Abstract:
Techniques are disclosed for an Ethernet Virtual Private Network (EVPN) Virtual Private Wire Service (VPWS) network with service interface-aware forwarding. In one example, a first network device signals to a second network device, using EVPN route advertisements, a multi-service service tunnel to transport network packets for a plurality of services. The services are identifiable by virtual local area network (VLAN) identifiers in the packets. The first network device is configured with a single transport interface for the service tunnel and the single transport interface is configured with respective service interfaces for the services. The first network device detects failure of a failed service interface of the service interfaces and outputs, in response to the failure, an EVPN route withdrawal message for the service tunnel that identifies the service corresponding to the failed service interface.
Abstract:
In general, techniques are described for load-balancing responsibility for forwarding of multicast traffic into an active-active Ethernet segment between two or more multi-homed provider edge (PE) routers in an Ethernet Virtual Private Network (EVPN). In one example, a PE router may receive an Internet Group Management Protocol (IGMP) join report for a multicast group. The PE router may send join synch routes used to synchronize the join report for the multicast group across the Ethernet segment. The PE router may deterministically determine whether the PE router is configured to be an elected multicast forwarder for one of a plurality of multicast groups. If the PE router is elected a multicast forwarder, the PE router may configure a forwarding state of the PE router to ignore a designated forwarder calculation and to forward the multicast traffic into the Ethernet segment regardless of whether the PE router is a designated forwarder.
Abstract:
A device may receive, from a first device associated with a first LAN, network traffic destined for a second LAN. The device may provide the first LAN with access to a core network. The device may not provide the second LAN with access to the core network. The device may identify, based on the network traffic, a Layer 3 address associated with a second device. The second device may be associated with the second LAN. The device may determine that the first device is categorized as a leaf device within an Ethernet Tree provided by the device. The device may determine, based on the Layer 3 address, that the second device is categorized as a leaf device within the Ethernet Tree. The device may drop the network traffic based on determining that the first device and the second device are categorized as leaf devices within the Ethernet Tree.
Abstract:
A network device is configured to provide, via an Ethernet segment with a customer network, active-active multi-homing L2 virtual bridge connectivity to the customer network using an EVPN instance (EVI) and L3 routing using an IRB interface that is a L3 routing interface assigned to the EVI; to receive, from a peer PE device of the EVPN instance, an EVPN route comprising an L2-L3 binding for a customer device of the customer network and associating the L2-L3 binding with the Ethernet segment, the L2-L3 binding comprising an L2 and an L3 address assigned to the customer device, wherein the peer PE device provides, with the network device and via the Ethernet segment, active-active multi-homing L2 virtual bridge connectivity to the customer network; and to forward, via the Ethernet segment and based at least on the L2-L3 binding received from the peer PE device, an L3 packet to the customer device.
Abstract:
The techniques described are directed to providing mass withdrawal of media access control (MAC) routes for network devices in an Ethernet virtual private network data center interconnect (EVPN DCI). MAC routes to reach the learned MAC addresses are stored in routing tables with corresponding top-of-rack Ethernet segment identifier (TOR-ESI) values that represent the Ethernet segments from where the MAC addresses were learned. A provider edge (PE) network device may configure and advertise a virtual Ethernet segment identifier (vESI) that includes a plurality of TOR-ESI values. As Ethernet segments of the data center become unavailable, the corresponding TOR-ESI values may be withdrawn from the vESI to form an updated vESI. In this way, MAC routes having a TOR-ESI value that was withdrawn from the vESI may be removed from the routing tables in each of the network devices.
Abstract:
Techniques are described for utilizing Protocol Independent Multicast Sparse Mode (PIM-SM) to transport BUM (broadcast, unknown unicast, and multicast) traffic in a Virtual Extensible LAN (VXLAN) underlay of a data center, where the BUM traffic is received on active-active, multi-homed Ethernet virtual private network (EVPN) interconnects between multiple physical data centers. For example, the techniques may readily be applied to support usage of PIM-SM where provider edge (PE) routers of the EVPN operate as gateways between the EVPN and the VXLAN spanning the data center interconnect.
Abstract:
A network device is configured to provide, via an Ethernet segment with a customer network, active-active multi-homing L2 virtual bridge connectivity to the customer network using an EVPN instance (EVI) and L3 routing using an IRB interface that is a L3 routing interface assigned to the EVI; to receive, from a peer PE device of the EVPN instance, an EVPN route comprising an L2-L3 binding for a customer device of the customer network and associating the L2-L3 binding with the Ethernet segment, the L2-L3 binding comprising an L2 and an L3 address assigned to the customer device, wherein the peer PE device provides, with the network device and via the Ethernet segment, active-active multi-homing L2 virtual bridge connectivity to the customer network; and to forward, via the Ethernet segment and based at least on the L2-L3 binding received from the peer PE device, an L3 packet to the customer device.
Abstract:
In general, techniques are described for performing a mass withdrawal of media access control (MAC) addresses using a reduced number of route withdrawal messages within a singly-homed segment of an Ethernet Virtual Private Network (EVPN). The techniques may include determining a segment identifier of the segment and sending a route advertisement to advertise a route for the segment identifier to a provider edge network device. The techniques may include sending a route advertisement to advertise one or more media access control (MAC) routes for the layer two segment. The techniques may also include, responsive to determining a link failure between a first provider edge network device and a customer edge network device, sending a withdrawal message to the second provider edge network device for the route associated with the segment identifier to withdraw all of the plurality of MAC routes at the second provider edge network device.
Abstract:
An aggregation node establishes a first session using a traffic-engineering label distribution protocol. The first session has a next hop adjacent to the aggregation node and positioned within a same network as the aggregation node. The aggregation node also establishes a second session using a traffic-engineering label distribution protocol, wherein the second session has a remote next hop positioned at a border between the network and a second network. The aggregation node sends a message destined for the remote next hop over the second session for establishing an end-to-end traffic engineered label switched path for a FEC specified in a label request message received from an access node, wherein the message includes the same the data indicating constraint information that was received by the aggregation node in the label request message.
Abstract:
A first network device receives a control message at an interface from a second network device, wherein the first network device and the second network device use a multipoint service that provides layer two (L2) connectivity between L2 networks. The control message specifies one or more L2 addresses of customer network devices that are provided connectivity to an autonomous system by the second network device, wherein the control message identifies the L2 addresses as static L2 addresses that are to be persistently maintained at the first network device as reachable by the interface. In response to receiving the control message and by the first network device, the first network device stores the L2 addresses as persistently maintained static L2 addresses being reachable by the interface at which the control message was received.