- Written by Tarun Jaswanth LNU
- Posted on August 24, 2020
- Updated on October 17, 2024
- 26884 Views
802.1X is an IEEE standard protocol that prevents unauthorized devices from gaining access to the network.
- Written by Jason Shamberger
- Posted on March 11, 2020
- Updated on November 14, 2024
- 16654 Views
EOS 4.21.3F introduces support for BGP Flowspec, as defined in RFC5575 and RFC7674. The typical use case is to filter or redirect DDoS traffic on edge routers.
- Written by Yoshihiro Ishijima
- Posted on February 25, 2022
- Updated on June 12, 2023
- 7272 Views
This feature adds support for sending and receiving BGP IPv6 labeled-unicast routes with IPv4-mapped IPv6 next hops. With this feature enabled, when a BGP speaker receives a next hop with IPv4-mapped IPv6 address,
- Written by Shamit Kapadia
- Posted on April 25, 2022
- Updated on June 19, 2023
- 8758 Views
To understand why BGP-LU tunnels are required to be redistributed into LDP and vice versa, let’s consider the following basic topology for InterAS Option C. It uses IS-IS as IGP where indicated along with LDP:
- Written by Forhad Ahmed
- Posted on June 5, 2023
- Updated on June 7, 2023
- 4942 Views
BGP Monitoring Protocol (BMP) allows a monitoring station to connect to a router and collect all of the BGP announcements received from the router’s BGP peers. The announcements are sent to the station in the form of BMP Route Monitoring messages generated from path information in the router’s BGP Adj-Rib-In tables. A BMP speaker may choose to send either pre-policy routes, post-policy routes, or both.
- Written by Vamsi Anne
- Posted on June 5, 2023
- Updated on June 13, 2023
- 5252 Views
Operations, Administration and Management (OAM) includes the following five broad functionalities for any service and transport infrastructure
- Written by Tarun Soin
- Posted on June 5, 2023
- Updated on June 20, 2023
- 4413 Views
Arista CloudEOS provides optimized routing and security functionality by connecting different enterprise branches, DCs and head office across different geographical regions, zones and sites. It uses traffic engineering to leverage the best paths across a bunch of dynamic Path Selection( DPS ) tunnels which are used to carry the overlay data traffic. It uses the concept of AVT( Adaptive Virtual Topology) to map any given VRF traffic into a specific subsets of traffic each of which is treated uniformly for the routing/security perspective.
- Written by Diego Asturias
- Posted on June 5, 2023
- Updated on June 8, 2023
- 5215 Views
By default when a configuration session is committed everything modified in the configuration session will be committed to the running configuration, even if the running-configuration has also changed since the configuration session was created. This means that if the running-config has been modified since the start of the configuration session then those modifications could be overridden when the configuration session is committed.
- Written by Devaraja
- Posted on June 5, 2023
- Updated on June 8, 2023
- 4435 Views
The counters per-entry command places the ACL in counting mode. In counting mode, the feature generally displays the number of instances each rule in the list matches an inbound packet and the elapsed time since the last match. However, for certain select platforms, in addition to the packet counter, ACL counters can also be enabled for byte counts when applied to data plane ACLs.
- Written by Deepak Sebastian
- Posted on August 18, 2022
- Updated on October 9, 2024
- 7589 Views
Arista’s DCS-7130LBR series of switches are powerful network devices designed for ultra latency applications along with a wealth of networking features.
- Written by Sambath Kumar Balasubramanian
- Posted on June 5, 2023
- Updated on June 23, 2023
- 4859 Views
Application based routing has previously been restricted to use only the IP header fields to classify a flow into a user defined application. A deep packet inspection module is now available and extends application identification for traffic destined for the WAN network.
- Written by Terence Hui
- Posted on December 16, 2021
- Updated on June 9, 2023
- 7532 Views
Source port filtering is enabled by default to prevent traffic from egressing out the same interface it ingressed on.
