- Written by David Cronin
- Posted on March 3, 2022
- Updated on November 7, 2024
- 11858 Views
Routing Control Functions (RCF) is a language that can express route filtering and attribute modification logic in a powerful and programmatic fashion.The document covers: Configurations of a RCF function for BGP points of application
- Written by David Cronin
- Posted on March 4, 2022
- Updated on April 16, 2024
- 16806 Views
Routing control functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by Kalash Nainwal
- Posted on December 14, 2020
- Updated on July 31, 2024
- 12251 Views
RSVP-TE, the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), is used to distribute MPLS labels for steering traffic and reserving bandwidth. The Label Edge Router (LER) feature implements the headend functionality, i.e., RSVP-TE tunnels can originate at an LER which can steer traffic into the tunnel.
- Written by Martin Stigge
- Posted on October 22, 2018
- Updated on July 19, 2024
- 10308 Views
RSVP-TE applies the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), i.e., to distribute MPLS labels for steering traffic and reserving bandwidth.
- Written by Jeevan Kamisetty
- Posted on November 4, 2020
- Updated on October 4, 2024
- 14363 Views
Network administrators require access to flow information that passes through various network elements, for the purpose of analyzing and monitoring their networks. This feature provides access to IP flow information by sampling traffic flows in ingress and/or egress directions on the interfaces on which it is configured. The samples are then used to create flow records, which are exported to the configured collectors in the IPFIX format. Egress Flow tracking is supported from EOS-4.29.0F on the DCS-7170B-64C series and supported on 7280, 7500 and 7800 series platforms from EOS-4.31.1".
- Written by Haomin
- Posted on April 12, 2024
- Updated on April 12, 2024
- 2090 Views
Some configurations in NAT may have some trade-offs and even cause problems. The Show Configuration Consistency NAT CLI can check these configurations, and provide hints to change the configuration or the trade-offs to be considered.
- Written by Karan Jagjit Kumar
- Posted on June 29, 2023
- Updated on February 15, 2024
- 5839 Views
Smart System Upgrade (SSU) provides the ability to upgrade the EOS image with minimal traffic disruption. This is an existing feature on many fixed system products. This resource will outline the SSU feature in reference to CCS-720DP, CCS-722XPM, CCS-720XP-96ZC2 and DCS-7010TX.
- Written by Brian Neville
- Posted on November 8, 2023
- Updated on September 30, 2024
- 4599 Views
gNSI (gRPC Network Security Interface) defines a set of gRPC-based microservices for executing security-related operations on network devices.
- Written by Ian McCloghrie
- Posted on January 30, 2024
- Updated on January 31, 2024
- 2949 Views
IPsec is a standard for enabling secure network communication between two devices using the Internet Protocol (IP) by way of an encrypted packet tunnel.Previous versions of Arista EOS have required that IPsec tunnels use the default VRF for underlay traffic.Starting with the release 4.31.0, this restriction is removed and EOS now supports IPsec tunnel interfaces using one or more non-default VRFs.
- Written by Harsh Goyal
- Posted on December 21, 2020
- Updated on February 15, 2024
- 7835 Views
IPv4 Unicast Reverse Path Forwarding (uRPF) can help limit malicious IPv4 traffic on a network. uRPF works by enabling the router to verify reachability (routing) of the source IP address (SIP) in the packet being forwarded. If the SIP is determined to not be a valid address, the packet is dropped.
- Written by Rajan Keshari
- Posted on January 30, 2024
- Updated on June 10, 2024
- 2554 Views
When MPLS (Multiprotocol Label Switching) LFIB (Label Forwarding Information Base) lookup fails, typical forwarding behavior is to drop such packets. This feature allows fallback IP lookup when MPLS lookup fails and forwards traffic to an IP path by looking up the packet’s destination IP address in the route table if the network topologies have labeled paths programmed & IP based routes are also available for the same destination. This feature is also supported with optimized IPv4 8-to-1 route scale compression.
