Loop Protection in EVPN networks
draft-snr-bess-evpn-loop-protect-04

Document Type Expired Internet-Draft (bess WG)
Last updated 2020-02-06 (latest revision 2019-08-05)
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized bibtex
Stream WG state Candidate for WG Adoption
Other - see Comment Log
Document shepherd No shepherd assigned
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-snr-bess-evpn-loop-protect-04.txt

Abstract

Ethernet Virtual Private Networks (EVPN) is becoming the de-facto standard-based control plane solution for Data Center and layer-2 Service Provider applications. The risk of loops caused by backdoor paths accidentally created within the same broadcast domain, is a general common concern, especially among Service Providers in large Layer-2 networks. While other layer-2 Ethernet technologies use Spanning Tree based Protocols (xSTP) to provide a network-wide loop protection, EVPN has the right tools to detect and protect the network against loops in an efficient and effective way. This document describes a mechanism to provide global loop protection in EVPN networks.

Authors

Jorge Rabadan (jorge.rabadan@nokia.com)
Senthil Sathappan (senthil.sathappan@nokia.com)
Kiran Nagaraj (kiran.nagaraj@nokia.com)
Julio Bueno (julio.buenohernandez@telefonica.com)
Jose Crespo (josemanuel.crespogarcia@telefonica.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)