SlideShare a Scribd company logo
Ethernet VPN
               Layer 2 Scalability
                      Shivlu Jain
                      7/30/2012




Shivlu Jain        www.mplsvpn.info
Introduction

MPLS (Multi-Protocol Label Switching) is matured technology & has widely been opted by most of the
service providers across the globe. Initially it has been deployed for fast switching but due to its
scalability, resiliency & protocol agnostic nature made it more successful across the network. MPLS not
only provides the wan connectivity but also acts as a platform for service providers to offer different
kind of services which can further be used for monetization purpose.

VPLS (Virtual Private LAN Services) is one of the service offering in MPLS which helps to provide the
extension of broadcast domain from one to multiple sites over the wan. VPLS became more popular
after the outburst of data center interconnects. The utmost reason for the extension of layer 2 domains
is workload mobility (Migration of Virtual machines from one data center to another), high availability
clusters, and geographical redundancy.



Current Challenges with VPLS


    1. Scaling of thousands of MAC addresses (Single VM requires single mac address):- Virtualization
       applications are fueling the need of the mac-address in the network. A single server which can
       host hundreds of virtual machines and every machine consume one mac address which clearly
       justifies the scaling requirement of mac-address tables.

    2. Optimal forwarding of multicast:- Multicast LSP can be formed in conjunction with VPLS but
       limited to point to multipoint which consumes more network resources as there is no defined
       set of parameters in VPLS to create multipoint to multipoint multicast LSPs.

    3. MultiHoming:- VPLS supports Active/standby BGP multi homing model. MultiHoming with all
       active attached circuits is not possible. In contract, customer can utilize only 50% of the links in
       lieu of 100% payment.

    4. C-Mac (Customer Mac) Transparency:- Current VPLS solution doesn’t support the transparency
       of customer mac address.

    5. Fast Convergence for C-Mac Flushing:- In case of failure of virtual machines or physical servers,
       network re-convergence will occur which may lead to the mac flushing problems.




Shivlu Jain                                 www.mplsvpn.info
Proposed Solution

Ethernet Virtual Private Network (E-VPN) is the proposed solution to overcome the issues highlighted by
VPLS. E-VPN uses the existing MPLS/IP backbone to transport the layer 2 connectivity among the various
data centers which are part of same VPN. Being layer-2 extension, the solution treats the mac addresses
as routable addresses and uses the existing MP-iBGP protocol to carry the customer mac addresses. In E-
VPN, mac learning at the edge routers doesn’t occur in data plane but in the control plane consequences
more control could be applied in terms of the learning mechanism. The process is similar to the IPVPN as
mentioned in RFC 4364. The policy attributes specified in E-VPN are almost similar in MPLS VPN. RD and
RT remains the same, but instead of virtual routing forwarding instance we have now Ethernet VPN
Instance. The information about Ethernet TAG of EVI is advertised by the new BGP NLRI which is E-VPN.



                                               P2                                                    P1
    MES2       100
                         MES2                                          MES2       100      22
                                                                                                                                MES1

 Destination   EVPN                                                 Destination   EVPN   IGP Label
                                                                                                                                              MES2      100         20
                                                                       MPLS
                                                                      CLOUD                                                                  Destination EVPN     IGP Label


                                         MES2        100    PHP                                       MES2      100       21

                                       Destination   EVPN                                            Destination EVPN   IGP Label
                                                                                                                                                   H2,M2          H1,M1

                                                                                                                                                   Source       Destination
                       Data Center                                      P3                                                     Data Center
                         Cloud                                                                                                   Cloud

               H1,M1

                                     Traffic Forwarding From Host(H2,M2) To Host(H1,M1)
Figure 1



In EVPN, the mac learning could be of two types:-

      1. Local Mac Learning
      2. Remote Mac Learning



In local mac learning process, MPLS Edge Switch (MES) must support the local mac learning process
through standard protocols. Once the local learning process gets complete, MES can advertise the
locally learn mac address to remote MES nodes via MP-iBGP. This process of receiving the remote mac
addresses of attached customer via MP-iBGP is known as remote mac learning process.




