Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Ethernet VPN

From Wikipedia, the free encyclopedia
Technology for carrying Ethernet traffic over wide area networks

Ethernet VPN (EVPN) is a technology for carrying layer 2Ethernet traffic as avirtual private network usingwide area network protocols. EVPN technologies include Ethernet overMultiprotocol Label Switching (MPLS) and Ethernet overVirtual Extensible LAN (VXLAN).[1][2]

EVPN uses encapsulation methods to enhance the efficiency and scalability of Ethernet traffic over MPLS or IP-based networks. The Ethernet frames are encapsulated within MPLS or VXLANheaders for transport.

MPLS encapsulation

[edit]

In MPLS-based EVPN, Ethernet frames are encapsulated with:

  1. MPLS label stack: Each EVPN instance is associated with a unique label that helps in identifying the destination bridge domain.
  2. Control word (optional): Provides additional information for synchronization and alignment in certain scenarios.

The encapsulated packet flow includes:

  • Original Ethernet frame
  • MPLS labels
  • Outer IP header (in case of IP/MPLS networks)

EVPNs are covered by a number of Internet RFCs, including:

  • RFC 7209 – "Requirements for Ethernet VPN (EVPN),"[3]Informational.
  • RFC 7432 – "BGP MPLS-Based Ethernet VPN,"[4]Proposed Standard.
  • RFC 8317 – "Ethernet-Tree (E-Tree) Support in Ethernet VPN (EVPN) and Provider Backbone Bridging EVPN (PBB-EVPN),"[5]Proposed Standard.
  • RFC 8365 – "A Network Virtualization Overlay Solution Using Ethernet VPN (EVPN),"[6]Proposed Standard.
  • RFC 9161 – "Operational Aspects of Proxy ARP/ND in Ethernet Virtual Private Networks,"[7]Proposed Standard.

See also

[edit]

References

[edit]
  1. ^"EVPN Overview - TechLibrary - Juniper Networks".www.juniper.net. Archived fromthe original on May 11, 2017. Retrieved2019-12-19.
  2. ^"Understanding EVPN with VXLAN Data Plane Encapsulation - TechLibrary - Juniper Networks".www.juniper.net. Archived fromthe original on May 13, 2017. Retrieved2019-12-19.
  3. ^A. Sajassi; R. Aggarwal; J. Uttaro; N. Bitar; W. Henderickx (May 2014).Requirements for Ethernet VPN (EVPN).Internet Engineering Task Force.doi:10.17487/RFC7209.ISSN 2070-1721.RFC7209.Informational.
  4. ^R. Aggarwal; N. Bitar; A. Isaac; J. Uttaro; J. Drake; W. Henderickx (February 2015). A. Sajassi (ed.).BGP MPLS-Based Ethernet VPN.Internet Engineering Task Force.doi:10.17487/RFC7432.ISSN 2070-1721.RFC7432.Proposed Standard. Updated byRFC 9572,9573,8584,9161 and9746.
  5. ^S. Salam; J. Drake; J. Uttaro; S. Boutros; J. Rabadan (January 2018). A. Sajassi (ed.).Ethernet-Tree (E-Tree) Support in Ethernet VPN (EVPN) and Provider Backbone Bridging EVPN (PBB-EVPN).Internet Engineering Task Force.doi:10.17487/RFC8317.ISSN 2070-1721.RFC8317.Proposed Standard. UpdatesRFC 7385.
  6. ^N. Bitar; R. Shekhar; J. Uttaro; W. Henderickx (March 2018). A. Sajassi; J. Drake (eds.).A Network Virtualization Overlay Solution Using Ethernet VPN (EVPN).Internet Engineering Task Force.doi:10.17487/RFC8365.ISSN 2070-1721.RFC8365.Proposed Standard. Updated byRFC 9746.
  7. ^S. Sathappan; K. Nagaraj; G. Hankins (January 2022). J. Rabadan (ed.).Operational Aspects of Proxy ARP/ND in Ethernet Virtual Private Networks.Internet Engineering Task Force.doi:10.17487/RFC9161.RFC9161.Proposed Standard. UpdatesRFC 7432.
Hardware
(hypervisors)
Native
Hosted
Specialized
Independent
Tools
Operating
system
OScontainers
Application containers
Virtual kernel architectures
Related kernel features
Orchestration
Desktop
Application
Network
See also
Communication protocols
Connection applications
Enterprise software
Risk vectors
VPN services
Avast
Kape Technologies
McAfee
Tesonet
Ziff Davis
Stub icon

Thiscomputer networking article is astub. You can help Wikipedia byadding missing information.

Retrieved from "https://en.wikipedia.org/w/index.php?title=Ethernet_VPN&oldid=1313865117"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp