAN tag onto the packet and sends it over a trunk link across their network and ultimately up to the provider B CB B assed to rovider s Backbone Network Service rovider, using QinQ, adds their own VLAN tag (S- TAG) to the frame S-TAG assed through Service rovider 802.1ad core S-TAG BEBs > Each BEB is identified by a unique unicast B-MAC Address. > BEBs learn and forward based on both C-MAC and B- MAC addresses. > It builds a map of C-MAC to B-MAC addresses. Bridge Forwarding Database (Bridge FDB) Within the B-MAC address space or core: The FDB to use is selected based on the B-TAG. Within the C-MAC Address space: Frames coming in from access (from 802.1ad) have their FDB selected based on the S-TAG. Frames coming in from the B-MAC core: Have their FDB selected based on the I-SID Set to egress BEBs MAC (BEB2-MAC) BEB1 Entire Frame is encapsulated using 802.1ah. This includes a 24bit SID (breakdown below), an optional VLAN tag for the BB network and the source and destination MAC addresses within the BB network. B-MAC address space. Forwarding based on outer B-MAC. B-DA B-SA B-TAG B BEB2 BCB S-TAGs are mapped to SIDs SID same length as VLAN header SIDs are bundled into B-TAG VLANs if used. B-TAG defines the transport topology in the BB network C DEI UCA RES I-SID S-TAG S-TAG CB C = priority code points DEI = drop eligibility indication UCA = Use customer address RES = Reserved I-SID = Actual identifier value for the SID (Service Instance Identifier) B C-Switch Customer C you only care about the ORT. Not the tagging. ort-based Service Interface (UNI) Each I-SID will have a multicast group for BUM traffic so think how this will affect things if many customers map to one I-SID (See BUM Network acket Flow diagrams below) Looking at S-TAG Service Interfaces (below) as an example, this depends on how customers are mapped to S-TAGs or SIDs. It could be one customer per S-TAG in the 802.1ad realm. If the provider doesn t want to separate them in the core you could use S- TAG port mode. Or give them each their own setup and use S-TAG Mode. Or some customers could use multiple S-TAGs (in which case you might what S-TAG bundle mode). Or maybe each customer does only have one S- TAG each and you want to give a fixed number of internal topologies rather than one each (also bundle mode) similar to mapping VLANs to MST instances S-Tagged Service Interface (UNI) s, Untagged and riority tagged frames all map to one SID. All S-TAGs map to one SID Each S-TAG maps to own SID Some S-TAGs map to some SIDs I-Tagged Service Instance (Inter-provider NNI) (In these diagrams the term TAG has been replaced with VLAN) C-Tagged Service Interface (UNI) (In these diagrams the term TAG has been replaced with VLAN) Looking one level deeper just at I-SIDs. I-TAG = SID + + In this instance there is no 802.1ad network. Comes straight from customer VLANs. If it is a one to one mapping you don t need to worry about the VLAN tag but if multiple VLANs map to one SID (either because it is multiple customers or one customer wants different treatment for multiple VLANs) you do need to carry the VLANs. SIDs translated. SIDs can be bundle into B-TAGs allowing for independent provider topologies Each SID limited to single provider. B-DA might need translating. Single on UNI mapped to one SID each - doesn t need to carry over. However Bundle Mode means that multiple s are mapped to single SID (i.e. the C- TAG does matter) Some parts of this diagram have been based on BRKSG-2203.pdf
5 EVN L3VN EVN Multihomed devices can be > Single-Active: with one active > All-Active: with multiple active s (will need split horizon and designated forwarding) EVI 4 VRF MLS or VXLAN control plane 3 1 Data lane learning can be static or dynamic LD still used as hop-by-hop for tunnel labels 1 3 Overview AFI = 25 (L2VN), SAFI = 70 (EVN). ECM from mutlihomed s is possible. EVI is a VN instance (like a VRF for L3VN). ESI is a link that connects the to the s. advertises MAC addresses and next hops from s using MBG Full mesh reflection 2 LAG (with All Active mode) L2 and L3 services in one VN. Multiple Data lane encapsulation models (MLS or VXLAN). AR or ND proxy ( responds on behalf of client) No more flood-and-learn. re-signalled FDB used instead. You can control who learns what MAC (using policies). This update will be one of the route types shown below BG Update (octets) RD (8) ESI (10) Ethernet Tag ID (4) MAC Length (1) MAC Address (6) I Length (1) I Address (0, 4 or 16) MLS Label 1 (3) MLS Label 2 (0 or 3) Each EVI (just like a VRF) has an RD (?) Ethernet Segment Identifier Broadcast domain (VLAN) for the EVN 48-bit MAC address 0 for no I, 4 for Iv4 and 16 for Iv6 MLS Label for EVI (?) Label for split horizon BUUM traffic (?) RR Services Overview VLAN Based - one to one 1:1 mapping of VLAN to EVI. VLAN translation allowed. Single bridge domain per EVI. Ethernet tag in route is set to 0. A VLAN WILL MA TO AN EVI MUCH LIKE A VLAN (S-TAG or ) MAD TO AN I-SID One EVI per VLAN (possibly indicating each customer is represented by one VLAN. OR each customers VLAN gets an EVI). When carried across an EVI the Ethernet Tag ID isn t needed to differentiate. EVN Data lanes (including VXLAN) Ext comms VLAN Bundle - EVI doesn t care about the VLAN and multiple VLANs map to it Multiple to one mapping of VLAN to EVI. Still single bridge domain for each EVI. MACs need to be unique across VLANs. No VLAN translation. Ethernet tag in route is set to 0. Mapping multiple VLANs to one EVI the only catch is that duplicate MACs could cause issues. VLANs are not carried across. (BB functionality over MLS) VLAN Aware - EVI cares about what the VLAN is Multiple to one Mapping of VLAN to EVI. Multiple broadcast domains. One bridge domain per VLAN. VLAN translation allowed (look at left then right VIDs). Ethernet tag is set to configured tag (VLAN). Some parts of this diagram have been based on conference.apnic.net/data/37/ apricot-evpnpresentation_ pdf Mapping multiple VLANs to one EVI but the VLAN is cared about, so you have one broadcast domain per EVI (e.g. the Ethernet tag is not zero) - possibly one customer with multiple VLANs.
6 EVN Operation Can have same DFs for all ESIs or different DFs for different ESIs DF All-Active MULTIHOMING and SLIT HORIZON Split horizon = BUM traffic from one ESI is not forwarded back onto the same ESI. A split horizon label is advertised by s for filtering. 1 s connected to multihomed s discover each other through auto discovery. One is selected the DF (designated forwarder). 2 Blocks BUM traffic to avoid duplication Non-BF blocks BUM flooding. 4 You could have spoofed or AR/ND roxy untrusted sources additionally you could get large levels of unknown unicast All MACs and Is are 2 advertised by all s. Snooping reduces unknown unicast flooding. 2 rovisioning MACs can eliminate it entirely. 4 MAC learned These s know that the MAC Aliasing address in question is reachable MAC not learned Load balance to All Active setups over a give ethernet segment (represented by ESI) and so can load balance between the two 1 3 s connected to that ESI. 1 (MAC Address) 2 Advertisement is mapping MAC to ESI 2 2 doesn t need to learn the source MAC to have it be involved in the load balancing. It does not need to advertise anything. This setup could also be used for Active-Standby 4 MAC Mobility MAC/I Seq# 2 Highest MAC (included in an extended If learned via Sequence wins community) data plane, may not detect move and won t send withdrawal. Device moved to new location within network 4 This triggers withdrawal of old MAC Default Gateway Inter-subnet Forwarding GATEWAY GATEWAY EVN Supports inter-subnet forwarding when I routing is required. No additional separate L3VN Functionality is needed. EVN uses the default gateway. 2 GATEWAY One or more s are configured as the default gateway, or :: MAC is advertised with default gateway extended community. Local s respond to AR/ND requests for default gateway 4 GATEWAY Enables efficient routing at local MAC Mass-Withdrawal Withdraw ESI 2 advertises two routes (1) MAC/I address and its ESI If failure affects an ESI the simply withdraws routes for that ESI. Remote s remove failed 4 (2) Connectivity to ESIs from path for all MAC addresses associated with an ESI. Fast convergence. Don t have to wait for individual MAC addresses to be withdrawn
7 BB-EVN Overview (view of the packet on the wire in the core) Tunnel Label EVN Label Flow Label Control Word B-DA B-SA I-SID MLS Core BEB MAC address to MAC address mapping BEB- Frames encapsulated in BB headers (MAC-in- MAC) BEB- BEB- RR EVN advertises MACs using BG BEB- (1) MAC Learning MLS Core aaaa.aaaa.aaaa BEB- (2) BEB- bbbb.bbbb.bbbb BEB- RR BG Core only knows B-MACs BEB- cccc.cccc.cccc (1) acket goes to BEB1: Source MAC learning (2) Doesn t know destination: Broadcast AR. All remote s learn B-MAC that aaaa.aaaa.aaaa maps to. In this way a B-MAC to C-MAC table is built.
8 Inter-operation Typhoon Cards (VLS or BB-EVN) VLS VFI Customer Bridge Domain EVI Customer Bridge Domain R2 Only Trident Cards (VLS Only) R1 VFI VLS BB- EVN Core Bridge Domain (For BEB MACs) VLS EVI Customer Bridge Domain VFI R3 Typhoon Cards (VLS or BB-EVN)
9 VxLAN is a Layer 2 overlay scheme on a Layer 3 network. Each overlay is termed a VXLAN segment. Each segment has a 24 bit identifier called a VNI (VxLAN Network Identifier). A VNI is an outer header that encapsulates the inner MAC. VxLAN Tunnel End oints hide the VxLAN infrastructure from hosts and could be on physical or virtual switches or servers. Multicast carries BUM traffic (destination is multicast group for VNI segment). VTE I to VM MAC learning needs to take place (control plane learning like BG with EVN). VTEs must not fragment VxLAN packets. VxLAN Overview DM = Destination MAC SM = Source MAC DI = Destination I SI = Source I I = Inner O = Outer (sections not to scale. Some part missing - only shown to give most important parts and general idea) O-DM O-SM O-VLAN O-SI O-DI UD source ort UD Dest ort (VXLAN) VxLAN header (incl. VNI) I-DM I-SM Underlying network is usually layer 3 Look up VNI that this host is associated with. Is destination MAC on same segment and is there a mapping? VTE1 Only hosts in same VxLAN segment can communicate with one another VTE2 Upon receipt, VTE will validate VNI and determine whether a host in that VNI matches inner MAC. If so it decapsulates it and sends it on. I-DM I-SM I-DM I-SM WWW WWW
Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services. Introduction and Application Note
White Paper Ethernet VPN (EVPN) and Provider Backbone Bridging-EVPN: Next Generation Solutions for MPLS-based Ethernet Services Introduction and Application Note Last Updated: 5/2014 Ethernet VPN (EVPN)
More informationContents. EVPN overview 1
Contents EVPN overview 1 EVPN network model 1 MP-BGP extension for EVPN 2 Configuration automation 3 Assignment of traffic to VXLANs 3 Traffic from the local site to a remote site 3 Traffic from a remote
More informationImplementing IEEE 802.1ah Provider Backbone Bridge
Implementing IEEE 802.1ah Provider Backbone Bridge This module provides conceptual and configuration information for IEEE 802.1ah Provider Backbone Bridge on Cisco ASR 9000 Series Routers. The IEEE 802.1ah
More informationInternet Engineering Task Force (IETF) Request for Comments: N. Bitar Nokia R. Shekhar. Juniper. J. Uttaro AT&T W. Henderickx Nokia March 2018
Internet Engineering Task Force (IETF) Request for Comments: 8365 Category: Standards Track ISSN: 2070-1721 A. Sajassi, Ed. Cisco J. Drake, Ed. Juniper N. Bitar Nokia R. Shekhar Juniper J. Uttaro AT&T
More informationBESS work on control planes for DC overlay networks A short overview
BESS work on control planes for DC overlay networks A short overview Jorge Rabadan IETF99, July 2017 Prague 1 Agenda EVPN in a nutshell BESS work on EVPN for NVO3 networks EVPN in the industry today Future
More informationInternet Engineering Task Force (IETF) ISSN: A. Sajassi Cisco J. Uttaro AT&T May 2018
Internet Engineering Task Force (IETF) Request for Comments: 8388 Category: Informational ISSN: 2070-1721 J. Rabadan, Ed. S. Palislamovic W. Henderickx Nokia A. Sajassi Cisco J. Uttaro AT&T May 2018 Usage
More informationHPE FlexFabric 5940 Switch Series
HPE FlexFabric 5940 Switch Series EVPN Configuration Guide Part number: 5200-2002b Software version: Release 25xx Document version: 6W102-20170830 Copyright 2017 Hewlett Packard Enterprise Development
More informationEthernet VPN (EVPN) in Data Center
Ethernet VPN (EVPN) in Data Center Description and Design considerations Vasilis Stavropoulos Sparkle GR EVPN in Data Center The necessity for EVPN (what it is, which problems it solves) EVPN with MPLS
More informationVXLAN EVPN Multihoming with Cisco Nexus 9000 Series Switches
White Paper VXLAN EVPN Multihoming with Cisco Nexus 9000 Series Switches 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 27 Contents Introduction...