Shivlu Jain                                                       www.mplsvpn.info
Solution for MultiHoming and Avoiding Layer 2 Loops in EVPN



Ethernet Segment ID (ESI) is used when Customer Edge device is multi homed to different MPLS Edge
Switches as shown in Figure 2. It has new MPLS BGP Label Extended community which is used for split

horizon procedures in multi homing scenarios. As depicted in figure 2, host H1 has mac address of M1. It
sends the broadcast request to MES-1 and MES2. MES-1 and MES-2 identified that the request is coming
from Extended Segment ID-1, so before replicating the frames both MESs will append a split horizon
label on the frames. Once it will be done, frames get exchanged among the MESs. All MESs check the SH
label and if found the same ESI-1 is directly attached, the traffic is silently dropped because a frame
originated by a segment must not be received by the same segment. This technique helps to avoid
loops in multi homing scenarios.




                                                      Step-2
                                                      MES-1 will append split
                                                      horizon(SH) label for
                                                      multi destination and
                                                      distributes over MP-                    Step-3
                                                      iBGP. MES-2,MES-3 and                   MES-3 will install that
                                                      MES-4will use SH label                  route as nexy hop MES-
               Step-1                                                                         1 and MES-2
                                                      to perform split horizon
               H1,M1 sends broadcast
                                                      filtering for frames
               request as source mac
                                                      destines to ESI-1.
               M1 and destination as
               Broadcast


                                              MES-1                                   MES-3
                                      ESI-1




        Data Center                                                                                  Data Center
      Cloud/Enterprise                                                   MP-iBGP
                                                                         Full Mesh                 Cloud/Enterprise
  H1,M1
                                                                                                                             H2,M2


                                              MES-2                                   MES-4
              Step-1
              H1,M1 sends broadcast
              request as source mac                        Step-2
              M1 and destination as                        MES-2 will append split
                                                                                                   Step-3
              Broadcast                                    horizon(SH) label for
                                                                                                   MES-4 will install that
                                                           multi destination and
                                                                                                   route as next hop MES-
                                                           distributes over MP-
                                                                                                   1 and MES-2
                                                           iBGP. MES-2,MES-3 and
                                                           MES-4will use SH label
                                                           to perform split horizon
                                                           filtering for frames
                                                           destines to ESI-1.




Figure 2


Shivlu Jain                                                          www.mplsvpn.info
Note:- Split horizon label is only used for unknown unicast, multicast and broadcast



Role of Designated Forwarder

As per figure 2, MES-3 and MES-4 will receive the multi destination frames via MP-iBGP for particular
segment. How will it be decided which MES has to forward the frames to downstream segment? Only
Designated Forwarder will forward the frames to particular segment and Designated forwarder election
is performed by each PE advertising the ESI in BGP route. All the non-Designated Forwarder MES will
block their respective port for that segment as shown in Figure 3.



                                                                                             MES-3 is elected as
                                                                                             Designated
                                                                                             Forwarder(Highest IP
                                                                                             Address) for ESI-2
                                                                                             segment.




                                 MES-1                                   MES-3
                         ESI-1




        Data Center                                                                                 Data Center
                                                     MP-iBGP                         ESI-2
      Cloud/Enterprise                                                                            Cloud/Enterprise
                                                     Full Mesh
  H1,M1
                                                                                 X                                         H2,M2


                                 MES-2                                   MES-4


                                                                                                 MES-4 is elected as
                                                                                                 non-Designated
                                         Designated Forwarder Election
                                                                                                 Forwarder for ESI-2
                                                                                                 segment. So MES-4 port
                                                                                                 towards ESI-2 Segment
                                                                                                 will remain in blocking
                                                                                                 state




Figure 3



Load Balancing

As per figure 3, MES-3 & MES-4 is receiving the update of host H1 with Mac M1 from MES-1 and MES-2
with Ethernet segment of ESI-1. So MES-3 and MES-4 install the two routes in the Forwarding
Information Base. Once the traffic of M1 destination is received both the routers will do the load
balancing during forwarding. The core will forward the traffic on the basics of next hop information for
M1 which is MES-1 and MES-2.




