• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Essential EVPN

Essential EVPN

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online or In-Person

  • You travel to organiser or they travel to you

  • Redhill

  • Two days

  • All levels

Description

Essential EVPN training course description

Ethernet VPN (E-VPN) and Provider Backbone
Bridging E-VPN (PBB-EVPN) are emerging
technologies providing Ethernet services over MPLS.
This course studies the technologies in
E-VPN/PBB-EVPN providing multi-homing, multi
pathing, auto discovery, multicast, forwarding and fast
convergence.

What will you learn

  • Differentiate between E-VPN and PBB-EVPN.

  • Explain how E-VPN operates.

  • Explain how PBB-EVPN operates.

  • Explain how E-VPN provides:
    Multi homing
    Multi pathing
    Auto discovery.

Essential EVPN training course details

  • Who will benefit:

Network engineers. Staff working for carriers.

  • Prerequisites:

Definitive Ethernet switching for engineers
Concise MPLS for engineers

  • Duration

2 days

Essential EVPN training course contents
  • Introduction to EVPN

  • Network virtualization


What Is network virtualization? types of virtual networks,
network tunnelling, the consequences of tunnelling,
packet load balancing, network interface card behaviour.
maximum transmission unit, lack of visibility, VXLAN,
protocols to implement the control plane, support for
network virtualization technologies, merchant silicon Software, standards.

  • The building blocks of Ethernet VPN


A brief history of EVPN, architecture and protocols for
traditional EVPN deployment, EVPN in the data center
BGP constructs for Virtual networks, address family
indicator/subsequent address family indicator, route
distinguisher, route target, RD, RT, and BGP processing,
route types, modifications to support EVPN over eBGP,
keeping the NEXT HOP unmodified, retaining route
targets, FRR support for EVPN, automatic propagation of
NEXT HOP, RT/RD derivation, what Is not supported in
FRR.

  • Bridging with Ethernet VPN


An overview of traditional bridging, overview of bridging
with EVPN, what Ifs, why does NVE L3 get an
advertisement for MACA? handling BUM packets,
handling MAC moves, support for dual-attached hosts,
the host-switch Interconnect, VXLAN model for
dual-attached hosts, switch peering solutions, handling
Link failures, duplicate multi-destination frames, ARP/ND
suppression.

  • Routing with Ethernet VPN


The case for routing in EVPN, routing use cases in the
data center, routing models, where is the routing
performed? centralized routing, distributed routing, how
routing works in EVPN, asymmetric routing, symmetric
routing, VRFs in EVPN routing, summarized route
announcements, BGP support for EVPN routing,
comparing asymmetric and symmetric models, vendor
support for EVPN routing.

  • Configuring and administering Ethernet VPN


The sample topology, configuration cases, configuring
the MTU, the end first: complete FRR configurations,
the Invariants: configuration for the spines, firewall, and
servers, centralized routing, asymmetric distributed
routing, symmetric routing, dissecting the configuration,
configuring the underlay, configuring the overlay: FRR
configuring the overlay: interfaces, examining an EVPN
network, show running configuration, show BGP
summary, show EVPN VNIs and VTEPs, identify which
VTEP advertised a MAC address, comparing FRR and
Cisco EVPN configurations, considerations for deploying EVPN in large networks.

About The Provider

Tags

Reviews