More informationH3C S6520XE-HI Switch Series
H3C S6520XE-HI Switch Series EVPN Configuration Guide New H3C Technologies Co., Ltd. http://www.h3c.com.hk Software version: Release 1108 Document version: 6W100-20171228 Copyright 2017, New H3C Technologies
More informationDesigning Mul+- Tenant Data Centers using EVPN- IRB. Neeraj Malhotra, Principal Engineer, Cisco Ahmed Abeer, Technical Marke<ng Engineer, Cisco
Designing Mul+- Tenant Data Centers using EVPN- IRB Neeraj Malhotra, Principal Engineer, Cisco Ahmed Abeer, Technical Marke
More informationLARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF
LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 07 - MPLS BASED LAYER 2 SERVICES 1 by Xantaro MPLS BASED LAYER 2 VPNS USING MPLS FOR POINT-TO-POINT LAYER 2 SERVICES 2 by Xantaro Why are Layer-2
More informationHuawei CloudEngine Series. VXLAN Technology White Paper. Issue 06 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 06 Date 2016-07-28 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationData Center Configuration. 1. Configuring VXLAN
Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2
More informationImplementing VXLAN. Prerequisites for implementing VXLANs. Information about Implementing VXLAN
This module provides conceptual information for VXLAN in general and configuration information for layer 2 VXLAN on Cisco ASR 9000 Series Router. For configuration information of layer 3 VXLAN, see Implementing
More informationE-VPN & PBB-EVPN: the Next Generation of MPLS-based L2VPN
E-VPN & PBB-EVPN: the Next Generation of -based L2VPN Samer Salam Agenda Introduction Concepts BGP Routes and Attributes E-VPN PBB-EVPN PBB-EVPN IOS-XR Implementation Summary 3 Introduction Overview Core
More informationIEEE 802.1ah on Provider Backbone Bridges
IEEE 802.1ah on Provider Backbone Bridges First Published: November 25, 2009 Last Updated: February 8, 2011 The IEEE 802.1ah on Provider Backbone Bridges feature enables MAC-in-MAC tunneling on Ethernet
More informationEVPN Multicast. Disha Chopra
EVPN Multicast Disha Chopra Agenda EVPN Multicast Optimizations Introduction to EVPN Multicast (BUM) IGMP Join/Leave Sync Routes Selective Multicast Ethernet Tag Route Use Case 2 EVPN BUM Traffic Basics
More informationE-VPN & PBB-EVPN: the Next Generation of MPLS-based L2VPN
E-VPN & PBB-EVPN: the Next Generation of -based L2VPN Jose Liste Technical Marketing Engineer Agenda Technical Overview Flows and Use Cases Cisco s PBB-EVPN Implementation Summary 3 Technical Overview
More informationDeploy VPLS. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by:
Deploy VPLS APNIC Technical Workshop October 23 to 25, 2017. Selangor, Malaysia Hosted by: Issue Date: [201609] Revision: [01] Acknowledgement Cisco Systems 2 VPLS Overview 3 Virtual Private LAN Service
More informationH3C S7500E-X Switch Series
H3C S7500E-X Switch Series EVPN Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: S7500EX-CMW710-R7523P01 Document version: 6W100-20160830 Copyright 2016, Hangzhou
More informationHierarchical Fabric Designs The Journey to Multisite. Lukas Krattiger Principal Engineer September 2017
Hierarchical Fabric Designs The Journey to Multisite Lukas Krattiger Principal Engineer September 2017 A Single Fabric, a Single Data Center External Layer-3 Network Pod 1 Leaf/ Topologies (aka Folded
More informationConfiguring VXLAN EVPN Multi-Site
This chapter contains the following sections: About VXLAN EVPN Multi-Site, page 1 Guidelines and Limitations for VXLAN EVPN Multi-Site, page 2 Enabling VXLAN EVPN Multi-Site, page 2 Configuring VNI Dual
More informationIntroduction to External Connectivity
Before you begin Ensure you know about Programmable Fabric. Conceptual information is covered in the Introduction to Cisco Programmable Fabric and Introducing Cisco Programmable Fabric (VXLAN/EVPN) chapters.
More informationOptimizing Layer 2 DCI with OTV between Multiple VXLAN EVPN Fabrics (Multifabric)
White Paper Optimizing Layer 2 DCI with OTV between Multiple VXLAN EVPN Fabrics (Multifabric) What You Will Learn This document describes how to achieve a VXLAN EVPN multifabric design by integrating Virtual
More informationUnicast Forwarding. Unicast. Unicast Forwarding Flows Overview. Intra Subnet Forwarding (Bridging) Unicast, on page 1
Unicast, on page 1 Unicast Flows Overview Intra and inter subnet forwarding are the possible unicast forwarding flows in the VXLAN BGP EVPN fabric, between leaf/tor switch VTEPs. They are explained in
More informationUnderstanding Basic 802.1ah Provider Backbone Bridge
Understanding Basic 802.1ah Provider Backbone Bridge Contents Introduction Prerequisites Requirements Components Used IEEE 802.1ah Provider Backbone Bridging Overview Terminologies Used PBB Components
More informationConfiguring VXLAN EVPN Multi-Site
This chapter contains the following sections: About VXLAN EVPN Multi-Site, on page 1 Licensing Requirements for VXLAN EVPN Multi-Site, on page 2 Guidelines and Limitations for VXLAN EVPN Multi-Site, on
More informationEVPN Command Reference
EVPN Command Reference EVPN Command Reference Command Hierarchies vpls service-id [customer customer-id] [vpn vpn-id] [m-vpls] [b-vpls i-vpls] [create] no vpls service-id bgp route-distinguisher [ip-addr:comm-val
More informationVirtual Hub & Spoke with BGP EVPNs
Virtual Hub & Spoke with BGP EVPNs draft-keyupate-evpn-virtual-hub-00 Keyur Patel, Ali Sajassi, John Drake, Wim Henderickx IETF 94, November 2015, Yokohama, Japan Presentation_ID 2009 Cisco Systems, Inc.
More informationIP Fabric Reference Architecture
IP Fabric Reference Architecture Technical Deep Dive jammon@brocade.com Feng Shui of Data Center Design 1. Follow KISS Principle Keep It Simple 2. Minimal features 3. Minimal configuration 4. Configuration
More informationSpirent TestCenter EVPN and PBB-EVPN AppNote
Spirent TestCenter EVPN and PBB-EVPN AppNote Executive summary 2 Overview of EVPN 2 Relevant standards 3 Test case: Single Home Test Scenario for EVPN 4 Overview 4 Objective 4 Topology 4 Step-by-step instructions
More informationConfiguring VXLAN EVPN Multi-Site
This chapter contains the following sections: About VXLAN EVPN Multi-Site, page 1 Licensing Requirements for VXLAN EVPN Multi-Site, page 2 Guidelines and Limitations for VXLAN EVPN Multi-Site, page 2 Enabling
More informationVirtual Extensible LAN and Ethernet Virtual Private Network
Virtual Extensible LAN and Ethernet Virtual Private Network Contents Introduction Prerequisites Requirements Components Used Background Information Why you need a new extension for VLAN? Why do you chose
More informationSharkFest 18 US. BGP is not only a TCP session https://goo.gl/mh3ex4
SharkFest 18 US BGP is not only a TCP session https://goo.gl/mh3ex4 Learning about the protocol that holds networks together Werner Fischer Principal Consultant avodaq AG History and RFCs Direction for
More informationOverview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.
This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across
More informationConfigure L2VPN Autodiscovery and Signaling
This chapter describes the L2VPN Autodiscovery and Signaling feature which enables the discovery of remote Provider Edge (PE) routers and the associated signaling in order to provision the pseudowires.
More informationIntended status: Standards Track. Cisco Systems October 22, 2018
BESS WorkGroup Internet-Draft Intended status: Standards Track Expires: April 25, 2019 Ali. Sajassi Mankamana. Mishra Samir. Thoria Patrice. Brissette Cisco Systems October 22, 2018 AC-Aware Bundling Service
More informationEVPN Overview. Cloud and services virtualization. Remove protocols and network simplification. Integration of L2 and L3 services over the same VPN
Ethernet VPN (EVPN) is a next generation solution that provides Ethernet multipoint services over MPLS networks. EVPN operates in contrast to the existing Virtual Private LAN Service (VPLS) by enabling
More informationProvisioning Overlay Networks
This chapter has the following sections: Using Cisco Virtual Topology System, page 1 Creating Overlays, page 2 Creating Network using VMware, page 4 Creating Subnetwork using VMware, page 4 Creating Routers
More informationConfiguring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts
Contents Configuring VPLS 1 VPLS overview 1 Operation of VPLS 1 VPLS packet encapsulation 4 H-VPLS implementation 5 Hub-spoke VPLS implementation 7 Multi-hop PW 8 VPLS configuration task list 9 Enabling
More informationImplementing VXLAN in DataCenter
Implementing VXLAN in DataCenter LTRDCT-1223 Lilian Quan Technical Marketing Engineering, INSBU Erum Frahim Technical Leader, ecats John Weston Technical Leader, ecats Why Overlays? Robust Underlay/Fabric
More informationSolution Guide. Infrastructure as a Service: EVPN and VXLAN. Modified: Copyright 2016, Juniper Networks, Inc.
Solution Guide Infrastructure as a Service: EVPN and VXLAN Modified: 2016-10-16 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.
