Fact-checked by Grok 2 weeks ago

Virtual Private LAN Service

Virtual Private LAN Service (VPLS) is a Layer 2 (VPN) technology that emulates an Ethernet-based multipoint () over a provider's MPLS-based packet-switched network, allowing customer edge (CE) devices at dispersed sites to communicate as if connected via a single . Introduced in the mid-2000s through (IETF) standards, VPLS enables service providers to deliver transparent LAN services to enterprises, supporting applications like , bridging, and traffic replication across metropolitan or wide area networks. It operates by establishing pseudowires—virtual point-to-point links—between provider edge (PE) routers, which perform learning, forwarding, and flooding for broadcast, , and unknown unicast frames, mimicking traditional Ethernet switch behavior. There are two primary signaling mechanisms for VPLS: one using Border Gateway Protocol (BGP) for auto-discovery and distribution of reachability information via route targets and label blocks, as defined in RFC 4761, and another employing Label Distribution Protocol (LDP) to establish a full-mesh topology of pseudowires, per RFC 4762. In both approaches, PE routers maintain virtual switching instances (VSIs) for each VPLS service, handling attachment circuits to CE devices and ensuring service isolation through unique identifiers. This multipoint connectivity distinguishes VPLS from point-to-point services like Virtual Private Wire Service (VPWS), providing scalability for larger networks while supporting features such as hierarchical aggregation via user-facing PE (u-PE) devices.

Fundamentals

Definition and Purpose

Virtual Private LAN Service (VPLS) is a Layer 2 (VPN) technology that emulates an Ethernet (LAN) across a provider's (MPLS) or IP-based , enabling multiple customer sites to function as a single . As defined in RFC 4761 and RFC 4762, VPLS delivers multipoint-to-multipoint Ethernet connectivity through pseudowires, where provider edge (PE) routers perform learning, forwarding, and flooding of frames, including broadcast, , and unknown traffic, to replicate the behavior of a traditional Ethernet switch. This service integrates with MPLS for efficient tunneling and label-based forwarding, allowing seamless extension of customer LANs without modifications to customer edge (CE) devices. The primary purpose of VPLS is to provide transparent, geographically dispersed Ethernet connectivity that supports latency-sensitive and protocol-dependent applications, such as (VoIP), video conferencing, and interconnects (DCI), while insulating customers from the complexities of the underlying provider network. By maintaining full transparency for customer Layer 2 protocols like (ARP) and (STP), VPLS ensures that end-user applications operate as if all sites are on the same physical , facilitating resource sharing and workload migration across locations. Unlike point-to-point services, VPLS's multipoint architecture supports efficient collaboration among multiple sites, reducing the need for customer-managed overlays and lowering operational costs for enterprises. VPLS was developed by the (IETF) in the early 2000s as an evolution of point-to-point Layer 2 VPNs like Virtual Private Wire Service (VPWS), with initial draft specifications emerging in 2003 to address the demand for scalable multipoint Ethernet services. occurred through RFC 4761 (using BGP for auto-discovery and signaling) and RFC 4762 (using for signaling) in 2007, building on earlier MPLS frameworks to enable service providers to offer LAN-like extensions over packet-switched networks. This progression from VPWS's limited point-to-point model to VPLS's emulation marked a key advancement in Layer 2 VPN technologies, prioritizing scalability and protocol transparency for modern enterprise needs.

Architectural Components

The architecture of Virtual Private LAN Service (VPLS) comprises several key components that enable the of a multipoint across a provider's packet-switched , ensuring transparent Layer 2 for customer sites. These elements include customer-facing devices, provider edge functions, core transit capabilities, virtual interconnections, and logical switching instances, all operating to bridge customer traffic without altering its Ethernet framing. Customer Edge (CE) devices serve as the demarcation point between the customer's and the service provider's domain. These are typically customer-owned routers or switches that interface directly with Provider Edge (PE) devices via attachment circuits (ACs), such as Ethernet links, and remain unaware of the underlying VPLS mechanisms. From the customer's perspective, the CE connects to a single virtual LAN, with no need for special configuration related to the provider's tunneling or bridging processes. Provider Edge (PE) routers form the core of the VPLS implementation, acting as the intelligent boundary devices that connect multiple CE devices and manage the service's forwarding logic. Each PE encapsulates and decapsulates customer Ethernet frames into pseudowires for transit across the provider network, while also performing MAC address learning and maintaining per-VPLS forwarding tables to enable efficient bridging. PEs are typically edge routers equipped with MPLS capabilities, ensuring that customer traffic is transparently forwarded based on Layer 2 headers without the CE devices requiring awareness of the provider's infrastructure. Provider (P) routers reside in the core of the service provider's network and handle the transit of encapsulated VPLS traffic between PEs, without any specific knowledge of the VPLS service itself. These routers forward packets using standard MPLS label switching or over transport tunnels, relying on the outer labels provided by PEs to route frames efficiently through the backbone. By design, P routers operate transparently to the VPLS emulation, focusing solely on high-speed packet transport. Pseudowires (PWs) represent the virtual point-to-point connections that link PEs, emulating dedicated Ethernet links to carry customer across the provider's network. In VPLS, PWs utilize MPLS labels (or alternative tunneling mechanisms like ) for demultiplexing and transport, with each PW terminating on a PE to preserve the original Ethernet payload. This encapsulation allows for the seamless extension of the customer's , as frames are bridged across PWs without modification to their Layer 2 content. The Forwarding Instance, often termed the Virtual Switching Instance (VSI), operates on each PE as a logical entity dedicated to a specific VPLS service, functioning like a distributed segment of an Ethernet switch. Each VSI maintains a separate (FIB) populated through MAC learning from incoming ACs and PWs, enabling forwarding, flooding of unknown frames, and broadcast/ distribution within the emulated . VSIs ensure between different VPLS services on the same PE, with capabilities for dynamic or static FIB management to support scalable Layer 2 bridging. At the network level, VPLS employs a full-mesh of pseudowires interconnecting all participating , creating a loop-free multipoint that transparently bridges customer traffic as if all CEs were attached to a single Ethernet . This requires each to establish a PW to every other in the service, with techniques like split-horizon forwarding preventing loops while maintaining the illusion of a flat . Customer Ethernet frames are thus forwarded across the PWs by the VSIs, emulating native behavior over the provider's routed backbone.

Operational Mechanisms

Mesh and Pseudowire Establishment

In Virtual Private LAN Service (VPLS), the mesh topology is established by creating a full-mesh of point-to-point between all Provider (PE) routers participating in a given service instance. This logical full-mesh ensures that customer Ethernet frames can be flooded for , , and unknown traffic across the emulated , mimicking the behavior of a single without requiring physical connectivity between customer sites. Each PE maintains pseudowires to every other PE in the instance, enabling direct frame forwarding and avoiding intermediate hops within the provider network. Pseudowires in VPLS can be implemented using MPLS-based encapsulation, which is preferred for its label-switching efficiency and scalability in large networks, or IP-based encapsulation such as version 3 (L2TPv3) or (GRE). For MPLS-based pseudowires, signaling occurs via (LDP) in a full-mesh of targeted LDP sessions or (BGP) for auto-discovery and label exchange, with LDP operating in downstream unsolicited label allocation mode to assign unique labels per . IP-based options like L2TPv3 use session identifiers for demultiplexing, but they are less common due to higher overhead compared to MPLS. The establishment process begins with signaling protocols initiating pseudowire setup between PEs, where each PE allocates and exchanges labels or session identifiers to form the full mesh. Upon receiving an unknown unicast, broadcast, or multicast frame from a customer attachment circuit (AC), the ingress PE floods it across all pseudowires in the mesh, learning MAC addresses along the way to enable subsequent unicast forwarding. This dynamic learning and flooding mechanism, combined with label or identifier state exchange during signaling, ensures connectivity without prior knowledge of all destinations. To prevent bridging loops in the emulated LAN, VPLS integrates with customer () by transparently tunneling STP Bridge Protocol Data Units (BPDUs) across pseudowires, allowing the customer's STP to handle loop resolution at . Provider-side mechanisms, such as the split-horizon rule, further enforce loop-free forwarding by prohibiting frames received on one pseudowire from being sent out another pseudowire within the same Virtual Switching Instance (VSI), ensuring the full-mesh topology remains stable. Configuration basics for mesh and pseudowire establishment involve creating a VPLS service instance, or VSI, on each participating PE router, where customer ACs—typically Ethernet ports or VLANs—are associated with the VSI to delineate the boundary. PEs are manually provisioned with peer addresses and service identifiers (e.g., VPLS-ID encoded as an Attachment Group Identifier), after which signaling protocols automate creation; for example, LDP requires configuring targeted sessions, while BGP uses route targets for peer discovery. This setup ensures all pseudowires align with matching (MTU) values to avoid fragmentation.