- Written by Legena P K
- Posted on August 21, 2020
- Updated on May 31, 2024
- 7103 Views
IPv6 Unicast Reverse Path Forwarding (uRPF) can help limit malicious IPv6 traffic on a network. uRPF works by
- Written by Nikhil Goyal
- Posted on January 29, 2024
- Updated on November 13, 2024
- 3257 Views
Segment Routing provides a mechanism to define end-to-end paths within a topology by encoding paths as sequences of sub-paths or instructions. These sub-paths or instructions are referred to as “segments”. OSPF Segment Routing (henceforth referred to as OSPF SR) provides means to advertise such segments through OSPF protocol.
- Written by Gokul Unnikrishnan
- Posted on March 3, 2023
- Updated on January 30, 2024
- 4587 Views
This feature allows for the configuration of password requirements when creating or modifying local user accounts. Specifically, policies can necessitate that passwords meet the following requirements:
- Written by Prakash
- Posted on January 31, 2024
- Updated on January 31, 2024
- 2556 Views
This feature will enable the configuration of IPv6 static routes with IPv4 next-hops and a MPLS label value where the IPv4 next-hop is allowed to resolve only through tunnel RIB. This will allow users to install 6PE routes using static route configuration thereby connecting IPv6 islands over IPv4 MPLS cloud.
- Written by Muhammad Yousuf
- Posted on September 9, 2021
- Updated on February 27, 2024
- 8806 Views
This TOI supplements the Ingress Traffic Policy applied on ingress interfaces. Please refer to that document for a description of Traffic Policies and field-sets. This TOI explains the Traffic Policies as applied in the egress direction on interfaces
- Written by Eddie Xie
- Posted on January 31, 2024
- Updated on July 15, 2024
- 2293 Views
This TOI supplements the Ingress Traffic Policy applied on ingress port interfaces. Please refer to that document for a description of Traffic Policies and field-sets. This TOI explains the Traffic Policies as applied in the ingress direction on VLAN interfaces.
- Written by Kailin Zhang
- Posted on February 19, 2024
- Updated on February 19, 2024
- 1886 Views
In STP Rapid-PVST mode, when multiple VLANs are assigned to different interfaces using switchport mode access and these interfaces are interconnected, the VLANs perceive each other as part of the same VLAN, thereby forming a large single VLAN network.
- Written by Shelly Chang
- Posted on January 6, 2022
- Updated on May 3, 2024
- 8503 Views
This feature introduces hardware forwarding support of IPv4 multicast traffic over IPv4 GRE tunnel interfaces in Arista Switches. Multicast source traffic can reach the receivers which are separated by an IP cloud which is not configured for IP multicast routing by utilizing a GRE tunnel.
- Written by Victoria Austin
- Posted on June 5, 2023
- Updated on May 2, 2024
- 2843 Views
This feature is disabled by default. It can be enabled by a CLI toggle "logging transceiver communication" under the "monitor layer1" config mode. Note that “logging transceiver” will enable SMBus communication failure and digital optical monitoring syslogs. See under Resources for more information on digital optical monitoring syslogs.
- Written by Anais Taing
- Posted on June 5, 2020
- Updated on November 7, 2024
- 7214 Views
In TAP Aggregation mode, configuration options are provided to handle special packet types. When receiving a packet whose Frame Check Sequence (FCS) is corrupted, the default behavior is to replace the bad FCS with the correct value and forward it. Configuration options are available to control the FCS behavior, such as to discard errors, pass through the bad FCS, or append a new FCS.
- Written by Gowtham Rameshkumar
- Posted on September 15, 2023
- Updated on October 14, 2024
- 3595 Views
The Unified Forwarding Table (UFT) is memory that is shared between Layer2 and Layer3 lookup tables with capabilities for variable partitions. Rather than separate Layer2 and Layer3 lookup tables of fixed size, the UFT may be partitioned to support user-requested combinations of Layer2 and Layer3 lookup table sizes.
