< draft-snr-bess-evpn-loop-protect-03.txt   draft-snr-bess-evpn-loop-protect-04.txt >
BESS Workgroup J. Rabadan, Ed. BESS Workgroup J. Rabadan, Ed.
Internet Draft S. Sathappan Internet Draft S. Sathappan
Intended status: Informational K. Nagaraj Intended status: Informational K. Nagaraj
Nokia Nokia
J. Bueno J. Bueno
J. Crespo J. Crespo
Telefonica Telefonica
Expires: August 10, 2019 February 6, 2019 Expires: February 6, 2020 August 5, 2019
Loop Protection in EVPN networks Loop Protection in EVPN networks
draft-snr-bess-evpn-loop-protect-03 draft-snr-bess-evpn-loop-protect-04
Abstract Abstract
Ethernet Virtual Private Networks (EVPN) is becoming the de-facto Ethernet Virtual Private Networks (EVPN) is becoming the de-facto
standard-based control plane solution for Data Center and layer-2 standard-based control plane solution for Data Center and layer-2
Service Provider applications. The risk of loops caused by backdoor Service Provider applications. The risk of loops caused by backdoor
paths accidentally created within the same broadcast domain, is a paths accidentally created within the same broadcast domain, is a
general common concern, especially among Service Providers in large general common concern, especially among Service Providers in large
Layer-2 networks. While other layer-2 Ethernet technologies use Layer-2 networks. While other layer-2 Ethernet technologies use
Spanning Tree based Protocols (xSTP) to provide a network-wide loop Spanning Tree based Protocols (xSTP) to provide a network-wide loop
 End of changes. 2 change blocks. 
2 lines changed or deleted 2 lines changed or added

This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/