Shivlu Jain                                       www.mplsvpn.info
Scaling by using Provider Backbone Bridge (PBB)

The EVPN scalability is achieved by using the existing technique of Provider Backbone Bridge aka PBB.
Below are the advantages while using PBB in EVPN:-

    1. Subnetting of C-MAC addresses is not possible. But by using PBB, B-MAC addresses can be
       subnetted easily which leads to mac address scalability.
    2. In case of shifting of VM or local customer networks from one DC to another requires lot of mac
       flushing. But by using B-MAC that C-MAC flushing will become transparent which leads to fast
       convergence.
    3. Per Site Policy Support by using B-MAC
    4. Device MultiHoming
    5. Network MultiHoming
    6. C-MAC addresses need to be distributed in BGP but by using PBB-EVPN C-MAC advertisement
       could be limited by assigning multiple C-MAC addresses to single B-MAC address.




References

EVPN requirement
http://tools.ietf.org/html/draft-sajassi-raggarwa-l2vpn-evpn-req-00

BGP/MPLS IP VPN
http://tools.ietf.org/html/rfc4364

PBB-EVPN
http://tools.ietf.org/html/draft-ietf-l2vpn-pbb-evpn-03

VPLS
http://tools.ietf.org/html/rfc4762

EVP
http://tools.ietf.org/html/draft-ietf-l2vpn-evpn-00




Shivlu Jain                                www.mplsvpn.info

More Related Content

What's hot

OpenShift Kubernetes Native Infrastructure for 5GC and Telco Edge Cloud
OpenShift  Kubernetes Native Infrastructure for 5GC and Telco Edge Cloud OpenShift  Kubernetes Native Infrastructure for 5GC and Telco Edge Cloud
OpenShift Kubernetes Native Infrastructure for 5GC and Telco Edge Cloud
Hidetsugu Sugiyama
 
Vpc notes
Vpc notesVpc notes
Vpc notes
Krunal Shah
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
Rasoul Mesghali, CCIE RS
 
Juniper MPLS Tutorial by Soricelli
Juniper MPLS Tutorial by SoricelliJuniper MPLS Tutorial by Soricelli
Juniper MPLS Tutorial by Soricelli
Febrian ‎
 
Segment Routing
Segment RoutingSegment Routing
Segment Routing
APNIC
 
MPLS & BASIC LDP
MPLS & BASIC LDPMPLS & BASIC LDP
MPLS & BASIC LDP
Reza Farahani
 
EVPN for Cloud Builders
EVPN for Cloud BuildersEVPN for Cloud Builders
EVPN for Cloud Builders
Juniper Networks (日本)
 
Cisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TPCisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TP
Cisco Canada
 
VPC PPT @NETWORKERSHOME
VPC PPT @NETWORKERSHOMEVPC PPT @NETWORKERSHOME
VPC PPT @NETWORKERSHOME
networkershome
 
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017
Bruno Teixeira
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
KHNOG
 
Automating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkAutomating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS Network
Cisco Canada
 
Cisco asa firewall command line technical guide
Cisco asa firewall command line technical guideCisco asa firewall command line technical guide
Cisco asa firewall command line technical guide
MDEMARCOCCIE
 
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
Reza Farahani
 
Huawei GPON Fundamentals
Huawei GPON FundamentalsHuawei GPON Fundamentals
Huawei GPON Fundamentals
ibrahimnabil17
 
LTE and EPC Specifications
LTE and EPC SpecificationsLTE and EPC Specifications
LTE and EPC Specifications
aliirfan04
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
Morg
 
Implémentation de la QoS au sein d'un IP/MPLS - Présentation
Implémentation de la QoS au sein d'un IP/MPLS - PrésentationImplémentation de la QoS au sein d'un IP/MPLS - Présentation
Implémentation de la QoS au sein d'un IP/MPLS - Présentation
Rihab Chebbah
 
L2 over L3 ecnaspsulations
L2 over L3 ecnaspsulationsL2 over L3 ecnaspsulations
L2 over L3 ecnaspsulations
Motonori Shindo
 
Mpls
MplsMpls

What's hot (20)