- Written by Anand Narayanan Rao
- Posted on June 20, 2022
- Updated on July 3, 2023
- 6878 Views
In vEos/CloudEos deployed as a WAN router, when DPS (Dynamic Path Selection) is configured, all the user traffic coming from the LAN side and going to the WAN side gets load balanced on the DPS paths. This feature enables the automatic discovery of end to end Path MTU for a DPS Path through an internal probing mechanism.
- Written by Ravi Krishnamurthy
- Posted on June 5, 2023
- Updated on June 5, 2023
- 5296 Views
DPS (Dynamic Path Selection) provides the ability to select different paths for different types of traffic to optimize application performance.
- Written by Porsche Endre
- Posted on June 5, 2023
- Updated on June 12, 2023
- 4879 Views
The feature allows the assignment of reserved IPv4 addresses from reserved ranges 240.0.0.0/4 and 0.0.0.0/8 to network interfaces. by default, with no option to turn that off.
- Written by Steve Ulrich
- Posted on June 5, 2023
- Updated on June 9, 2023
- 4465 Views
Traffic policies applied to interfaces are used to match traffic based on packet header fields or their summarized counterparts and take configured actions against them. The match rules configured in these policies are usually installed in a prioritized hardware table (i.e., TCAM) where the action of the first-hit filter is taken. The summarized fields are also installed in various hardware tables.
- Written by Edwin Tambi
- Posted on August 19, 2020
- Updated on July 3, 2024
- 20807 Views
EOS supports the ability to match on a single VLAN tag (example: encapsulation dot1q vlan 10) or a VLAN tag pair (example: encapsulation dot1q vlan 10 inner 20) to map matching packets to an interface. In this case, the encapsulation string is considered consumed by the mapped interface before forwarding, which means that the tags are effectively removed from the incoming packet for the purposes of any downstream forwarding.
- Written by Zhuang Liu
- Posted on June 5, 2023
- Updated on June 5, 2023
- 4743 Views
This feature is used to send gratuitous ARPs and NDs to update the mac address in neighbors’ mac address table when the users configure to change the mac address in the routed interface.
- Written by Sudheer Y R
- Posted on October 9, 2018
- Updated on December 5, 2023
- 19754 Views
This feature introduces the hardware forwarding support for IPv4 over IPv4, GRE-Tunnel interfaces on Arista Switches. A GRE-Tunnel interface acts as a logical interface which performs the GRE encapsulation or decapsulation.
- Written by Deepak Sebastian
- Posted on November 12, 2019
- Updated on May 7, 2024
- 10145 Views
This feature adds support for offloading BFD Transmit path to hardware (ASIC) for specific types of BFD sessions. This will improve accuracy of transmit timer implementations for BFD (especially with fast timers like 50 ms) and relieve pressure on the main CPU in scenarios of scale.
- Written by Prasanna Subramaniam
- Posted on June 5, 2023
- Updated on June 8, 2023
- 5051 Views
This feature adds support for separate unicast and multicast counters, per ingress interface and per traffic class.
- Written by Suresh Nalagatla
- Posted on June 5, 2023
- Updated on June 15, 2023
- 5164 Views
This is a platform-independent feature. Therefore applicable to all platforms that support L2 EVPN Multicast solution.
- Written by Neel Neogi
- Posted on December 30, 2020
- Updated on June 8, 2023
- 12734 Views
The document describes the support for dedicated and group ingress policing on interfaces without using QoS policy-maps to match on the traffic and apply policing.
- Written by Soumya S Acharya
- Posted on June 5, 2023
- Updated on June 7, 2023
- 4469 Views
The advertise high-metrics feature, when enabled on a device, advertises it with the metric as maxLinkMetric-1 value (i.e. 16777214). This allows the router to be used as a last resort if no other path is available.
- Written by Vivek Ilangovan
- Posted on January 18, 2019
- Updated on July 20, 2023
- 7010 Views
This feature implements RFC 5310 that allows IS-IS PDUs to be authenticated using following secure hash algorithms (SHA): SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512. The feature is supported in both default and non-default vrf. Unlike the existing authentication scheme based on MD5 and ClearText, with this feature two IS-IS nodes can be configured with different SHA algorithm and secret-key and can still exchange IS-IS PDUs.
