Abstract:
A network device may determine a control plane session type associated with a control plane session. The control plane session may be associated with the network device. The network device may determine whether the control plane session type is associated with a forwarding information base (FIB) cache on the network device. The network device may obtain, based on determining that the control plane session type is associated with the FIB cache, forwarding information associated with the control plane session. The forwarding information may be stored in a FIB, associated with the FIB cache, on the network device. The network device may store the forwarding information in the FIB cache and process the control plane session using the forwarding information stored in the FIB cache.
Abstract:
The disclosed computer-implemented method may include (1) creating, at a proxy node within an IP network, a proxy group that includes a plurality of network nodes within a subnet of the IP network that are represented by a pseudo MAC address, (2) receiving a neighbor solicitation from a network node included in the proxy group, (3) identifying, within the neighbor solicitation, a link-layer address of the network node that sent the neighbor solicitation, (4) modifying the neighbor solicitation by replacing the link-layer address of the network node with the pseudo MAC address of the proxy group, and then (5) forwarding the modified neighbor solicitation to another network node included in the proxy group to facilitate completion of an NDP process in which the other network node responds to the modified neighbor solicitation with a neighbor advertisement proxied by the proxy node. Various other methods, systems, and apparatuses are also disclosed.
Abstract:
A device may activate a layer 3 interface of the device based on activation of a first layer 2 interface associated with the layer 3 interface. The device may detect activation of a second layer 2 interface, associated with the layer 3 interface, after activating the layer 3 interface. The device may activate a filter to prevent transfer of network traffic via the second layer 2 interface based on detecting activation of the second layer 2 interface. The device may perform duplicate address detection, in association with the second layer 2 interface, for a layer 3 network address assigned to the device. The device may determine whether the layer 3 network address is a duplicate network address based on performing the duplicate address detection. The device may selectively maintain or deactivate the filter based on determining whether the layer 3 network address is a duplicate network address.
Abstract:
The techniques described herein may enable a particular PE router configured in an EVPN to share, rather than immediately discard, a CE router MAC address that is included in an IPv6 neighbor advertisement even though the particular PE router does not include a neighbor cache entry corresponding to the CE router. The techniques may include receiving, from a CE router that is locally coupled to the first PE router, an IPv6 neighbor advertisement from the CE router in response to an IPv6 neighbor solicitation from a second PE router that requested a MAC address of the CE router; determining whether an L2 destination addresses of the IPv6 neighbor advertisement match the L2 address of the bridging interface second PE router; and in response to determining a match, sending, to the second PE router, an EVPN route advertisement specifying at least the MAC address of the CE router.
Abstract:
The disclosed system may include (1) a cache module, stored in memory, that stores a neighbor cache entry that specifies whether a neighbor of a network node is reachable according to a detection mechanism, (2) a timeout module, stored in memory, that specifies a timing interval in which to select a reachable time threshold, (3) a reception module, stored in memory, that receives event information about whether the neighbor is active, (4) a biasing module, stored in memory, that biases, based on the received event information about whether the neighbor is active, a selection of the reachable time threshold within the timing interval, and (5) a determination module, stored in memory, that determines whether the neighbor is reachable based at least in part on a determination of whether the selected reachable time threshold has been satisfied. Various other systems and methods are also disclosed.