Label Stack and Forwarding

In Virtual Private LAN Service (VPLS), the MPLS label stack encapsulates Ethernet frames for transport across the provider's core network, consisting of an outer transport label and an inner virtual circuit (VC) label. The outer transport label directs the packet along a label-switched path (LSP) to the remote provider edge (PE) router, while the inner VC label uniquely identifies the specific VPLS service instance or pseudowire (PW) to which the frame belongs. The forwarding process begins at the ingress PE router, where an incoming from a customer (CE) device is classified into a VPLS service instance (VSI) based on the access interface. The ingress PE performs a MAC address lookup in its forwarding database (FDB); if the destination MAC is known and associated with a remote PE, it imposes the corresponding VC label to demultiplex the frame to the appropriate PW, followed by the outer transport label for tunnel encapsulation. If the destination MAC is unknown, the frame is flooded by imposing VC labels for all remote PEs in the service, each paired with a transport label. In the core network, provider (P) routers forward the packet by swapping the outer transport label based on their MPLS forwarding tables, remaining unaware of the inner VC label or VPLS-specific details. Upon reaching the egress PE, the outer transport label is popped, exposing the VC label, which identifies the target VSI; the egress PE then strips the VC label, performs another FDB lookup, and delivers the frame to the appropriate local CE interface or floods it locally if necessary. Label imposition follows rules outlined in RFC 4761 for BGP-based VPLS and RFC 4762 for LDP-based VPLS, where the VC label is assigned per PW during signaling to ensure service isolation. An optional control word may be inserted immediately after the VC label and before the Ethernet payload; this 32-bit field provides sequence numbering to maintain packet order, and when used, the VC label's S-bit is set to 0, as specified in encapsulation standards. The control word is signaled via the C-bit in LDP or BGP extended communities and is typically disabled for Ethernet PWs unless required for fragmentation or reassembly. For tunnel selection, VPLS relies on MPLS LSPs established via protocols like LDP or RSVP-TE to carry the labeled packets, with the outer label binding to these tunnels for efficient forwarding. Alternative transports, such as /MPLS or GRE tunnels, may be used in certain implementations for flexibility, particularly in non-MPLS . To enhance , fast reroute (FRR) mechanisms can be applied to the transport LSPs, enabling sub-50ms protection against or failures by detouring traffic via backup paths. A representative example of the VPLS label stack for an is as follows:
Ethernet Header + Payload | [Optional Control Word] | VC Label (S=1, [BoS](/page/Bos)=1) | Transport Label (S=0, [BoS](/page/Bos)=0)
Here, the VC label's BoS bit is set to 1 if no control word is used, while the transport label's BoS bit is set to 0 to indicate additional labels may follow in stacked scenarios.

Ethernet Emulation Model

The Virtual Private LAN Service (VPLS) provides transparent of an Ethernet Layer 2 network by bridging customer Ethernet frames across a provider's MPLS core without modifying the frames' MAC addresses, tags, or higher-layer protocols such as or (). This emulation ensures that customer sites perceive a single , as if connected via a common Ethernet switch, while the provider edge () devices handle the transport over pseudowires (PWs). MAC address learning in VPLS occurs in a distributed manner across all participating PE devices, where each PE maintains its own forwarding database (FDB), also known as a MAC table, that associates customer MAC addresses with either local attachment circuits (ACs) or remote PWs. Upon receiving an Ethernet frame from a customer AC, the ingress PE examines the source MAC address and updates its FDB to map it to the corresponding AC or PW, enabling subsequent frames destined to that MAC to be forwarded efficiently. This learning process mirrors traditional Ethernet bridging but is replicated across the full mesh of PEs to maintain reachability information network-wide. Forwarding decisions in the VPLS emulation model follow standard Ethernet bridge behavior: known unicast frames are directed solely to the PW or AC associated with the destination MAC in the local FDB, while unknown unicast, broadcast, and multicast frames are flooded to all other PEs in the service instance via their respective PWs. This flooding mechanism ensures delivery to all potential recipients in the emulated LAN, replicating the broadcast domain semantics of a physical Ethernet segment. VPLS supports both port-based and VLAN-based service instances to delineate customer traffic, preserving VLAN tags within customer frames during transport over PWs. In a port-based instance, all traffic on an AC is treated as belonging to the VPLS domain without regard to VLAN tags, whereas VLAN-based instances allow selective inclusion based on specific 802.1Q tags, enabling multiple VPLS services per physical port. The PE devices do not alter or interpret these customer VLAN tags, ensuring end-to-end transparency for VLAN-aware customer equipment. A key limitation of the basic VPLS Ethernet emulation is the lack of native support for provider-side VLAN stacking, such as (QinQ), which is required for service multiplexing within the provider ; extensions or additional encapsulation are necessary to incorporate provider VLANs without impacting customer frames.

Scalability Solutions

Hierarchical VPLS Design

Hierarchical Virtual Private LAN Service (H-VPLS) extends the basic VPLS architecture to address scalability limitations of the full-mesh pseudowire topology, which requires O(n²) connections among provider edge (PE) devices for n sites, leading to excessive signaling and replication overhead. Introduced in RFC 4762, H-VPLS employs a two-tier hub-and-spoke model where access PEs, termed spoke PEs or multi-tenant units (MTU-s), connect via pseudowires to a smaller set of hub PEs (PE-rs), while the hub PEs maintain a full-mesh interconnection among themselves. This design segments the into access and core layers, with spoke PEs establishing a single pseudowire per VPLS instance to one or more hub PEs, thereby reducing the total pseudowire count to O(n) and enabling deployment across thousands of sites. In the H-VPLS topology, spoke PEs handle local Ethernet frame switching for attached customer sites and forward inter-site traffic over spoke pseudowires to hub PEs, which perform bridging across these pseudowires and their access circuits (ACs) to emulate the LAN service. Hub PEs use Label Distribution Protocol (LDP) signaling per RFC 4447 for both spoke and hub pseudowires, ensuring consistent label stacking and forwarding. To accommodate double encapsulation—involving Ethernet headers, MPLS labels, and potential inner labels—implementations require maximum transmission unit (MTU) adjustments across the pseudowire paths, typically setting the service MTU to account for the additional overhead while maintaining end-to-end consistency. This hierarchical structure offloads core network traffic replication to the hubs, minimizing bandwidth usage in the provider core and supporting multi-tier extensions for further scalability. H-VPLS benefits large-scale deployments by limiting the full-mesh complexity to a manageable number of hub PEs, often in the of tens, while spokes can number in the thousands per . For instance, in Ethernet networks, H-VPLS supports up to 4,096 VPLS instances per island using provider VLANs (P-VLANs), with multiple islands interconnected via PEs for metro-to-regional extensions in or environments. Dual-homing of spoke PEs to redundant , combined with (STP) for loop prevention, enhances reliability without compromising the topology's efficiency. Overall, this approach facilitates transparent LAN over wide-area MPLS networks while adhering to the Ethernet model of basic VPLS.

MAC Address Management

In Virtual Private LAN Service (VPLS), Provider Edge (PE) devices perform MAC address learning by examining the source in incoming Ethernet frames received over attachment circuits (ACs) or pseudowires (PWs), associating each learned MAC with the corresponding ingress interface or PW to populate the forwarding database (FDB) for efficient unicast forwarding. This process emulates traditional Ethernet switch behavior, where known destination MACs are forwarded directly while unknown ones trigger flooding across the VPLS domain. To manage dynamic network changes, learned MAC entries include aging timers, with a typical aging time of 300 seconds in many implementations (vendor-specific), after which inactive entries are removed to free resources and prevent retention of stale mappings. Scalability challenges arise in full-mesh VPLS topologies, where unknown , broadcast, and traffic floods across all PWs, amplifying consumption and potentially overwhelming PE resources as the number of sites grows. MAC table size limitations per Virtual Switching Instance (VSI), which vary by hardware and implementation, often with defaults in the hundreds and maximums up to 65,000 or more on high-end devices, can lead to exhaustion; once full, new MACs cannot be learned, resulting in continued flooding of unknown traffic or blackholing if discard-unknown policies are enforced, which drops such packets instead of replicating them. To address these issues, VPLS implementations support MAC withdrawal messages as defined in RFC 4762, allowing PEs to notify peers of invalid or aged-out s via LDP, reducing unnecessary flooding without full table resets. Additional mitigations include configuring static MAC entries for known stable addresses, which bypass dynamic learning and reserve FDB space, and applying to flooded traffic using ingress QoS policies on service access points (SAPs) to cap broadcast and unknown replication. For multicast optimization, integration with enables PEs to track group memberships and forward streams only to interested receivers, minimizing domain-wide flooding. In hierarchical VPLS (H-VPLS), learning occurs locally at spoke PEs for attached sites, with unknown frames flooded over spoke pseudowires to hub PEs, which perform bridging and forward back to other spokes, confining much of the learning and replication to the access layer and reducing core overhead. Monitoring and maintenance tools in VPLS include MAC flush mechanisms triggered by topology changes, such as link failures or events, where PEs issue withdrawal messages with empty MAC lists to clear remote FDB entries and prevent persistent loops from outdated paths. These flushes, often configurable per VSI, facilitate rapid by invalidating potentially looping routes while preserving local learning.

