Misplaced Pages

Ethernet VPN

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Technology for carrying Ethernet traffic over wide area networks

Ethernet VPN (EVPN) is a technology for carrying layer 2 Ethernet traffic as a virtual private network using wide area network protocols. EVPN technologies include Ethernet over MPLS and Ethernet over VXLAN.

EVPN uses encapsulation methods to ensure efficient and scalable transmission of Ethernet traffic over MPLS or IP-based networks. The encapsulation encapsulates Ethernet frames within MPLS or VXLAN headers for transport.

MPLS Encapsulation

In MPLS-based EVPN, Ethernet frames are encapsulated with:

  1. MPLS Label Stack: Each EVPN instance is associated with a unique label that helps in identifying the destination bridge domain.
  2. Control Word (Optional): Provides additional information for synchronization and alignment in certain scenarios.

The encapsulated packet flow includes:

  • Original Ethernet Frame
  • MPLS Labels
  • Outer IP Header (in case of IP/MPLS networks)

EVPNs are covered by a number of Internet RFCs, including:

  • RFC 7209 "Requirements for Ethernet VPN (EVPN)",
  • RFC 7432 "BGP MPLS-Based Ethernet VPN",
  • RFC 8365 "A Network Virtualization Overlay Solution Using Ethernet VPN (EVPN)",
  • RFC 8317 "Ethernet-Tree (E-Tree) Support in Ethernet VPN (EVPN) and Provider Backbone Bridging EVPN (PBB-EVPN)".
  • RFC 9161 "Operational Aspects of Proxy ARP/ND in Ethernet Virtual Private Networks".

References

  1. "EVPN Overview - TechLibrary - Juniper Networks". www.juniper.net. Retrieved 2019-12-19.
  2. "Understanding EVPN with VXLAN Data Plane Encapsulation - TechLibrary - Juniper Networks". www.juniper.net. Retrieved 2019-12-19. Ethernet Virtual Private Network (EVPN): Comprehensive Guide

See also

Virtualization software
Comparison of platform virtualization software
Hardware
(hypervisors)
Native
Hosted
Specialized
Independent
Tools
Operating
system
OS containers
Application containers
Virtual kernel architectures
Related kernel features
Orchestration
Desktop
Application
Network
See also
See also: List of emulators, List of computer system emulators
Virtual private networking
Communication protocols
Connection applications
Enterprise software
Risk vectors
VPN Services
Avast
Kape Technologies
McAfee
Tesonet
Ziff Davis


Stub icon

This computer networking article is a stub. You can help Misplaced Pages by expanding it.

Categories: