Skip to main content

Loop Protection in EVPN networks
draft-snr-bess-evpn-loop-protect-02

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Expired".
Expired & archived
Authors Jorge Rabadan , Senthil Sathappan , Kiran Nagaraj , Julio Bueno , Jose Manuel Crespo
Last updated 2019-02-03 (Latest revision 2018-08-02)
RFC stream (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Ethernet Virtual Private Networks (EVPN) is becoming the de-facto standard-based control plane solution for Data Center and layer-2 Service Provider applications. The risk of loops caused by backdoor paths accidentally created within the same broadcast domain, is a general common concern, especially among Service Providers in large Layer-2 networks. While other layer-2 Ethernet technologies use Spanning Tree based Protocols (xSTP) to provide a network-wide loop protection, EVPN has the right tools to detect and protect the network against loops in an efficient and effective way. This document describes a mechanism to provide global loop protection in EVPN networks.

Authors

Jorge Rabadan
Senthil Sathappan
Kiran Nagaraj
Julio Bueno
Jose Manuel Crespo

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)