Provider Edge Auto-Discovery

Provider Edge (PE) auto-discovery in Virtual Private LAN Service (VPLS) enables the automatic detection of participating PEs and the establishment of pseudowires (PWs) without requiring manual configuration of a full-mesh among all PEs in a VPLS instance. This mechanism advertises VPLS instance details, such as service identifiers and information, allowing PEs to dynamically learn peers and set up , which enhances scalability in large deployments by reducing operational overhead. The Label Distribution Protocol (LDP)-based approach, defined in RFC 4762, extends LDP signaling for VPLS PW setup using targeted LDP sessions between PEs. PEs advertise the VPLS service ID, known as the Attachment Group Identifier (AGI), via the Generalized PWid Forwarding Equivalence Class (FEC) element (type 129), which includes the AGI as the unique VPLS identifier and null Attachment Individual Identifiers (AIIs) for the source and target. This allows PEs to discover peers and distribute VC labels over the full mesh of targeted LDP sessions, automating PW instantiation while relying on manual or external means for initial PE reachability. In contrast, the (BGP)-based method, outlined in 4761 and refined in 6074, uses BGP for both auto-discovery and signaling to support larger-scale VPLS deployments. PEs advertise VPLS membership through BGP Network Layer Reachability Information (NLRI) using the L2VPN Address Family Identifier ( 25) and VPLS Subsequent Address Family Identifier (SAFI 65), incorporating Route Targets (RTs) as extended communities to identify the VPLS instance and a (RD) combined with the PE address as the endpoint identifier. This enables PEs to import routes from matching RTs, learn remote PE addresses, and exchange VC labels or label blocks (via a label base and block size) for PW demultiplexing, with support for multi-homing through additional RT constraints. BGP's policy-based control and route reflection further optimize discovery in multi-AS environments. RADIUS integration complements BGP and LDP auto-discovery in scenarios by providing , , and () for dynamic VPLS service activation, particularly for subscriber-based deployments. RADIUS servers can trigger VPLS instance provisioning on PEs via attributes in authentication responses, enabling on-demand SDP bindings and PW setup without core PE rediscovery, often in combination with BGP for inter-PE signaling. For example, implementations use RADIUS to dynamically instantiate VPLS services from subscriber sessions, enhancing flexibility in broadband environments. LDP-based auto-discovery suits smaller deployments due to its and reliance on existing MPLS , but it requires a full of targeted sessions, limiting . BGP-based methods are preferred for large-scale networks offering better , multi-homing, and reduced signaling overhead through route reflectors, while RADIUS adds value for dynamic, subscriber-driven activation in edge scenarios without native signaling for core discovery.

Advanced Topics

Management and OAM Features

Management of Virtual Private LAN Service (VPLS) relies on standardized protocols for configuration and oversight. The (SNMP) utilizes (MIB) modules to monitor and manage VPLS instances, including objects for pseudowire status, service parameters, and forwarding entries using dedicated MIB modules such as VPLS-BGP-MIB for BGP-signaled VPLS. Configuration is facilitated through command-line interfaces (CLI) on provider edge routers and emerging data models that abstract Layer 2 VPN services, enabling programmatic setup of virtual switching instances (VSIs) and pseudowire associations per 8466. Service activation testing (SAT) employs Virtual Circuit Connectivity Verification (VCCV) mechanisms to validate pseudowire integrity before production use, as outlined in 5085. Operations, Administration, and Maintenance (OAM) features in VPLS ensure ongoing reliability through fault detection and diagnostics. VCCV provides a control channel for verification, supporting ICMP-based or Label Switched Path (LSP) ping to confirm end-to-end connectivity without disrupting data traffic. (BFD) enhances liveliness monitoring by enabling sub-second failure detection on the data plane, integrated with VCCV for Layer 2 VPNs including VPLS. Monitoring capabilities focus on and alerting within VPLS domains. Providers collect traffic statistics per VSI, tracking ingress/egress packet counts, byte volumes, and error rates to assess utilization and anomalies. Alarm reporting notifies operators of events such as down states or MAC withdrawal failures, often via SNMP traps or integration. metrics like and are measured using extended OAM probes, providing insights into across the emulated . In hierarchical VPLS (H-VPLS), OAM extends VCCV across multi-tier , allowing segmented fault isolation between access and layers. Recent advancements integrate VPLS provisioning with (SDN) controllers for automation. Nokia's Network Services Platform (NSP), as of 2025 implementations on the 7750 Service Router, enables intent-based orchestration of VPLS services, automating setup, scaling, and fault remediation through model-driven APIs.

