Ethernet VPN (EVPN) - Casos de Uso e Aplicação

Slides:



Advertisements
Similar presentations
Virtual Links: VLANs and Tunneling
Advertisements

History of VPLS at IETF Ali Sajassi November 12, 2002.
APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 BGP based Virtual Private Multicast Service Auto-Discovery and Signaling.
MPLS VPN.
Identifying MPLS Applications
Overlay Transport Virtualization (OTV)
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs and VPLS draft-raggarwa-l3vpn-mvpn-vpls-mcast-
MCT Design Options & Best Practices
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Deployment of MPLS VPN in Large ISP Networks
Why SDN and MPLS? Saurav Das, Ali Reza Sharafat, Guru Parulkar, Nick McKeown Clean Slate CTO Summit 9 th November, 2011.
Juniper Networks, Inc. Copyright © L2 MPLS VPNs Hector Avalos Technical Director-Southern Europe
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Introduction into VXLAN Russian IPv6 day June 6 th, 2012 Frank Laforsch Systems Engineer, EMEA
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 draft-boutros-l2vpn-vpls-active-active-00.txt.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Multicast in BGP/MPLS VPNs draft-ietf-l3vpn-2547bis-mcast-00.txt.
The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy.
Network Overlay Framework Draft-lasserre-nvo3-framework-01.
CS Summer 2003 Lecture 14. CS Summer 2003 MPLS VPN Architecture MPLS VPN is a collection of sites interconnected over MPLS core network. MPLS.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
MPLS And The Data Center Adrian Farrel Old Dog Consulting / Juniper Networks
Data Center Network Redesign using SDN
Lucy Yong Susan Hares September 20, 2012 Boston
Draft-bitar-nvo3-vpn-applicability-00.txt Page - 1 Cloud Networking: Framework and VPN Applicability draft-bitar-nvo3-vpn-applicability-00.txt Nabil Bitar.
Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution draft-xu-virtual-subnet-06 Xiaohu Xu IETF82, TAIWAN.
Cloud Scale Performance & Diagnosability Comprehensive SDN Core Infrastructure Enhancements vRSS Remote Live Monitoring NIC Teaming Hyper-V Network.
Vic Liu Liang Xia Zu Qiang Speaker: Vic Liu China Mobile Network as a Service Architecture draft-liu-nvo3-naas-arch-01.
1 © OneCloud and/or its affiliates. All rights reserved. VXLAN Overview Module 4.
BGP L3VPN Virtual CE draft-fang-l3vpn-virtual-ce-01 Luyuan Fang Cisco John Evans Cisco David Ward Cisco Rex Fernando Cisco John Mullooly Cisco Ning So.
Using BGP between PE and CE in EVPN draft-li-l2vpn-evpn-pe-ce-01 Zhenbin Li, Junlin Zhuang, Shunwan Zhuang (Huawei Technologies) IETF 90, Toronto, Canada.
MPLS VPNs by Richard Bannister. The Topology The next two slides display both the physical and logical topology of our simple example network –Please.
Draft-boutros-l2vpn-evpn-vpws-00.txt Sami Boutros Ali Sajassi Samer Salam IETF 84, July 2012 Vancouver, Canada.
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
E-VPN on UW System Network Michael Hare. Purpose of presentation A high level introduction to E-VPN A simple lab demonstration For our documentation,
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-pbb-evpn-02.txt Ali Sajassi (Cisco), Nabil Bitar.
Segment EVPN draft-li-l2vpn-segment-evpn Zhenbin Li Lucy Yong (Presenter) Junlin Zhang July, 2013 Berlin Germany.
1 Copyright © 2009 Juniper Networks, Inc. E-VPN for NVO Use of Ethernet Virtual Private Network (E-VPN) as the carrier-grade control plane.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
Active-active access in NVO3 network draft-hao-l2vpn-evpn-nvo3-active-active-00 July 20131Active-active access in NVO3 network Weiguo Hao(Huawei) Yizhou.
EVPN: Or how I learned to stop worrying and love the BGP
VXLAN DCI Using EVPN draft-boutros-l2vpn-vxlan-evpn-01.txt Sami Boutros Ali Sajassi Samer Salam Dennis Cai IETF 86, March 2013 Orlando, Florida.
IP/MPLS VPN Protocol GAP Analysis For NVO3 draft-hy-nvo3-vpn-protocol-gap-analysis-02 Lucy Yong Susan Hares March 2013 Orlando FL.
EVPN: Or how I learned to stop worrying and love the BGP Tom Dwyer, JNCIE-ENT #424 Clay Haynes, JNCIE-SEC # 69 JNCIE-ENT # 492.
MPLS Virtual Private Networks (VPNs)
EVPN Unifying control plane
Layer 3 Redundancy 1. Hot Standby Router Protocol (HSRP)
TRILL DataCenter/Campus/PBB Inter-connect over IP core with BGP
Virtual Hub & Spoke with BGP EVPNs
MPLS VPN Implementation
Virtual Subnet : A L3VPN-based Subnet Extension Solution
Revisiting Ethernet: Plug-and-play made scalable and efficient
Hierarchical Fabric Designs
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
EVPN Interworking with IPVPN
draft-sajassi-bess-evpn-ip-aliasing- 00.txt
draft-sajassi-bess-evpn-vpls-all-active- 00.txt
EVPN a very short introduction
Attilla de Groot | Sr. Systems Engineer, HCIE #3494 | Cumulus Networks
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
EVPN Inter-subnet Multicast Forwarding
EVPN multi-homing port-active load-balancing IETF-101 [London]
Virtual Hub-and-Spoke in BGP EVPNs
Applicability of EVPN to NVO3 Networks
EVPN and L2 Access Protocols: Single-Flow-Active load-balancing mode
Tim Strakh CEO, IEOFIT CCIE RS, CCIE Sec CCIE Voice, CCIE DC
Presentation transcript:

Ethernet VPN (EVPN) - Casos de Uso e Aplicação Alexandre Silvestre Novembro, 2014

EVPN background and motivation EVPN operations EVPN use cases AGENDA EVPN background and motivation EVPN operations EVPN use cases Key take-aways

EVPN and the opportunity to make it right What have we learnt about VPNs IP-VPN (RFC4364) is successfully deployed in SP networks without interop issues, easy to provision, supports all-active MH but only IP traffic VPLS (RFC4761/4762/6074) had control plane interop issues, provisioning vs efficiency trade-offs, flood-and-learn is not optimum, but works for any Ethernet traffic Why another VPN technology Cloud and NFV are shifting the way networks must behave EVPN is an Ethernet VPN technology (provides L2 and L3) that provides the required flexibility, it is future-proof and inherits over a decade of VPN experience Where can we use EVPN Cloud and virtualization services Data Center Interconnect (DCI) Integrated Layer-2 and Layer-3 VPN services Overlay technologies that simplify topologies and protocols

EVPN is taking off in the industry draft-allan-l2vpn-mldp-evpn draft-boutros-l2vpn-evpn-vpws draft-boutros-l2vpn-vxlan-evpn draft-ietf-l2vpn-evpn RFC7209 (draft-ietf-l2vpn-evpn-req) draft-ietf-l2vpn-pbb-evpn draft-ietf-l2vpn-spbm-evpn draft-ietf-l2vpn-trill-evpn draft-jain-l2vpn-evpn-lsp-ping draft-li-l2vpn-evpn-mcast-state-ad draft-li-l2vpn-evpn-pe-ce draft-li-l2vpn-segment-evpn draft-rabadan-l2vpn-dci-evpn-overlay draft-rabadan-l2vpn-evpn-prefix-advertisement draft-rabadan-l2vpn-evpn-optimized-ir draft-rp-l2vpn-evpn-usage draft-sajassi-l2vpn-evpn-etree draft-sajassi-l2vpn-evpn-inter-subnet-forwarding draft-sajassi-l2vpn-evpn-ipvpn-interop draft-sajassi-l2vpn-evpn-vpls-integration draft-salam-l2vpn-evpn-oam-req-frmwk draft-sd-l2vpn-evpn-overlay draft-vgovindan-l2vpn-evpn-bfd draft-zhang-l2vpn-evpn-selective-mcast draft-zheng-l2vpn-evpn-pm-framework Perceived as a new hot technology driven by IETF L2VPN WG Many mature base I-Ds and new I-Ds RFC7209 (EVPN requirements) draft-ietf-l2vpn-evpn base specification: last call already draft-ietf-l2vpn-pbb-evpn: no more changes expected Diverse authors on requirements and base specification Vendors Network operators Shipping implementations