OpenShift Kubernetes Native Infrastructure for 5GC and Telco Edge Cloud
OpenShift  Kubernetes Native Infrastructure for 5GC and Telco Edge Cloud OpenShift  Kubernetes Native Infrastructure for 5GC and Telco Edge Cloud
OpenShift Kubernetes Native Infrastructure for 5GC and Telco Edge Cloud
 
Vpc notes
Vpc notesVpc notes
Vpc notes
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
 
Juniper MPLS Tutorial by Soricelli
Juniper MPLS Tutorial by SoricelliJuniper MPLS Tutorial by Soricelli
Juniper MPLS Tutorial by Soricelli
 
Segment Routing
Segment RoutingSegment Routing
Segment Routing
 
MPLS & BASIC LDP
MPLS & BASIC LDPMPLS & BASIC LDP
MPLS & BASIC LDP
 
EVPN for Cloud Builders
EVPN for Cloud BuildersEVPN for Cloud Builders
EVPN for Cloud Builders
 
Cisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TPCisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TP
 
VPC PPT @NETWORKERSHOME
VPC PPT @NETWORKERSHOMEVPC PPT @NETWORKERSHOME
VPC PPT @NETWORKERSHOME
 
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
 
Automating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS NetworkAutomating for Monitoring and Troubleshooting your Cisco IOS Network
Automating for Monitoring and Troubleshooting your Cisco IOS Network
 
Cisco asa firewall command line technical guide
Cisco asa firewall command line technical guideCisco asa firewall command line technical guide
Cisco asa firewall command line technical guide
 
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
 
Huawei GPON Fundamentals
Huawei GPON FundamentalsHuawei GPON Fundamentals
Huawei GPON Fundamentals
 
LTE and EPC Specifications
LTE and EPC SpecificationsLTE and EPC Specifications
LTE and EPC Specifications
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
 
Implémentation de la QoS au sein d'un IP/MPLS - Présentation
Implémentation de la QoS au sein d'un IP/MPLS - PrésentationImplémentation de la QoS au sein d'un IP/MPLS - Présentation
Implémentation de la QoS au sein d'un IP/MPLS - Présentation
 
L2 over L3 ecnaspsulations
L2 over L3 ecnaspsulationsL2 over L3 ecnaspsulations
L2 over L3 ecnaspsulations
 
Mpls
MplsMpls
Mpls
 

Similar to Ethernet VPN - Layer 2 Scalability

EVPN-Presentation.pptx
EVPN-Presentation.pptxEVPN-Presentation.pptx
EVPN-Presentation.pptx
VimalMallick
 
evpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdfevpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdf
ThanhTrungBui5
 
LTE/EPS Technology
LTE/EPS TechnologyLTE/EPS Technology
LTE/EPS Technology
Leliwa
 
10 fn s26
10 fn s2610 fn s26
10 fn s26
Scott Foster
 
10 fn s26
10 fn s2610 fn s26
10 fn s26
Scott Foster
 
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PROIDEA
 
The CTO's Espresso Guide to SON
The CTO's Espresso Guide to SONThe CTO's Espresso Guide to SON
The CTO's Espresso Guide to SON
Mindspeed Technologies
 
VxLAN.pdf
VxLAN.pdfVxLAN.pdf
VxLAN.pdf
vinaykumar947680
 
Brkmpl 2333
Brkmpl 2333Brkmpl 2333
Brkmpl 2333
ronsito
 
EVPN-Applications.pdf
EVPN-Applications.pdfEVPN-Applications.pdf
EVPN-Applications.pdf
SunnyLai23
 
39018631 lte-overview
39018631 lte-overview39018631 lte-overview
39018631 lte-overview
cefer mecid
 
SimArch: A Layered Architectural Approach to Reduce the Development Effort of...
SimArch: A Layered Architectural Approach to Reduce the Development Effort of...SimArch: A Layered Architectural Approach to Reduce the Development Effort of...
SimArch: A Layered Architectural Approach to Reduce the Development Effort of...
Daniele Gianni
 