- Written by Kamala R
- Posted on September 30, 2015
- Updated on July 20, 2023
- 6992 Views
The difference between the two forms of authentication is in the level of security provided. In case of clear text authentication, the password is specified as text in the authentication TLV, making it possible for an attacker to break the authentication by sniffing and capturing IS-IS PDUs on the network.
- Written by Marc Laprade
- Posted on November 3, 2021
- Updated on June 13, 2023
- 10513 Views
This feature will allow the user to select whether port mirror destinations of type GRE tunnel include the optional “key” field in the GRE header on certain platforms. The key field allows the user to uniquely identify a particular packet flow. The feature also allows the user to specify the value of the 32 bit key field.
- Written by Tony Truong
- Posted on June 5, 2023
- Updated on October 16, 2023
- 6396 Views
EOS-4.30.0F adds support for relaxing L1 CLI guards. This feature allows the ability to configure the handling of unsupported L1 configurations (e.g. speed, error-correction, etc.): either rejecting the unsupported configurations with error messages or prompting for confirmation with warning messages.
- Written by Zeyad Tamimi
- Posted on March 3, 2023
- Updated on December 19, 2024
- 8620 Views
At a high level, L1 profiles are a set of configurations which allow EOS users to change the numbering scheme and default L1 configurations of all front panel interfaces across their network switch. On Arista network switches, front panel transceiver cages are exposed as ports which are numbered sequentially: 1, 2, 3, 4, etc. These identifiers are usually marked on the front panel to allow for easier identification.
- Written by Nelson Perez
- Posted on June 5, 2023
- Updated on October 9, 2024
- 5159 Views
Arista's 7130 Connect Series of Layer 1+ switches are powerful network devices that allow for dynamic connections between various layer 1 components on the system, such as the front panel, FPGA, and ASIC ports.
- Written by Athichart Tangpong
- Posted on October 22, 2018
- Updated on October 1, 2024
- 14086 Views
A L2 sub-interface is a logical bridging endpoint associated with traffic on an interface distinguished by 802.1Q tags, where each <interface, 802.1q tag> tuple is treated as a first class bridging interface.
- Written by Nathan Wolfe
- Posted on February 15, 2018
- Updated on November 7, 2024
- 12303 Views
Introduced in EOS-4.20.1F, “selectable hashing fields” feature controls whether a certain header’s field is used in the hash calculation for LAG and ECMP.
- Written by Tarun Jaswanth LNU
- Posted on June 5, 2023
- Updated on June 12, 2023
- 5872 Views
MACsec Stateful Switchover (SSO) allows for a switchover from an active supervisor to a standby supervisor where MACsec traffic remains undisrupted during switchover. This TOI describes details and limitations of MACsec Stateful Switchover.
- Written by Suresh Krishnan Balakrishnan
- Posted on June 10, 2019
- Updated on March 4, 2024
- 8809 Views
The main motivation for the feature is to provide high availability to the ManagementActive interface (Management0) via multiple redundant paths in the modular system. The ManagementActive interface(Management0) is a virtual interface pointing to the active supervisor.
- Written by Yashvir Singh
- Posted on March 2, 2021
- Updated on June 19, 2023
- 9460 Views
This feature allows classification of packets on QoS policy-maps based on the Class of Service (CoS), VLAN, Drop Eligible Indicator (DEI) in the 802.1q header of the packet. CoS (Class of Service) corresponds to the Priority code point (PCP) bits in the 802.1q header.
- Written by Munisha Rani
- Posted on June 5, 2023
- Updated on June 16, 2023
- 4972 Views
MDI/MDI-X refer to the pin layout of BASE-T ports on various networking devices. Historically, servers, workstations etc. use MDI pin layout while switches generally have MDI-X pin layout. MDI is part of the media attachment unit that provides the physical and electrical connection to the cabling medium when linking two endpoint devices.
- Written by David Mirabito
- Posted on December 30, 2021
- Updated on December 12, 2024
- 16051 Views
MetaWatch is an FPGA-based feature available for Arista 7130 Series platforms. It provides precise timestamping of packets, aggregation and deep buffering for Ethernet links. Timestamp information and other metadata such as device and port identifiers are appended to the end of the packet as a trailer.