EVPN changes the paradigm: MACs are advertised in MP-BGP Brings proven and inherent BGP control plane scalability to MAC routes Consistent signaled FDB in any size network instead of flooding Route-reflectors and BGP features available for layer-2 BGP advertises MACs/IPs for next hop resolution with EVPN NLRI AFI = 25 (L2VPN) and SAFI = 70 (EVPN) Fully supports IPv4 and IPv6 Offers greater control over MAC learning What is signaled, from where and to whom Ability to apply MAC learning policies Maintains virtualization and isolation of EVPN instances Enables traffic load balancing for multihomed CEs with ECMP MAC routes MAC Advertisement Route (Light Blue Fields are not part of the route key) Route-distinguisher (8B) Ethernet Segment ID (10B) Ethernet Tag ID (4B) MAC Address Length (1B) MAC Address (6B) IP Address Length (1B) IP Address (0 or 4 or 16B) MPLS Label 1 (3B) MPLS Label 2 (0 or 3B)

draft-ietf-l2vpn-evpn EVPN provides control plane and data plane separation A unified control plane for L2/L3 and any data plane option Control Plane EVPN MP-BGP draft-ietf-l2vpn-evpn Data Plane Multiprotocol Label Switching (MPLS) draft-ietf-l2vpn-evpn Provider Backbone Bridges (PBB) draft-ietf-l2vpn-pbb-evpn Network Virtualization Overlay (NVO) draft-sd-l2vpn-evpn-overlay EVPN over MPLS for ELAN services All-active and single-active multihoming RSVP-TE/LDP/SR or any MPLS transport EVPN with PBB PE functionality for scaling very large networks over MPLS All-active and single-active multihoming EVPN over NVO tunnels (VXLAN, NVGRE, MPLSoGRE) for overlay encapsulations

THE MAIN EVPN CONCEPTS IN ONE SHOT draft-ietf-l2vpn-evpn EVPN Instance (EVI) Identifies a VPN MAC-VRF Virtual Routing Forwarding table for MACs Ethernet Tag Broadcast or Bridge Domain in the EVI Control Plane Learning PEs Advertise MAC Addresses and Next Hops From Connected CEs Using MP-BGP Single-Active Mode Multihomed, One Active PE Data/Mgmt Plane Learning Dynamic or Static (Provisioned) EVI 1 EVI 1 PE5 PE6 All-Active Mode Multihomed, Two or More Active PEs MAC/IP PE1 PE3 VM EVI 1 EVI 1 CE EVI 1 EVI 1 MAC/IP BGP update LAG Ethernet Segment Identifier (ESI) Link(s) that Connect the CE to PEs (ESIs are Unique Across the Network) PE2 PE4 Customer Edge (CE) Host, VM, Router or Switch Data Plane Encapsulation MPLS or NVO tunnels

EVPN background and motivation EVPN operations AGENDA EVPN background and motivation EVPN operations Data planes Multihoming, aliasing and mass-withdraw MAC-mobility, MAC-duplication and MAC-protection Proxy-ARP/ND and unknown flooding suppression Inter-subnet forwarding EVPN use cases Key take-aways

MPLS tunnels (RSVP, LDP, SR) EVPN abstracts the control plane to support current and future data plane encapsulations EVPN over MPLS draft-ietf-l2vpn-evpn Uses a service label (no PWs) as EVI demultiplexer Transport: requires IGP, RSVP/LDP/3107 BGP and takes advantage of all the MPLS features PE2 PE1 CE2 EVI 1 MAC/IP BGP update EVI 1 CE1 MAC1/IP1 RD = 65000:1 EVPN over NVO tunnels draft-sd-l2vpn-evpn-overlay Uses the Ethernet-tag to signal the NVO demultiplexer Transport: requires IGP only 7x50 support: VXLAN 2 ESI = 0 NVO tunnels (VNI, VSID) Ethernet Tag ID (4B) MAC1 - IP1/32 MPLS tunnels (RSVP, LDP, SR) MPLS label (3B) 1

