- Written by Vishrant Vasavada
- Posted on June 5, 2023
- Updated on June 5, 2023
- 4082 Views
A new configuration command label local-termination explicit-null under BGP LU address family allows BGP LU speakers to send explicit-null labels for prefixes for which the router is a terminating LSP node. The prefix is expected to be originating locally (via network command).
- Written by Harsimran
- Posted on June 5, 2023
- Updated on June 5, 2023
- 4183 Views
STUN (Session Traversal Utilities for NAT) is a client-server protocol that can be used by a network endpoint to determine the IP address and port assigned to it by a NAT device. The protocol is defined in RFC8489.
This document describes the STUN client and server capabilities in CloudEOS, and how this is used by Dynamic Path Selection (DPS) feature.
- Written by Harsimran
- Posted on June 5, 2023
- Updated on June 5, 2023
- 3444 Views
STUN Debugging Guide Questions and Answers
- Written by Deepanshu Shukla
- Posted on August 21, 2020
- Updated on June 3, 2024
- 13613 Views
This feature adds support for “Dynamic Load Balancing (DLB)” on Equal Cost Multi Path (ECMP) groups.
It is intended to help overcome the potential shortcomings of traditional hash-based load balancing by considering the traffic load of members of ECMP groups. DLB considers the state of the port while assigning egress ports to packets, resulting in a more even flow. The state of each port member is determined by measuring the amount of data transmitted from a given port and total number of packets enqueued to a given port.
- Written by Shashank Manjunath
- Posted on June 5, 2023
- Updated on September 18, 2024
- 4065 Views
This feature adds support for configuring multiple authentication keys each with a specified lifetime using a shared secret profile. With a shared secret profile, a current key (key having the most recent start time) is automatically picked as per the lifetime specified. Authentication types supported are MD5 and SHA. The feature can be configured at both global and interface level. SHA algorithms supported are SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512.
- Written by Neil Jarvis
- Posted on March 2, 2022
- Updated on June 7, 2023
- 8986 Views
A L2 sub-interface is a logical bridging endpoint associated with traffic on an interface distinguished by 802.1Q tags, where each <interface, 802.1Q tag> tuple is treated as a first-class bridging interface.
- Written by Prateek Mali
- Posted on August 19, 2020
- Updated on November 14, 2024
- 20910 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Naresh Kumar L S
- Posted on February 22, 2022
- Updated on April 4, 2024
- 8481 Views
Several customers have expressed interest in using IPv6 addresses for VxLAN underlay in their Data Centers (DC). Prior to 4.27.2F, only IPv4 addresses are supported for VxLAN underlay, i.e VTEPs are reachable via IPv4 addresses only. This feature enables a VTEP to send VxLAN Encapsulated packets using IPv6 underlay.
- Written by Shyam Kota
- Posted on May 21, 2019
- Updated on June 7, 2023
- 9081 Views
Add the ability to generate SYSLOG messages when a transceiver's digital optical monitoring threshold is crossed.
- Written by Victoria Austin
- Posted on June 5, 2023
- Updated on May 2, 2024
- 2856 Views
This feature is disabled by default. It can be enabled by a CLI toggle "logging transceiver communication" under the "monitor layer1" config mode. Note that “logging transceiver” will enable SMBus communication failure and digital optical monitoring syslogs. See under Resources for more information on digital optical monitoring syslogs.
- Written by Tegar Wicaksono
- Posted on June 20, 2022
- Updated on June 9, 2023
- 5437 Views
This feature provides support for packet counters for Tap Aggregation on default forwarding, GRE tunnel termination, traffic steering based on policy map and traffic steering based on traffic policy (Aegis). For brevity, counters for policy-map traffic steering will be referred to as policy-map counters, and counters for traffic-policy traffic steering will be referred to as traffic-policy counters.
- Written by Brian Schuette
- Posted on June 5, 2023
- Updated on June 9, 2023
- 3918 Views
In an optical transceiver, electrical signals leaving the switch are converted to optical signals in the transmit path. Optical signals arriving at the transceiver are converted to electrical signals that enter the switch in the receive path. At the point of conversion, an automatic decision can be made to turn off (squelch) output when the input level drops below a certain threshold of usability (usually, LOS condition.) This is referred to as automatic squelching.
- Written by Vishrant Vasavada
- Posted on January 3, 2023
- Updated on May 21, 2024
- 4349 Views
The new show command show configuration consistency adds the ability to check for “dangling” references in the configuration. For example, it is possible to configure an access-list, TEST-ACL, to an interface (ip access-group TEST-ACL in), without actually defining TEST-ACL (ip access-list TEST-ACL). This show command will list such “undefined” references.
- Written by Anirudh Ramesh Iyer
- Posted on May 5, 2021
- Updated on July 19, 2024
- 17564 Views
This article describes how to customize TCAM ( Ternary Content Addressable Memory ) lookup for each feature which uses TCAM.
- Written by Shyam Kota
- Posted on June 14, 2019
- Updated on June 1, 2023
- 8476 Views
This article describes a set of CLI commands to create TCAM profiles. The profile is composed of a set of TCAM features, with each feature having customized lookup key, actions and packet types to hit.
- Written by Isidor Kouvelas
- Posted on February 28, 2022
- Updated on July 29, 2024
- 14505 Views
Virtual Private LAN Service (VPLS) appears in (almost) all respects as an Ethernet type service to customers of a Service Provider (SP). A VPLS glues together several individual LANs across a packet switched network to appear and function as a single bridged LAN. This is accomplished by incorporating MAC address learning, flooding, and forwarding functions in the context of pseudowires that connect these individual LANs across the packet switched network. LDP signaling is used for the setup and teardown of the mesh of pseudowires that constitute a given VPLS instance.
- Written by Sarah Chen
- Posted on June 5, 2023
- Updated on July 19, 2024
- 4190 Views
Wan Routing System solution provides connectivity between different enterprise branches, DCs and head office across different geographical regions, zones and sites by using the best optimal path available based on the type of application.
- Written by Eamon Doyle
- Posted on June 5, 2023
- Updated on June 13, 2023
- 3433 Views
A fundamental business requirement for any network operator is to reduce costs where possible. For network operators, deploying devices to many locations can be a significant cost as sending trained specialists to each site for installations is both time-consuming and expensive.