Booking options
£2,477
£2,477
Delivered Online or In-Person
You travel to organiser or they travel to you
Redhill
Two days
All levels
Ethernet VPN (E-VPN) and Provider Backbone
Bridging E-VPN (PBB-EVPN) are emerging
technologies providing Ethernet services over MPLS.
This course studies the technologies in
E-VPN/PBB-EVPN providing multi-homing, multi
pathing, auto discovery, multicast, forwarding and fast
convergence.
What will you learn
Differentiate between E-VPN and PBB-EVPN.
Explain how E-VPN operates.
Explain how PBB-EVPN operates.
Explain how E-VPN provides:
Multi homing
Multi pathing
Auto discovery.
Essential EVPN training course details
Who will benefit:
Network engineers. Staff working for carriers.
Prerequisites:
Definitive Ethernet switching for engineers
Concise MPLS for engineers
Duration
2 days
Introduction to EVPN
Network virtualization
What Is network virtualization? types of virtual networks,
network tunnelling, the consequences of tunnelling,
packet load balancing, network interface card behaviour.
maximum transmission unit, lack of visibility, VXLAN,
protocols to implement the control plane, support for
network virtualization technologies, merchant silicon Software, standards.
The building blocks of Ethernet VPN
A brief history of EVPN, architecture and protocols for
traditional EVPN deployment, EVPN in the data center
BGP constructs for Virtual networks, address family
indicator/subsequent address family indicator, route
distinguisher, route target, RD, RT, and BGP processing,
route types, modifications to support EVPN over eBGP,
keeping the NEXT HOP unmodified, retaining route
targets, FRR support for EVPN, automatic propagation of
NEXT HOP, RT/RD derivation, what Is not supported in
FRR.
Bridging with Ethernet VPN
An overview of traditional bridging, overview of bridging
with EVPN, what Ifs, why does NVE L3 get an
advertisement for MACA? handling BUM packets,
handling MAC moves, support for dual-attached hosts,
the host-switch Interconnect, VXLAN model for
dual-attached hosts, switch peering solutions, handling
Link failures, duplicate multi-destination frames, ARP/ND
suppression.
Routing with Ethernet VPN
The case for routing in EVPN, routing use cases in the
data center, routing models, where is the routing
performed? centralized routing, distributed routing, how
routing works in EVPN, asymmetric routing, symmetric
routing, VRFs in EVPN routing, summarized route
announcements, BGP support for EVPN routing,
comparing asymmetric and symmetric models, vendor
support for EVPN routing.
Configuring and administering Ethernet VPN
The sample topology, configuration cases, configuring
the MTU, the end first: complete FRR configurations,
the Invariants: configuration for the spines, firewall, and
servers, centralized routing, asymmetric distributed
routing, symmetric routing, dissecting the configuration,
configuring the underlay, configuring the overlay: FRR
configuring the overlay: interfaces, examining an EVPN
network, show running configuration, show BGP
summary, show EVPN VNIs and VTEPs, identify which
VTEP advertised a MAC address, comparing FRR and
Cisco EVPN configurations, considerations for deploying EVPN in large networks.