Infocom03 rajiv
Infocom03 rajivInfocom03 rajiv
Infocom03 rajiv
zt5169
 
Migrating from dynamic multipoint vpn phase 2 to phase 3
Migrating from dynamic multipoint vpn phase 2 to phase 3Migrating from dynamic multipoint vpn phase 2 to phase 3
Migrating from dynamic multipoint vpn phase 2 to phase 3
vijayd2015
 
10 fn s43
10 fn s4310 fn s43
10 fn s43
Scott Foster
 
Evaluation of scalability and bandwidth
Evaluation of scalability and bandwidthEvaluation of scalability and bandwidth
Evaluation of scalability and bandwidth
IJCNCJournal
 
Megis mpls
Megis mplsMegis mpls
Megis mpls
HARRY CHAN PUTRA
 
SIEPON Alignment with Broadband Forum Requirements
SIEPON Alignment with Broadband Forum RequirementsSIEPON Alignment with Broadband Forum Requirements
SIEPON Alignment with Broadband Forum Requirements
IEEE Standards Association (IEEE SA)
 
下一代移动互联网架构
下一代移动互联网架构 下一代移动互联网架构
下一代移动互联网架构
Mars Chen
 
Scalability analysis of a media aware network element
Scalability analysis of a media aware network elementScalability analysis of a media aware network element
Scalability analysis of a media aware network element
Alpen-Adria-Universität
 

Similar to Ethernet VPN - Layer 2 Scalability (20)

EVPN-Presentation.pptx
EVPN-Presentation.pptxEVPN-Presentation.pptx
EVPN-Presentation.pptx
 
evpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdfevpn_in_service_provider_network-web.pdf
evpn_in_service_provider_network-web.pdf
 
LTE/EPS Technology
LTE/EPS TechnologyLTE/EPS Technology
LTE/EPS Technology
 
10 fn s26
10 fn s2610 fn s26
10 fn s26
 
10 fn s26
10 fn s2610 fn s26
10 fn s26
 
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
 
The CTO's Espresso Guide to SON
The CTO's Espresso Guide to SONThe CTO's Espresso Guide to SON
The CTO's Espresso Guide to SON
 
VxLAN.pdf
VxLAN.pdfVxLAN.pdf
VxLAN.pdf
 
Brkmpl 2333
Brkmpl 2333Brkmpl 2333
Brkmpl 2333
 
EVPN-Applications.pdf
EVPN-Applications.pdfEVPN-Applications.pdf
EVPN-Applications.pdf
 
39018631 lte-overview
39018631 lte-overview39018631 lte-overview
39018631 lte-overview
 
SimArch: A Layered Architectural Approach to Reduce the Development Effort of...
SimArch: A Layered Architectural Approach to Reduce the Development Effort of...SimArch: A Layered Architectural Approach to Reduce the Development Effort of...
SimArch: A Layered Architectural Approach to Reduce the Development Effort of...
 
Infocom03 rajiv
Infocom03 rajivInfocom03 rajiv
Infocom03 rajiv
 
Migrating from dynamic multipoint vpn phase 2 to phase 3
Migrating from dynamic multipoint vpn phase 2 to phase 3Migrating from dynamic multipoint vpn phase 2 to phase 3
Migrating from dynamic multipoint vpn phase 2 to phase 3
 
10 fn s43
10 fn s4310 fn s43
10 fn s43
 
Evaluation of scalability and bandwidth
Evaluation of scalability and bandwidthEvaluation of scalability and bandwidth
Evaluation of scalability and bandwidth
 
Megis mpls
Megis mplsMegis mpls
Megis mpls
 
SIEPON Alignment with Broadband Forum Requirements
SIEPON Alignment with Broadband Forum RequirementsSIEPON Alignment with Broadband Forum Requirements
SIEPON Alignment with Broadband Forum Requirements
 
下一代移动互联网架构
下一代移动互联网架构 下一代移动互联网架构
下一代移动互联网架构
 
Scalability analysis of a media aware network element
Scalability analysis of a media aware network elementScalability analysis of a media aware network element
Scalability analysis of a media aware network element
 

Recently uploaded

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Ethernet VPN - Layer 2 Scalability