More informationConfiguring VXLAN Multihoming
VXLAN EVPN Multihoming Overview, page 1 Configuring VXLAN EVPN Multihoming, page 4 Configuring Layer 2 Gateway STP, page 7 Configuring VXLAN EVPN Multihoming Traffic Flows, page 11 Configuring VLAN Consistency
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationH3C S6520XE-HI Switch Series
H3C S6520XE-HI Switch Series EVPN Command Reference New H3C Technologies Co., Ltd. http://www.h3c.com.hk Software version: Release 1108 Document version: 6W100-20171228 Copyright 2017, New H3C Technologies
More informationImplementing IP in IP Tunnel
This chapter module provides conceptual and configuration information for IP in IP tunnels on Cisco ASR 9000 Series Router. Note For a complete description of the IP in IP tunnel commands listed in this
More informationEnterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.
2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are
More informationMPLS design. Massimiliano Sbaraglia
MPLS design Massimiliano Sbaraglia - MPLS layer 2 VPN diagram flowchart - MPLS layer 2 VPN pseudowire VPWS diagram - MPLS layer 2 VPN VPLS diagram - MPLS layer 2 EVPN diagram - MPLS layer 3 VPN diagram
More informationConfiguration and Management of Networks. Pedro Amaral
Configuration and Management of Networks Pedro Amaral 2012 Service Provider Networks Carrier grade networks that carry customers traffic: Triple play residential customers Voice High Speed Internet Broadcast
More informationNetwork Virtualization in IP Fabric with BGP EVPN
EXTREME VALIDATED DESIGN Network Virtualization in IP Fabric with BGP EVPN Network Virtualization in IP Fabric with BGP EVPN Version 2.0 9035383 February 2018 2018, Extreme Networks, Inc. All Rights Reserved.
More informationMulti-site Datacenter Network Infrastructures
Multi-site Datacenter Network Infrastructures Petr Grygárek rek 2009 Petr Grygarek, Advanced Computer Networks Technologies 1 Why Multisite Datacenters? Resiliency against large-scale site failures (geodiversity)
More informationVirtual Subnet (VS): A Scalable Data Center Interconnection Solution
Virtual Subnet (VS): A Scalable Data Center Interconnection Solution draft-xu-virtual-subnet-05 Xiaohu Xu (xuxh@huawei.com) NANOG52, Denver Requirements for Data Center Interconnection To interconnect
More informationConfigure Multipoint Layer 2 Services
This module provides the conceptual and configuration information for Multipoint Layer 2 Bridging Services, also called Virtual Private LAN Services (VPLS). Note VPLS supports Layer 2 VPN technology and
More informationEXTREME VALIDATED DESIGN. Network Virtualization in IP Fabric with BGP EVPN
EXTREME VALIDATED DESIGN Network Virtualization in IP Fabric with BGP EVPN 53-1004308-07 April 2018 2018, Extreme Networks, Inc. All Rights Reserved. Extreme Networks and the Extreme Networks logo are
More informationConfiguring Virtual Private LAN Services
Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS
More informationImplementing Virtual Private LAN Services
Implementing Virtual Private LAN Services This module provides the conceptual and configuration infmation f Virtual Private LAN Services (VPLS) on Cisco IOS XR software. VPLS suppts Layer 2 VPN technology
More informationImplementing MPLS VPNs over IP Tunnels
The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Network (L3VPN) services, over an IP core network, using L2TPv3 multipoint tunneling instead of MPLS. This allows L2TPv3 tunnels
More informationContents. Configuring EVI 1
Contents Configuring EVI 1 Overview 1 Layer 2 connectivity extension issues 1 Network topologies 2 Terminology 3 Working mechanism 4 Placement of Layer 3 gateways 6 ARP flood suppression 7 Selective flood
More informationEVPN Routing Policy. EVPN Routing Policy
This chapter describes how routing protocols make decisions to advertise, aggregate, discard, distribute, export, hold, import, redistribute and modify the routes based on configured routing policy., page
More informationConfiguring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery
Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Finding Feature Information, page 1 Configuring VPLS, page 1 Configuring VPLS BGP-based Autodiscovery, page 17 Finding Feature
More informationVXLAN Design with Cisco Nexus 9300 Platform Switches
Guide VXLAN Design with Cisco Nexus 9300 Platform Switches Guide October 2014 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 39 Contents What
More informationFeature Information for BGP Control Plane, page 1 BGP Control Plane Setup, page 1. Feature Information for BGP Control Plane
Feature Information for, page 1 Setup, page 1 Feature Information for Table 1: Feature Information for Feature Releases Feature Information PoAP diagnostics 7.2(0)N1(1) Included a new section on POAP Diagnostics.
More informationHigher scalability to address more Layer 2 segments: up to 16 million VXLAN segments.
