Ethernet VPN (EVPN) is a technology for carrying layer 2 Ethernet traffic as a virtual private network using wide area network protocols. EVPN technologies include Ethernet over MPLS and Ethernet over VXLAN.
EVPN uses encapsulation methods to ensure efficient and scalable transmission of Ethernet traffic over MPLS or IP-based networks. The encapsulation encapsulates Ethernet frames within MPLS or VXLAN headers for transport.
MPLS Encapsulation
In MPLS-based EVPN, Ethernet frames are encapsulated with:
- MPLS Label Stack: Each EVPN instance is associated with a unique label that helps in identifying the destination bridge domain.
- Control Word (Optional): Provides additional information for synchronization and alignment in certain scenarios.
The encapsulated packet flow includes:
- Original Ethernet Frame
- MPLS Labels
- Outer IP Header (in case of IP/MPLS networks)
EVPNs are covered by a number of Internet RFCs, including:
- RFC 7209 "Requirements for Ethernet VPN (EVPN)",
- RFC 7432 "BGP MPLS-Based Ethernet VPN",
- RFC 8365 "A Network Virtualization Overlay Solution Using Ethernet VPN (EVPN)",
- RFC 8317 "Ethernet-Tree (E-Tree) Support in Ethernet VPN (EVPN) and Provider Backbone Bridging EVPN (PBB-EVPN)".
- RFC 9161 "Operational Aspects of Proxy ARP/ND in Ethernet Virtual Private Networks".
References
- "EVPN Overview - TechLibrary - Juniper Networks". www.juniper.net. Retrieved 2019-12-19.
- "Understanding EVPN with VXLAN Data Plane Encapsulation - TechLibrary - Juniper Networks". www.juniper.net. Retrieved 2019-12-19. Ethernet Virtual Private Network (EVPN): Comprehensive Guide
See also
Virtualization software | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Comparison of platform virtualization software | |||||||||||
Hardware (hypervisors) |
| ||||||||||
Operating system |
| ||||||||||
Desktop | |||||||||||
Application | |||||||||||
Network | |||||||||||
See also | |||||||||||
See also: List of emulators, List of computer system emulators |
Virtual private networking | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Communication protocols | |||||||||||
Connection applications | |||||||||||
Enterprise software | |||||||||||
Risk vectors | |||||||||||
VPN Services |
|
This computer networking article is a stub. You can help Misplaced Pages by expanding it. |