Security and Operational Challenges

Virtual Private LAN Service (VPLS) deployments are susceptible to several security risks stemming from its reliance on MPLS and Ethernet . expose customer traffic to MPLS core attacks, such as label spoofing, where unauthorized labels are injected to hijack or redirect traffic, potentially enabling VPN hopping or unauthorized access across domains. Additionally, denial-of-service (DoS) attacks can overwhelm provider edge (PE) devices by exhausting tables, increasing CPU utilization and memory consumption, as demonstrated in tests on routers where flooding raised CPU from 2% to 25%. VPLS lacks native , leaving Ethernet frames vulnerable to sniffing, interception, and replay attacks during transit over provider networks. To mitigate these threats, operators implement access control lists (ACLs) on PE routers to validate incoming labels and filter unauthorized pseudowires, preventing spoofing and injection attacks. For BGP-signaled VPLS, authentication secures control plane exchanges, while tunnels can encapsulate pseudowires in IP-based deployments to provide encryption and integrity protection. is achieved through (VRF)-like segmentation per VPLS instance, using separate Layer 2 forwarding information bases (FIBs) to prevent cross-domain leakage, and limiting MAC addresses learned per site to curb from excessive learning. LDP authentication per 5036 further protects signaling in LDP-based VPLS. Operational challenges in VPLS arise primarily from configuration complexity in large-scale meshes, where full-mesh requirements—scaling as n*(n-1)/2 for n PEs—lead to high signaling overhead and resource strain. Troubleshooting distributed states across PEs is difficult due to the lack of centralized visibility, complicating fault isolation in multipoint topologies. MTU mismatches between customer devices and pseudowires often cause packet fragmentation or drops, as Ethernet frames exceeding the pseudowire MTU (typically bytes plus MPLS labels) require careful alignment to avoid performance degradation. A 2021 survey highlights additional complexity factors, including tunnel management overhead from manual provisioning of and compatibility issues with legacy Ethernet protocols, such as (STP) loops or broadcast storms when integrating older devices that expect native Layer 2 behavior. Multi-vendor interoperability challenges persist despite adherence to MEF standards for E-LAN services, which VPLS implements, due to vendor-specific extensions in pseudowire signaling and MAC handling. Best practices for addressing these issues include conducting regular security audits of PE configurations and pseudowire validations to detect anomalies, implementing phased rollouts for hierarchical VPLS (H-VPLS) to limit mesh scale during deployment, and deploying continuous monitoring for traffic patterns and MAC table sizes to preempt DoS risks.

Comparisons with EVPN

Ethernet VPN (EVPN), defined in RFC 7432, is a BGP-based control plane protocol that enables Layer 2 and Layer 3 VPN services by advertising MAC and IP routes through BGP, allowing for targeted traffic forwarding without relying on broadcast, unknown unicast, or multicast (BUM) flooding for MAC learning. In contrast, Virtual Private LAN Service (VPLS) primarily depends on data-plane learning and flooding mechanisms, which propagate unknown frames across the network, leading to higher bandwidth consumption and scalability challenges in large deployments. EVPN's control-plane approach distributes MAC addresses precisely via BGP routes, minimizing unnecessary traffic and enabling policy-based learning, which addresses key limitations in VPLS such as inefficient unknown unicast handling. A primary difference lies in multihoming support: EVPN offers both single-active (one active link, others standby) and all-active modes, facilitating per-flow load balancing and faster upon failures, whereas VPLS is limited to active-backup redundancy without inherent load sharing. EVPN also integrates Layer 3 capabilities natively through IP prefix advertisements, allowing seamless L2/L3 VPN , while VPLS focuses solely on Layer 2 and requires separate mechanisms for services. These enhancements make EVPN more suitable for modern, large-scale environments like data centers and transport networks, where rapid and efficiency are critical. Migration from VPLS to EVPN often involves setups where EVPN operates as an overlay on the existing MPLS underlay, enabling staged upgrades of provider edge () devices without service disruption—EVPN handles forwarding among upgraded PEs, while VPLS manages legacy ones via pseudowires. Industry trends as of 2025 indicate a shift toward EVPN for and interconnects due to its superior scalability and resiliency, with seamless integration standards like RFC 8560 supporting in mixed environments. VPLS remains viable for legacy systems or small-scale multipoint Layer 2 needs where the added complexity of BGP signaling in EVPN provides no benefit.