  • 1. Ethernet VPN Layer 2 Scalability Shivlu Jain 7/30/2012 Shivlu Jain www.mplsvpn.info
  • 2. Introduction MPLS (Multi-Protocol Label Switching) is matured technology & has widely been opted by most of the service providers across the globe. Initially it has been deployed for fast switching but due to its scalability, resiliency & protocol agnostic nature made it more successful across the network. MPLS not only provides the wan connectivity but also acts as a platform for service providers to offer different kind of services which can further be used for monetization purpose. VPLS (Virtual Private LAN Services) is one of the service offering in MPLS which helps to provide the extension of broadcast domain from one to multiple sites over the wan. VPLS became more popular after the outburst of data center interconnects. The utmost reason for the extension of layer 2 domains is workload mobility (Migration of Virtual machines from one data center to another), high availability clusters, and geographical redundancy. Current Challenges with VPLS 1. Scaling of thousands of MAC addresses (Single VM requires single mac address):- Virtualization applications are fueling the need of the mac-address in the network. A single server which can host hundreds of virtual machines and every machine consume one mac address which clearly justifies the scaling requirement of mac-address tables. 2. Optimal forwarding of multicast:- Multicast LSP can be formed in conjunction with VPLS but limited to point to multipoint which consumes more network resources as there is no defined set of parameters in VPLS to create multipoint to multipoint multicast LSPs. 3. MultiHoming:- VPLS supports Active/standby BGP multi homing model. MultiHoming with all active attached circuits is not possible. In contract, customer can utilize only 50% of the links in lieu of 100% payment. 4. C-Mac (Customer Mac) Transparency:- Current VPLS solution doesn’t support the transparency of customer mac address. 5. Fast Convergence for C-Mac Flushing:- In case of failure of virtual machines or physical servers, network re-convergence will occur which may lead to the mac flushing problems. Shivlu Jain www.mplsvpn.info
  • 3. Proposed Solution Ethernet Virtual Private Network (E-VPN) is the proposed solution to overcome the issues highlighted by VPLS. E-VPN uses the existing MPLS/IP backbone to transport the layer 2 connectivity among the various data centers which are part of same VPN. Being layer-2 extension, the solution treats the mac addresses as routable addresses and uses the existing MP-iBGP protocol to carry the customer mac addresses. In E- VPN, mac learning at the edge routers doesn’t occur in data plane but in the control plane consequences more control could be applied in terms of the learning mechanism. The process is similar to the IPVPN as mentioned in RFC 4364. The policy attributes specified in E-VPN are almost similar in MPLS VPN. RD and RT remains the same, but instead of virtual routing forwarding instance we have now Ethernet VPN Instance. The information about Ethernet TAG of EVI is advertised by the new BGP NLRI which is E-VPN. P2 P1 MES2 100 MES2 MES2 100 22 MES1 Destination EVPN Destination EVPN IGP Label MES2 100 20 MPLS CLOUD Destination EVPN IGP Label MES2 100 PHP MES2 100 21 Destination EVPN Destination EVPN IGP Label H2,M2 H1,M1 Source Destination Data Center P3 Data Center Cloud Cloud H1,M1 Traffic Forwarding From Host(H2,M2) To Host(H1,M1) Figure 1 In EVPN, the mac learning could be of two types:- 1. Local Mac Learning 2. Remote Mac Learning In local mac learning process, MPLS Edge Switch (MES) must support the local mac learning process through standard protocols. Once the local learning process gets complete, MES can advertise the locally learn mac address to remote MES nodes via MP-iBGP. This process of receiving the remote mac addresses of attached customer via MP-iBGP is known as remote mac learning process. Shivlu Jain www.mplsvpn.info