- Written by Rashid Akhtar
- Posted on February 6, 2024
- Updated on February 7, 2024
- 2627 Views
Unicast reverse-path forwarding (uRPF) is a security feature that validates the source IP address of an incoming packet to ensure that the incoming packet has originated from a legitimate/valid source. If validation of the source IP address fails, then the packet is dropped, thus preventing IP spoofing from illegitimate/invalid sources.
- Written by Bharadwaj Gosukonda
- Posted on June 20, 2022
- Updated on February 15, 2024
- 6410 Views
Unicast Reverse Path Forwarding (uRPF) can help limit malicious IPv4/IPv6 traffic on a network. uRPF works by enabling the router to verify reachability (routing) of the source IP address (SIP) in the packet being forwarded. If the SIP is determined to be an invalid address, the packet is dropped.
- Written by Pratishtha Panwar
- Posted on August 31, 2023
- Updated on February 15, 2024
- 2406 Views
This feature allows Unicast Reverse Path Forwarding (uRPF) to be enabled along with Routes in Exact Match Table( REM/FlexRoute ). One prefix length can be selected to be in the Large Exact Match table (LEM) along with uRPF support.
- Written by Deepanshu Shukla
- Posted on January 31, 2024
- Updated on July 19, 2024
- 3132 Views
This article describes how to configure a TCAM ( Ternary Content Addressable Memory ) profile for ingress filtered mirroring sessions. This profile allows mirroring sessions to use less TCAM resources by individually selecting the allowable match criteria.
- Written by Isidor Kouvelas
- Posted on February 28, 2022
- Updated on July 29, 2024
- 14484 Views
Virtual Private LAN Service (VPLS) appears in (almost) all respects as an Ethernet type service to customers of a Service Provider (SP). A VPLS glues together several individual LANs across a packet switched network to appear and function as a single bridged LAN. This is accomplished by incorporating MAC address learning, flooding, and forwarding functions in the context of pseudowires that connect these individual LANs across the packet switched network. LDP signaling is used for the setup and teardown of the mesh of pseudowires that constitute a given VPLS instance.
- Written by Alton Lo
- Posted on February 22, 2024
- Updated on February 26, 2024
- 2357 Views
With a static configured import and export route-target for a given vlan-aware-bundle, all its VLAN members share the same route-target value. For example, EVPN uses the same route-target in the Type2 EVPN route advertisements for hosts residing in two different VLAN of the same bundle.
- Written by Gary McCarthy
- Posted on January 30, 2024
- Updated on January 30, 2024
- 2743 Views
VRF redirection often requires matching packets’ source addresses against one or more sets of IP prefixes. This can become difficult to manage when the prefix sets need to be consistently maintained on several devices and either change too frequently or are very large. When the prefixes for the prefix sets are learned by BGP, this feature provides an alternative to maintaining unwieldy sets of statically configured IP prefixes.
- Written by Simon Liang
- Posted on September 5, 2021
- Updated on October 18, 2024
- 9084 Views
This document describes the VRF selection policy and VRF fallback feature. A VRF selection policy contains match rules that specify certain criteria (e.g. DSCP, IP protocol) as well as a resulting action to select a VRF in which to do the FIB lookup. The VRF fallback feature is an extension of these policies which allows users to optionally specify a “fallback” VRF for each VRF. The behavior is such that if the FIB lookup fails in a match rule’s selected VRF, another lookup will be attempted in the configured fallback VRF. Additionally, the fallback VRF itself can have yet another fallback VRF, such that if the lookup in the VRF and fallback VRF fail, the fallback-of-the-fallback VRF will be looked up (see the Configuration section for an example of this).
- Written by Navlok Mishra
- Posted on February 8, 2017
- Updated on May 17, 2024
- 7474 Views
WRED ( Weighted Random Early Detection ) is one of the congestion management techniques.