References

  1. [1]
  2. [2]
    RFC 4762: Virtual Private LAN Service (VPLS) Using Label ...
    This document describes a Virtual Private LAN Service (VPLS) solution using pseudowires, a service previously implemented over other tunneling technologies.
  3. [3]
    RFC 4761 - Virtual Private LAN Service (VPLS) - IETF Datatracker
    This document describes the functions required to offer VPLS, a mechanism for signaling a VPLS, and rules for forwarding VPLS frames across a packet switched ...
  4. [4]
  5. [5]
    A Survey of Virtual Private LAN Services (VPLS): Past, Present and ...
    Sep 4, 2021 · Virtual Private LAN services (VPLS) is a Layer 2 Virtual Private Network (L2VPN) service that has gained immense popularity due to a number ...
  6. [6]
    draft-ietf-l2vpn-vpls-ldp-00
    Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling (Internet-Draft, 2003)Missing: history 2006
  7. [7]
    RFC 4664 - Framework for Layer 2 Virtual Private Networks (L2VPNs)
    RFC 4664 provides a framework for Layer 2 Provider Provisioned Virtual Private Networks (L2VPNs) to aid in standardizing protocols for interoperable L2VPNs.
  8. [8]
    RFC 4665 - Service Requirements for Layer 2 Provider-Provisioned ...
    This document provides requirements for Layer 2 Provider-Provisioned Virtual Private Networks (L2VPNs). It first provides taxonomy and terminology.
  9. [9]
  10. [10]
    Virtual Private LAN Service - Nokia Documentation Center
    Apr 25, 2025 · A VPLS service provides connectivity between two or more SAPs on one (which is considered a local service) or more (which is considered a ...
  11. [11]
  12. [12]
  13. [13]
  14. [14]
  15. [15]
  16. [16]
  17. [17]
  18. [18]
  19. [19]
    IEEE 802.1Q-2018
    Jul 6, 2018 · This standard specifies Bridges that interconnect individual LANs, each supporting the IEEE 802 MAC Service using a different or identical media ...
  20. [20]
  21. [21]
  22. [22]
  23. [23]
  24. [24]
  25. [25]
  26. [26]
  27. [27]
  28. [28]
  29. [29]
    VPLS MAC learning and packet forwarding
    MAC address learning is performed by the router to reduce the amount of unknown destination MAC address flooding. The 7450 ESS, 7750 SR, and 7950 XRS routers ...
  30. [30]
    Virtual Private LAN Services Commands - Cisco
    Apr 28, 2011 · The default value is 300 seconds. Command Default. seconds: 300. Command Modes. L2VPN bridge group bridge domain MAC aging configuration ...
  31. [31]
    L2VPN and Ethernet Services Configuration Guide for Cisco NCS ...
    Sep 5, 2025 · Scalability: VPLS typically requires a full mesh of PWs between Layer 2 VPN PEs participating in the service. As the number of PEs increases, ...
  32. [32]
    Configuring VPLS Routing Instances | Junos OS - Juniper Networks
    For this type of network, you need to allow pseudowires to be established between the spoke routers and the hub router. However, you also need to prevent ...
  33. [33]
    VPLS Service Configuration Commands
    By default, packets with unknown destination MAC addresses are flooded. If discard-unknown is enabled at the VPLS level, packets with unknown destination MAC ...Missing: scalability | Show results with:scalability
  34. [34]
    MPLS Layer 2 VPNs Configuration Guide - VPLS MAC Address ...
    Feb 9, 2016 · The VPLS MAC Address Withdrawal feature provides faster convergence by removing (or unlearning) MAC addresses that have been dynamically learned.Missing: mechanics RFC
  35. [35]
    VPLS and Rate Limiting - Nokia Documentation Center
    Traffic that is normally flooded throughout the VPLS can be rate limited on SAP ingress through the use of service ingress QoS policies.Missing: mitigation static entries
  36. [36]
    Multicast Snooping for VPLS | Junos OS - Juniper Networks
    You can enable IGMP or MLD snooping in a virtual private LAN service (VPLS) to ensure that the customer-facing interfaces receive only the multicast traffic it ...
  37. [37]
    Knowledge Base - Hierarchical VPLS - Google Sites
    In order to signal a full mesh of pseudowires required, a full mesh of targeted LDP (T-LDP) sessions is required between the PEs. In absence of auto-discovery, ...
  38. [38]
    vpls-flush-on-topology-change | Junos OS - Juniper Networks
