1. Juniper Networks TechLibrary, "Understanding EVPN with VXLAN Data Plane Encapsulation": This document explicitly outlines the methods for BUM traffic handling. In the "BUM Traffic Handling" section, it states, "To handle BUM traffic, VTEPs can use ingress replication or PIM-based multicast in the underlay." This directly supports both ingress replication (C) and underlay replication (D).
2. Juniper Networks TechLibrary, "EVPN-VXLAN Multicast": This guide details the use of PIM in the underlay. The overview section explains, "You can configure Protocol Independent Multicast (PIM) in an Ethernet VPN-Virtual Extensible LAN (EVPN-VXLAN) fabric to enable multicast traffic to be forwarded efficiently through the fabric." This validates underlay replication (D).
3. Juniper Networks TechLibrary, "Example: Configuring EVPN-VXLAN with Ingress Replication": This configuration example demonstrates the setup for ingress replication, confirming it as a standard method. The "Overview" section states, "This example shows how to configure an EVPN-VXLAN fabric where ingress replication is used to forward BUM traffic." This validates ingress replication (C).
4. RFC 7432: BGP MPLS-Based Ethernet VPN: This foundational IETF standard describes the mechanisms. Section 8.3, "Inclusive Multicast Ethernet Tag Route," details the control plane signaling used to build the flood list for ingress replication. Section 11, "P-Tunnel Types for Inclusive Multicast," describes using underlay multicast (e.g., PIM-SM) for BUM traffic.