EVPN is the only VPN technology that provides all-active MH (per-flow load balancing) ALIASING MAC1 ESI2 Non-DF for ESI2 CE1 CE1 PE1 CE1 PE1 PE1 MAC1 FF ESI2 PE3 PE3 ESI2 PE3 ESI2 CE3 CE3 CE2 CE3 CE2 LAG CE2 LAG PE2 PE2 PE2 LAG SPLIT-HORIZON ESI2 DF ELECTION MAC1 – ES2 - PE1 - PE2 ECHO’ED PACKETS DUPLICATED PACKETS DF for ESI2 DF for ESI2 Split-horizon ensures that BUM traffic sent to the non-DF is not replicated back to the ESI The DF signals an ESI label that the non-DF is used to send BUM traffic to the DF The DF uses the ESI label to suppress the BUM to the ESI identified by the label The DF election avoids duplicate BUM flooding to all-active CEs EVPN elects a DF per ESI per service DF is responsible for BUM flooding to the Ethernet Segment Aliasing allows load-balancing to the PEs part of the ESI EVPN advertises what PEs are part of the ESI PE3 does ECMP to all the ESI owners

EVPN single-active multihoming and mass-withdraw ESI1 withdraw PE1 In single-active multihoming EVPN, a mass-withdraw message is sent for all the services in the ESI PEs advertise: MAC/IP address and its ESI (only PE1) AD route per ESI (PE1 and PE2) If a failure affects the ESI, PE1 simply withdraws the route for the ESI and the remote PE moves all the MACs to the backup PE (PE2) Total convergence time is uniform for all the services No need to wait for individual MACs to be withdrawn, no flooding EVI 1 PE3 EVI 2 ESI1 EVI 3 EVI 1 EVI 2 EVI 1 EVI 3 EVI 2 EVI 3 PE2 In single-active multihoming VPLS, individual MAC flush messages must be sent per service in order to flush the MACs Total convergence time grows with the number of services MAC-flush creates subsequent flooding

EVPN supports MAC mobility, duplication and protection 2 MOBILITY 1 ALIASING MAC1 MAC1 MAC1 MAC1/ESI1 SEQ N MAC1/ESI1 BGP update PE1 PE1 EVI 1 PE3 EVI 1 PE3 ESI1 EVI 1 ESI1 MAC1/ESI1 BGP update EVI 1 EVI 1 EVI 1 PE2 MAC1/ESI0 SEQ N+1 PE2 MAC2 3 MAC2/ESI1 Protected A MAC advertised by two PEs using the same ESI is interpreted by the remote PEs as a multihomed MAC This function is used for aliasing Even if only one PE advertises MAC1/ESI1, PE3 will do multipathing It can also be used for “anycast” forwarding (if ecmp=1) PROTECTION A MAC advertised by two PEs using different ESI is interpreted as mobility (until a threshold is reached) A SEQ number is incremented each time the MAC is advertised from a different ESI If MAC1 moves X times in Y minutes (configurable) mac-duplication is triggered A MAC advertised as protected will not be overridden by the default PEs, and offending packets will be dropped

EVPN provides integrated L2 and L3 forwarding Asymmetric IRB model (draft-sajassi-l2vpn-evpn-inter-subnet-forwarding) A customer (or tenant) is given: An EVI per subnet which exists in all the PEs in the network A VRF on each PE that has IRBs to all the MAC-VRFs for the customer and can forward traffic among all the subnets EVPN advertises the IRB MAC/IPs and learnt host MAC/IPs Ingress PE VRF/ARP tables IP MAC NH 20.10 M2 EVI2 Egress PE EVI2 FDB MAC NH M2 local EVI1 FDB MAC NH IRB1 local EVI2 FDB MAC NH M2 EVPN-PE2 IRB-2 20.20.20.1 IRB-3 20.20.20.2 IRB-1 10.10.10.1 IRB-4 10.10.10.2 When a host sends traffic to a remote subnet: At the ingress PE FDB lookup yields IRB interface Routing/ARP lookup yields local EVI and remote MAC/PE At the egress PE Only FDB lookup is required VRF VRF MAC-VRF EVI1 MAC-VRF EVI2 MAC-VRF EVI2 MAC-VRF EVI1 VM1 VM2 10.10.10.10/24 M1 PE1 20.20.20.10/24 M2 PE2 NOTE: MAC-VRF is an EVI instance in a given PE

EVPN provides integrated L2 and L3 forwarding Symmetric IRB model (draft-rabadan-l2vpn-evpn-prefix-advertisement) A customer (or tenant) is given: An EVI per subnet which exists ONLY where there are hosts for that subnet A VRF on each PE that has IRBs to the local MAC-VRFs and a EVPN-tunnel IRB (no IP) Host MAC/IPs in one EVI are not imported by the remote PEs if the EVI is not local EVPN advertises IP prefixes that are imported in the VRF routing table Ingress PE Egress PE VRF table IP NH 20.0 EVPN-tunnel PE2 VRF/ARP tables IP MAC NH 20.10 M2 EVI2 EVI2 FDB MAC NH M2 local EVI1 FDB MAC NH IRB1 local IRB EVPN-tunnel IRB EVPN-tunnel IRB-1 10.10.10.1 IRB-4 20.20.20.1 VRF VRF When a host sends traffic to a remote subnet: At the ingress PE FDB lookup yields IRB interface Routing lookup yields remote PE and MAC DA At the egress PE Routing/ARP lookup yields MAC and local EVI FDB lookup yields the local AC MAC-VRF EVI1 MAC-VRF EVI2 VM1 VM2 10.10.10.10/24 M1 PE2 PE1 20.20.20.10/24 M2 EVPN Prefix-route 20.20.20.0/24 The symmetric model saves ARP and FDB entries

EVPN background and motivation EVPN operations EVPN use cases AGENDA EVPN background and motivation EVPN operations EVPN use cases Data Center and Data Center Interconnect Service chaining (PBR to NFV appliance) Internet Exchange Points Provider VPNs with integrated Layer-2 and Layer-3 services Overlay VPNs over IP Key take-aways

Data Center use-case VXLAN EVPN-VXLAN Cloud computing and NFV are shifting DC networks to SDN-based DCs where only VXLAN and EVPN provide the required capabilities Legacy DC networks can’t cope with 10,000s of dynamic hosts/VMs EVPN-VXLAN Required EVPN features EVPN provides L2/L3 connectivity for 1,000s of tenants in the DC The IP fabric can also be extended to the WAN for DC interconnect MAC mobility, proxy-ARP/ND, MAC protection, unknown flooding suppression, inter-subnet forwarding IP Fabric Payload IP VLAN MAC VXLAN VPN ID + HASH VXLAN data plane provides the required scalability, performance and simplicity De-facto standard with assisted hardware in servers ECMP and fast resiliency Loop-free forwarding for L2 Shortest path between any 2 endpoints Tunnel between endpoints UDP IP MAC VXLAN

The use of EVPN for PBR Required EVPN features EVPN AD route ESI 0x01, VNI 1 NH PE3 Firewall IP Active PE3 MAC ESI 0x01 VXLAN (VNI1) EVI Required EVPN features EVPN AD routes per ESI Standby UDP IP (to PE3) ESI 0x01 Ingress ACL PBR to F1 (20.20.20.2) PE1 MAC Redirected path EVI IP Fabric EVI VM1 PE2 Regular forwarding PE4 EVI The ESI is a port identifier whose active presence is advertised by EVPN A PBR rule to an ESI can redirect traffic to a remote ‘port’ regardless of what is connected behind The ESI is advertised by EVPN when the FW port is active and withdrawn when the port goes inactive Active-active redirect is also possible (re-using the aliasing concept) Filter table Matching criteria Action Next-hop xxxxx forward ESI 0x01

Internet eXchange Points Peering fabrics Static MAC/IP provisioning of the router interfaces for maximum security Suppresses unknown and ARP/ND flooding Drops unknown source MACs IP or IP/MPLS Core Network EVI MACs/IPs EVI EVPN required features L2 interconnection over a VXLAN or MPLS peering fabric Proxy-ARP/ND and unknown/ARP/ND suppression MAC duplication, MAC protection Anti-spoofing operation EVI MAC/IP Proxy-ARP/ND EVI Who has IP1? EVI MAC1 has IP1 ARP SPOOFER Dynamic ARP/ND learning of proxy-ARP/ND entries for easy provisioning, minimum flooding and anti-spoofing monitoring Dynamic learning of ARP/ND entries is possible Anti-spoofing monitors hosts claiming the same IP If a duplicate is detected, an alarm is triggered and MAC/IPs put in hold-down mode An option to inject an anti-spoof mac is possible too

Provider-provisioned VPNs Layer-2 and Layer-3 services EVPN MAC/IP updates PE1 Required EVPN features IP-prefix advertisement and inter-subnet forwarding All-active multihoming for link utilization Single-active multihoming for better determinism PBB-EVPN for large layer-2 VPNs EVI 1 PE3 EVI 2 ESI1 EVI 3 EVI 1 EVI 2 EVI 1 EVI 3 EVI 2 VRF EVI 3 PE2 EVPN provides layer-2 and layer-3 services Both services are provided through the same logical AC to the customer One VPN technology for both services, no need for multiple protocols VXLAN or MPLS data planes are possible

Enterprise-provisioned overlay VPNs BGP Control Plane PE CE CE SP B Service Provider A PE EVI 1 SP C EVI 1 PE CE EVI 1 VXLAN Data Plane EVPN-VXLAN works over any IP service to provide a flexible Layer-2 and Layer-3 VPN Just requires IP connectivity between the sites, no need to run any MPLS or special configuration by the IP service provider Service Provider is transparent to EVPN EVPN overlay is transparent to service providers VPN routing between endpoints can be controlled with BGP (ipv4) and routing policies to service providers Routing and MAC/IP advertisements within EVPN controlled via iBGP (evpn) between PEs

EVPN background and motivation EVPN operations EVPN use cases AGENDA EVPN background and motivation EVPN operations EVPN use cases Key take-aways

EVPN is the next-generation VPN solution Efficient (all-active MH, BUM-optimized delivery) Secure (proxy ARP/ND, MAC protection, flooding suppression) Integrated Layer-2 and Layer-3 services Flexible data plane choice (MPLS, PBB, NVO) EVPN is already used today in some use-cases with many more to come EVPN real life deployment – the VPN solution that “maximizes the future freedom of action”

EVPN requirements and benefits VPLS EVPN What does it do for me? Address Learning Control Plane Address Learning in the Core   Greater Scalability and Control Provisioning L3VPN-Like Operation Simpler Provisioning and Automation Auto Discovery and Configuration PEs Only Resiliency Active-Standby Multihoming (Service-Based Load Balancing) Standby Redundancy All-Active Multihoming (Flow-Based Load Balancing) Active Redundancy and Link Utilization Services VLAN Based Service Interfaces Virtualization and Advanced Services VLAN Aware Bundling Service Interfaces Inter-Subnet Forwarding Layer 2 and Layer 3 Over the Same Interface Flow Optimization ARP/ND Proxy Security and MAC Provisioning MAC Mobility

EVPN NLRI Route Types and Extended Communities Route Description Route Usage Reference 1 Ethernet Auto-Discovery (A-D) Route Endpoint Discovery, Aliasing, Mass-Withdraw draft-ietf-l2vpn-evpn 2 MAC Advertisement Route MAC/IP Advertisement 3 Inclusive Multicast Route BUM Flooding Tree 4 Ethernet Segment Route Ethernet Segment Discovery, DF Election 5 IP Prefix Route IP Route Advertisement draft-rabadan-l2vpn-evpn-prefix-advertisement Extended Community Type Extended Community Description Extended Community Usage 0x06/0x01 ESI Label Extended Community Split Horizon Label 0x06/0x02 ES-Import Route Target Redundancy Group Discovery 0x06/0x00 MAC Mobility Extended Community MAC Mobility 0x03/0x030d Default Gateway Extended Community Default Gateway draft-ietf-l2vpn-evpn, bgp-extended-communities