    ... MPLS infrastructure changes: flush the media access control (MAC) cache or not. By default, the bridge does not flush the cache when the topology changes.Missing: prevent | Show results with:prevent
  39. [39]
    RFC 6074 - Provisioning, Auto-Discovery, and Signaling in Layer 2 ...
    1. Provisioning Each VPLS must have a globally unique identifier, which in [RFC4762] is referred to as the VPLS identifier (or VPLS-id). Every VSI must be ...
  40. [40]
  41. [41]
  42. [42]
    Virtual Private LAN Service - Nokia Documentation Center
    VPLS solutions usually involve learning of MAC addresses in order for traffic to be forwarded to the correct SAP/SDP. If a MAC address is learned on the wrong ...
  43. [43]
    RFC 5085 - Pseudowire Virtual Circuit Connectivity Verification ...
    This document describes Virtual Circuit Connectivity Verification (VCCV), which provides a control channel that is associated with a pseudowire (PW).
  44. [44]
    Configuring BFD for Layer 2 VPN and VPLS - Juniper Networks
    The following procedure describes how to configure Bidirectional Forwarding Detection (BFD) for Layer 2 VPN and VPLS. For VPNs, you configure the BFD ...
  45. [45]
    Verifying Traffic Statistics on a VPLS - Huawei Technical Support
    Jul 8, 2024 · Procedure · Run the display traffic-statistics vsi vsi-name command to check the public traffic statistics on all VPLS PWs in a specified VSI.Missing: monitoring reporting
  46. [46]
    [PDF] Junos® OS Layer 2 VPNs and VPLS User Guide for Routing Devices
    Jun 23, 2025 · In a Layer 3 network only, you can configure virtual private LAN service (VPLS), which is an Ethernet- based point-to-multipoint Layer 2 VPN.
  47. [47]
    [PDF] Nokia 7750 Service Router
    Oct 29, 2025 · In combination with the Nokia NSP, the Nokia 7750 SR can be deployed to introduce scalable and integrated. SDN control across IP, MPLS, Ethernet ...
  48. [48]
    [PDF] MPLS and VPLS Security - Black Hat
    ▫ So many layer 2 attacks may not be feasible. ▫ But those devices do learn (and store) MAC addresses. ▫ You thought MAC table flooding nowadays no longer works ...Missing: pseudowire | Show results with:pseudowire
  49. [49]
    L2VPN and Ethernet Services Configuration Guide for Cisco ASR ...
    Aug 18, 2023 · VPLS offers simple VLAN services that include flooding broadcast, multicast, and unknown unicast frames that are received on a bridge. The VPLS ...
  50. [50]
    RFC 7387: A Framework for Ethernet Tree (E-Tree) Service over a ...
    VPLS emulates traditional Ethernet Virtual LAN (VLAN) services in MPLS networks and may support MEF E-LAN services. A data frame in VPLS is an Ethernet frame.Missing: interoperability | Show results with:interoperability
  51. [51]
    RFC 7432 - BGP MPLS-Based Ethernet VPN - IETF Datatracker
    This document describes procedures for BGP MPLS-based Ethernet VPNs (EVPN). The procedures described here meet the requirements specified in RFC 7209.Missing: advantages | Show results with:advantages
  52. [52]
  53. [53]
  54. [54]
  55. [55]
  56. [56]
    [PDF] day-one-poster-vpns.pdf - Juniper Networks
    Compared to VPLS, EVPN provides MAC learning at the control plane level. EVPN provides active-active redundancy, whereas VPLS only provides active-backup ...Missing: comparison | Show results with:comparison
  57. [57]
    EVPN Configuration Guide for Cisco 8000 Series Routers, IOS XR ...
    Dec 1, 2023 · Seamless migration allows you to upgrade the VPLS PE routers to EVPN one by one without any network service disruption.
  58. [58]
    Migrating From BGP VPLS to EVPN Overview | Junos OS
    EVPN is responsible for setting up data forwarding between the PE devices upgraded to EVPN, while VPLS continues to setup data forwarding to PE devices that run ...Missing: comparison | Show results with:comparison
  59. [59]
    RFC 8560 - Seamless Integration of Ethernet VPN (EVPN) with ...
    When the EVPN PE receives traffic over the VPLS PWs, it learns the associated C-MAC addresses in the data plane. The C-MAC addresses learned over these PWs ...Missing: advantages | Show results with:advantages
  60. [60]
    the focus of the EANTC 2024 Multi-Vendor MPLS SDN ...
    Sep 23, 2024 · The 2024 EANTC test focused on 5G transport networks, including SR, EVPN, SDN, and time synchronization, with 87 scenarios and 1590+ results. ...