This chapter tells how to configure Virtual extensible LAN (VXLAN) interfaces. VXLANs act as Layer 2 virtual networks over Layer 3 physical networks to stretch Layer 2 networks. About VXLAN Encapsulation
More informationNetwork Configuration Example
Network Configuration Example Configuring VPLS Multihoming Using Autodiscovery (FEC 129) Release NCE0072 Modified: 2016-10-26 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA
More informationFabric Connect Multicast A Technology Overview. Ed Koehler - Director DSE. Avaya Networking Solutions Group
Fabric Connect Multicast A Technology Overview Ed Koehler - Director DSE Avaya Networking Solutions Group IAUG Newport RI, November 2013 So, what s wrong with today s multicast networks? Today s multicast
More informationBuilding Data Center Networks with VXLAN EVPN Overlays Part I
BRKDCT-2949 Building Data Center Networks with VXLAN EVPN Overlays Part I Lukas Krattiger, Principal Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationAPNIC elearning: MPLS L3 VPN
ANIC elearning: MLS L3 VN 18 JANUARY 2017 11:00 AM AEST Brisbane (UTC+10) Issue Date: 07 July 2015 Revision: 2.0 Introduction resenter/s Jessica Bei Wei Training Officer jwei@apnic.net Specialties: Routing
More informationConfiguring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling
9 CHAPTER Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the
More informationTraffic Load Balancing in EVPN/VXLAN Networks. Tech Note
Traffic Load Balancing in EVPN/VXLAN Networks Tech Note December 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks assumes no
More informationInternet Engineering Task Force (IETF) Request for Comments: 8014 Category: Informational. M. Lasserre Independent T. Narten IBM December 2016
Internet Engineering Task Force (IETF) Request for Comments: 8014 Category: Informational ISSN: 2070-1721 D. Black Dell EMC J. Hudson L. Kreeger M. Lasserre Independent T. Narten IBM December 2016 An Architecture
More informationMPLS VPN Multipath Support for Inter-AS VPNs
The feature supports Virtual Private Network (VPN)v4 multipath for Autonomous System Boundary Routers (ASBRs) in the interautonomous system (Inter-AS) Multiprotocol Label Switching (MPLS) VPN environment.
More informationInternet Engineering Task Force (IETF) Request for Comments: 8214 Category: Standards Track
Internet Engineering Task Force (IETF) Request for Comments: 8214 Category: Standards Track ISSN: 2070-1721 S. Boutros VMware A. Sajassi S. Salam Cisco J. Drake Juniper Networks J. Rabadan Nokia August
More informationConfiguring Routed Pseudowire and VPLS
Routed Pseudowire and VPLS feature routes Layer 3 traffic and Layer 2 frames for pseudowire connections between provider edge (PE) devices using Virtual Private LAN Services (VPLS) multipoint PE. Prerequisites
More informationCloud Data Center Architecture Guide
Cloud Data Center Architecture Guide Modified: 2018-08-21 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper Networks
More informationBuilding Blocks in EVPN VXLAN for Multi-Service Fabrics. Aldrin Isaac Co-author RFC7432 Juniper Networks
Building Blocks in EVPN VXLAN for Multi-Service Fabrics Aldrin Isaac Co-author RFC7432 Juniper Networks Network Subsystems Network Virtualization Bandwidth Broker TE LAN Fabric WAN Fabric LAN WAN EVPN
More informationInter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...