  • 4. Solution for MultiHoming and Avoiding Layer 2 Loops in EVPN Ethernet Segment ID (ESI) is used when Customer Edge device is multi homed to different MPLS Edge Switches as shown in Figure 2. It has new MPLS BGP Label Extended community which is used for split horizon procedures in multi homing scenarios. As depicted in figure 2, host H1 has mac address of M1. It sends the broadcast request to MES-1 and MES2. MES-1 and MES-2 identified that the request is coming from Extended Segment ID-1, so before replicating the frames both MESs will append a split horizon label on the frames. Once it will be done, frames get exchanged among the MESs. All MESs check the SH label and if found the same ESI-1 is directly attached, the traffic is silently dropped because a frame originated by a segment must not be received by the same segment. This technique helps to avoid loops in multi homing scenarios. Step-2 MES-1 will append split horizon(SH) label for multi destination and distributes over MP- Step-3 iBGP. MES-2,MES-3 and MES-3 will install that MES-4will use SH label route as nexy hop MES- Step-1 1 and MES-2 to perform split horizon H1,M1 sends broadcast filtering for frames request as source mac destines to ESI-1. M1 and destination as Broadcast MES-1 MES-3 ESI-1 Data Center Data Center Cloud/Enterprise MP-iBGP Full Mesh Cloud/Enterprise H1,M1 H2,M2 MES-2 MES-4 Step-1 H1,M1 sends broadcast request as source mac Step-2 M1 and destination as MES-2 will append split Step-3 Broadcast horizon(SH) label for MES-4 will install that multi destination and route as next hop MES- distributes over MP- 1 and MES-2 iBGP. MES-2,MES-3 and MES-4will use SH label to perform split horizon filtering for frames destines to ESI-1. Figure 2 Shivlu Jain www.mplsvpn.info
  • 5. Note:- Split horizon label is only used for unknown unicast, multicast and broadcast Role of Designated Forwarder As per figure 2, MES-3 and MES-4 will receive the multi destination frames via MP-iBGP for particular segment. How will it be decided which MES has to forward the frames to downstream segment? Only Designated Forwarder will forward the frames to particular segment and Designated forwarder election is performed by each PE advertising the ESI in BGP route. All the non-Designated Forwarder MES will block their respective port for that segment as shown in Figure 3. MES-3 is elected as Designated Forwarder(Highest IP Address) for ESI-2 segment. MES-1 MES-3 ESI-1 Data Center Data Center MP-iBGP ESI-2 Cloud/Enterprise Cloud/Enterprise Full Mesh H1,M1 X H2,M2 MES-2 MES-4 MES-4 is elected as non-Designated Designated Forwarder Election Forwarder for ESI-2 segment. So MES-4 port towards ESI-2 Segment will remain in blocking state Figure 3 Load Balancing As per figure 3, MES-3 & MES-4 is receiving the update of host H1 with Mac M1 from MES-1 and MES-2 with Ethernet segment of ESI-1. So MES-3 and MES-4 install the two routes in the Forwarding Information Base. Once the traffic of M1 destination is received both the routers will do the load balancing during forwarding. The core will forward the traffic on the basics of next hop information for M1 which is MES-1 and MES-2. Shivlu Jain www.mplsvpn.info
  • 6. Scaling by using Provider Backbone Bridge (PBB) The EVPN scalability is achieved by using the existing technique of Provider Backbone Bridge aka PBB. Below are the advantages while using PBB in EVPN:- 1. Subnetting of C-MAC addresses is not possible. But by using PBB, B-MAC addresses can be subnetted easily which leads to mac address scalability. 2. In case of shifting of VM or local customer networks from one DC to another requires lot of mac flushing. But by using B-MAC that C-MAC flushing will become transparent which leads to fast convergence. 3. Per Site Policy Support by using B-MAC 4. Device MultiHoming 5. Network MultiHoming 6. C-MAC addresses need to be distributed in BGP but by using PBB-EVPN C-MAC advertisement could be limited by assigning multiple C-MAC addresses to single B-MAC address. References EVPN requirement http://tools.ietf.org/html/draft-sajassi-raggarwa-l2vpn-evpn-req-00 BGP/MPLS IP VPN http://tools.ietf.org/html/rfc4364 PBB-EVPN http://tools.ietf.org/html/draft-ietf-l2vpn-pbb-evpn-03 VPLS http://tools.ietf.org/html/rfc4762 EVP http://tools.ietf.org/html/draft-ietf-l2vpn-evpn-00 Shivlu Jain www.mplsvpn.info