ESSENTIAL EVPN TRAINING COURSE DESCRIPTION
Ethernet VPN (E-VPN) and Provider Backbone Bridging E-VPN (PBB-EVPN) are
emerging technologies providing Ethernet services over MPLS. This course studies
the technologies in E-VPN/PBB-EVPN providing multi-homing, multi pathing, auto
discovery, multicast, forwarding and fast convergence.
WHAT WILL YOU LEARN
* Differentiate between E-VPN and PBB-EVPN.
* Explain how E-VPN operates.
* Explain how PBB-EVPN operates.
* Explain how E-VPN provides:
Multi homing
Multi pathing
Auto discovery.
ESSENTIAL EVPN TRAINING COURSE DETAILS
* Who will benefit:
Network engineers. Staff working for carriers.
* Prerequisites:
Definitive Ethernet switching for engineers
Concise MPLS for engineers
* Duration
2 days
ESSENTIAL EVPN TRAINING COURSE CONTENTS
* Introduction to EVPN
* Network virtualization
What Is network virtualization? types of virtual networks, network
tunnelling, the consequences of tunnelling, packet load balancing, network
interface card behaviour. maximum transmission unit, lack of visibility,
VXLAN, protocols to implement the control plane, support for network
virtualization technologies, merchant silicon Software, standards.
* The building blocks of Ethernet VPN
A brief history of EVPN, architecture and protocols for traditional EVPN
deployment, EVPN in the data center BGP constructs for Virtual networks,
address family indicator/subsequent address family indicator, route
distinguisher, route target, RD, RT, and BGP processing, route types,
modifications to support EVPN over eBGP, keeping the NEXT HOP unmodified,
retaining route targets, FRR support for EVPN, automatic propagation of NEXT
HOP, RT/RD derivation, what Is not supported in FRR.
* Bridging with Ethernet VPN
An overview of traditional bridging, overview of bridging with EVPN, what
Ifs, why does NVE L3 get an advertisement for MACA? handling BUM packets,
handling MAC moves, support for dual-attached hosts, the host-switch
Interconnect, VXLAN model for dual-attached hosts, switch peering solutions,
handling Link failures, duplicate multi-destination frames, ARP/ND
suppression.
* Routing with Ethernet VPN
The case for routing in EVPN, routing use cases in the data center, routing
models, where is the routing performed? centralized routing, distributed
routing, how routing works in EVPN, asymmetric routing, symmetric routing,
VRFs in EVPN routing, summarized route announcements, BGP support for EVPN
routing, comparing asymmetric and symmetric models, vendor support for EVPN
routing.
* Configuring and administering Ethernet VPN
The sample topology, configuration cases, configuring the MTU, the end first:
complete FRR configurations, the Invariants: configuration for the spines,
firewall, and servers, centralized routing, asymmetric distributed routing,
symmetric routing, dissecting the configuration, configuring the underlay,
configuring the overlay: FRR configuring the overlay: interfaces, examining
an EVPN network, show running configuration, show BGP summary, show EVPN VNIs
and VTEPs, identify which VTEP advertised a MAC address, comparing FRR and
Cisco EVPN configurations, considerations for deploying EVPN in large
networks.