Ethernet Virtual Private LAN Guide: How E-LAN Works
Teams modernize apps yet still need simple Layer 2 adjacency between sites. VM mobility, clustering protocols, legacy ERP, and industrial controllers often assume a flat LAN. An Ethernet Virtual Private LAN (E‑LAN) keeps that multipoint Layer 2 domain intact across metro or national footprints without forcing routing redesigns. A common misconception: EVPL and E‑LAN are not the same. EVPL is point‑to‑point or hub‑and‑spoke. E‑LAN is any‑to‑any. Providers market both under similar names, which confuses planning and procurement. We align designs to MEF service definitions to avoid that trap. For searchers looking for an ethernet virtual private lan guide that is practical, the value is straightforward. You get a provider‑managed Layer 2 fabric with SLAs, predictable latency, and simple site turn‑ups that look like local switch ports.
What Is an Ethernet Virtual Private LAN?
Ethernet Virtual Private LAN is a MEF E‑LAN service that presents a single bridged domain across multiple locations. Each site connects at a UNI port. The provider builds an EVC that learns MACs and forwards frames any‑to‑any, with split‑horizon to prevent loops. That is the ethernet virtual private lan definition in practical terms. Under the hood, carriers deliver it with MPLS pseudowires or EVPN. Your network sees native Ethernet with optional QoS, VLAN transparency, and OAM.
Control planes: VPLS vs EVPN
VPLS uses flood‑and‑learn over MPLS (RFC 4762). EVPN uses BGP for MAC learning and supports ARP suppression and all‑active multihoming (RFC 7432). We favor EVPN where available. It scales better, trims broadcast traffic, and supports cleaner multi‑homing.
How providers deliver E‑LAN
Most providers hand off a copper or fiber UNI with QinQ or a single VLAN. The carrier core runs MPLS or VXLAN. A NID or demarc supports 802.1ag CFM and Y.1731 for SLA measurement. MEF 10.x attributes define CIR, EIR, CoS, and performance guarantees.
Design decisions, best practices, and gotchas
Map requirements before you buy. Target latency, jitter, and loss by application. Voice or HFT needs tight jitter. Storage replication needs low latency and jumbo MTU. Confirm MTU end‑to‑end. Many E‑LANs default near 1600 bytes due to QinQ. Ask for 2000 or higher if VXLAN overlays ride on top. Watch MAC scale. Some EVCs cap learned MACs at 4k to 8k. Broadcast storms can still bite. Use storm control and ARP inspection at the edge.
Traffic classes and MTU
Align DSCP to provider CoS. Verify shaping and policing per class. Document CIR and EIR per site, not just aggregate. Validate MTU with ping size tests and RFC 2544 or ITU‑T Y.1564 (Viavi or EXFO test sets) before production.
Resiliency and loop avoidance
Providers are STP transparent. Do not rely on spanning tree across the service. Prefer LACP LAGs, MC‑LAG, or EVPN all‑active handoffs. For data centers, routed IRB gateways limit blast radius while keeping L2 where needed.
Use cases, ethernet virtual private lan examples, and when not to use
Retail: thousands of stores connect as simple VLANs for POS and cameras. E‑LAN with three CoS classes and 20 ms metro latency has worked well. Manufacturing: legacy controllers using non‑routable protocols require L2 between plants; we used EVPN E‑LAN with ARP suppression to cut broadcast by 60 percent. Not every problem fits. If you only need site‑to‑site with rich routing, MPLS L3VPN or SD‑WAN is often cheaper and simpler to scale. For internet‑first SaaS, SD‑WAN with DIA usually wins. Budget for NRC per UNI, MRC per EVC bandwidth, and 30 to 90 days for build. Expect 99.9 to 99.99 percent availability SLAs, sub‑5 ms metro latency targets, and documented OAM with 802.1ag/Y.1731. Plan migration with temporary VLAN trunks to avoid weekend cutover risk.
Practical next steps
Inventory VLANs, MTU, MAC counts, and QoS classes per site. Define SLA thresholds by application. Request EVPN E‑LAN in bids, with ARP suppression and all‑active multihoming where possible. Insist on Y.1564 turn‑up reports. Pilot two sites first. Organizations that work with specialists for design and testing typically avoid MAC scale limits, STP surprises, and mis‑mapped CoS.
Frequently Asked Questions
Q: What is ethernet virtual private lan?
An Ethernet Virtual Private LAN is a provider E‑LAN service. It delivers a single bridged domain across multiple sites using MPLS or EVPN. The ethernet virtual private lan definition aligns to MEF E‑LAN, not EVPL. Ask vendors to specify EVC attributes, MAC scale, MTU, and CoS classes in writing.
Q: How does ethernet virtual private lan work?
It bridges Layer 2 frames any‑to‑any across the carrier network. The provider learns MACs and forwards frames over VPLS or EVPN control planes. EVPN reduces broadcast via ARP suppression and supports all‑active multihoming. Validate OAM with 802.1ag/Y.1731 and pre‑production tests using RFC 2544 or Y.1564.
Q: Is E‑LAN better than SD‑WAN or MPLS L3VPN?
It depends on adjacency and application needs. Choose E‑LAN for true L2 requirements, clustering, or lift‑and‑shift migrations. Choose SD‑WAN or L3VPN for route control, internet breakout, and cost efficiency. A common split uses E‑LAN for data centers, SD‑WAN for branches, with clear CoS and MTU policies.