1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol
More informationEVPN for VXLAN Tunnels (Layer 3)
EVPN for VXLAN Tunnels (Layer 3) In This Chapter This section provides information about EVPN for VXLAN tunnels (Layer 3). Topics in this section include: Applicability on page 312 Overview on page 313
More informationScaling bridge forwarding database. Roopa Prabhu, Nikolay Aleksandrov
Scaling bridge forwarding database Roopa Prabhu, Nikolay Aleksandrov Agenda Linux bridge forwarding database (FDB): quick overview Linux bridge deployments at scale: focus on multihoming Scaling bridge
More informationEthernet Virtual Connections Configuration
An Ethernet Virtual Connection (EVC) is defined by the Metro-Ethernet Forum (MEF) as an association between two or more user network interfaces that identifies a point-to-point or multipoint-to-multipoint
More informationL2 MPLS VPN (VPLS) Technology White Paper
S9500 L2 MPLS VPN (VPLS) Technology White Paper L2 MPLS VPN (VPLS) Technology White Paper Keywords: MPLS, VPLS Abstract: MPLS technologies make it very easy to provide VPN services based on IP technologies
More informationConfigure Virtual LANs in Layer 2 VPNs
The Layer 2 Virtual Private Network (L2VPN) feature enables Service Providers (SPs) to provide L2 services to geographically disparate customer sites. A virtual local area network (VLAN) is a group of
More informationConfiguring IEEE 802.1Q and Layer 2 Protocol Tunneling
CHAPTER 8 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Virtual private networks (VPNs) provide enterprise-scale connectivity on a shared infrastructure, often Ethernet-based, with the same security,
More informationCarrier Ethernet Evolution
Carrier Ethernet Evolution Next phase of carrier-class Ethernet services wave Levente Laposi, IP Division Regional Support Centre October 2008 Agenda 1. Introduction 2. Understanding P 3. P-VPLS The next
More informationDeploying MPLS L2VPN
Deploying MPLS L2VPN Nurul Islam Roman (nurul@apnic.net) 1 Abstract This session covers the fundamental and advanced topics associated with the deployment of Layer 2 VPNs over an MPLS network. The material
More informationROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP
IP ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP Peter R. Egli 1/37 Contents 1. IP Routing 2. Routing Protocols 3. Fragmentation in the IP Layer 4. Proxy ARP 5. Routing and IP forwarding
More informationNetwork Configuration Example
Network Configuration Example Configuring BGP Autodiscovery for LDP VPLS Release NCE0035 Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationConfigure EVPN IRB EVPN IRB
This chapter introduces you to Ethernet VPN (EVPN) Integrated Routing and Bridging (IRB) feature and describe how you can configure the EVPN IRB feature. EVPN IRB, page 1 EVPN Single-Homing Access Gateway,
More informationWide-Area Networking Configuration Guide: Overlay Transport Virtualization, Cisco IOS XE Release 3S
Wide-Area Networking Configuration Guide: Overlay Transport Virtualization, Cisco IOS XE Release 3S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
More informationRouting Between VLANs Overview
Routing Between VLANs Overview This chapter provides an overview of VLANs. It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs.
More informationVirtual Subnet : A L3VPN-based Subnet Extension Solution draft-xu-l3vpn-virtual-subnet-01
Virtual Subnet : A L3VPN-based Subnet Extension Solution draft-xu-l3vpn-virtual-subnet-01 Xiaohu Xu (Huawei) Susan Hares (Adara Networks) Yongbing Fan (China Telecom) Christian Jacquenet (Orange) Truman
More informationVXLAN Cisco and/or its affiliates. All rights reserved. Cisco Public
VXLAN Presentation ID 1 Virtual Overlay Encapsulations and Forwarding Ethernet Frames are encapsulated into an IP frame format New control logic for learning and mapping VM identity (MAC address) to Host
More informationImpact Analysis in MPLS Networks
CHAPTER 7 The following topics provide an overview of the Cisco MPLS Assurance Manager 1.0 (Cisco MPLS-AM) service impact analysis (IA) solution and supported scenarios, which are used in VPN networks
More informationPoint-to-Multipoint and Multipoint-to-Multipoint Services on PBB-TE System
Point-to-Multipoint and Multipoint-to-Multipoint Services on PBB-TE System Wonkyoung Lee*, Chang-Ho Choi*, Sun-Me Kim* * Optical Internet Research Department, Electronics and Telecommunications Research
More informationVXLAN EVPN Multi-Site Design and Deployment
White Paper VXLAN EVPN Multi-Site Design and Deployment 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 55 Contents What you will learn... 4
More informationConfiguring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router
Configuring Ethernet Virtual Connections on the Cisco ASR 1000 Series Router Ethernet virtual circuit (EVC) infrastructure is a Layer 2 platform-independent bridging architecture that supports Ethernet
More informationVmware VCXN610. VMware Certified Implementation Expert (R) Network Virtualization.
Vmware VCXN610 VMware Certified Implementation Expert (R) Network Virtualization http://killexams.com/exam-detail/vcxn610 QUESTION: 169 A company wants to deploy VMware NSX for vsphere with no PIM and
More informationMPLS VPN over mgre. Finding Feature Information. Last Updated: November 1, 2012
MPLS VPN over mgre Last Updated: November 1, 2012 The MPLS VPN over mgre feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity
More informationHPE FlexFabric 7900 Switch Series
HPE FlexFabric 7900 Switch Series VXLAN Configuration Guide Part number: 5998-8254R Software version: Release 213x Document version: 6W101-20151113 Copyright 2015 Hewlett Packard Enterprise Development
More informationConfiguring multicast VPN
Contents Configuring multicast VPN 1 Multicast VPN overview 1 Multicast VPN overview 1 MD-VPN overview 3 Protocols and standards 6 How MD-VPN works 6 Share-MDT establishment 6 Share-MDT-based delivery
More information