- Written by Siddarth Karki
- Posted on March 3, 2023
- Updated on June 15, 2023
- 5799 Views
From the 4.29.2F release of EOS, proactive probing of servers is supported. Using this feature Arista switches can continuously probe configured servers to check their liveliness and use the information obtained from these probes while sending out requests to the servers.
- Written by Kushagra Mohan
- Posted on March 18, 2020
- Updated on December 20, 2024
- 8626 Views
This feature enables per port TC-To-COS mapping, where TC represents Traffic-Class and COS represents Vlan tag PCP bits. While at present there is a global TC-To-COS mapping, we can use the TC-To-COS feature to create custom profiles which can be applied to the required interfaces.
- Written by Rahul Kumar Singh
- Posted on August 18, 2022
- Updated on October 11, 2024
- 8578 Views
This article is intended to discuss how to configure the Phone VLAN on an Arista switch.
- Written by Ethan Vadai
- Posted on March 6, 2020
- Updated on March 14, 2024
- 17542 Views
Policy-based routing (PBR) is a feature that is applied on routable ports, to preferentially route packets. Forwarding is based on a policy that is enforced at the ingress of the applied interface and overrides normal routing decisions. In addition to matches on regular ACLs, PBR policy-maps can also include “raw match” statements that look like a single entry of an ACL as a convenience for users.
- Written by Eric Lanini
- Posted on March 3, 2023
- Updated on October 11, 2024
- 5329 Views
Precoding is used to help reduce the burst error length of DFE (Decision Feedback Equalizer) error events with PAM-4 modulation
- Written by Shyam Kota
- Posted on April 15, 2020
- Updated on June 1, 2023
- 7273 Views
This priority drop feature provides a way to drop packets according to QOS priority when the device ingress maximum packet rate is oversubscribed.
- Written by Aaron Bamberger
- Posted on June 5, 2023
- Updated on September 20, 2023
- 5825 Views
Enabling “Proxy ARP/ND for Single Aggregation (AG) VTEP Campus Deployments without EVPN” allows an aggregation VTEP to proxy reply to a VXLAN-encapsulated ARP request/NS when the ARP/NS target host is remote and the ARP/ND binding is already learned by the AG VTEP.
- Written by David Cronin
- Posted on March 3, 2022
- Updated on December 2, 2024
- 12432 Views
Routing Control Functions (RCF) is a language that can express route filtering and attribute modification logic in a powerful and programmatic fashion.The document covers: Configurations of a RCF function for BGP points of application
- Written by Shamit Kapadia
- Posted on May 3, 2022
- Updated on June 5, 2023
- 8564 Views
Routing Control Functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by David Cronin
- Posted on March 4, 2022
- Updated on April 16, 2024
- 17464 Views
Routing control functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by Kalash Nainwal
- Posted on December 14, 2020
- Updated on July 31, 2024
- 12613 Views
RSVP-TE, the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), is used to distribute MPLS labels for steering traffic and reserving bandwidth. The Label Edge Router (LER) feature implements the headend functionality, i.e., RSVP-TE tunnels can originate at an LER which can steer traffic into the tunnel.
- Written by Jeevan Kamisetty
- Posted on November 4, 2020
- Updated on October 4, 2024
- 14879 Views
Network administrators require access to flow information that passes through various network elements, for the purpose of analyzing and monitoring their networks. This feature provides access to IP flow information by sampling traffic flows in ingress and/or egress directions on the interfaces on which it is configured. The samples are then used to create flow records, which are exported to the configured collectors in the IPFIX format. Egress Flow tracking is supported from EOS-4.29.0F on the DCS-7170B-64C series and supported on 7280, 7500 and 7800 series platforms from EOS-4.31.1".
- Written by Zhen Xue
- Posted on June 29, 2020
- Updated on June 5, 2023
- 10794 Views
Bidirectional Forwarding Detection (BFD) is a protocol that provides low-overhead, short-duration detection of failures of arbitrary paths between two systems.