- Written by Thomas Cannon
- Posted on April 18, 2024
- Updated on April 18, 2024
- 2292 Views
This TOI describes a feature allowing packets that do not match any VLAN translations to be dropped from a port. This can be useful to drop selective Q-in-Q packets that do not receive a VLAN. The Configuration section details CLI commands used to configure the feature.
- Written by Adam Morrison
- Posted on January 3, 2022
- Updated on January 3, 2022
- 8524 Views
As of EOS 4.22.0F, EVPN all active multihoming is supported as a standardized redundancy solution. For effective
- Written by Shriprama Rao
- Posted on November 20, 2023
- Updated on November 20, 2023
- 4654 Views
This feature allows encapsulating (and decapsulating) L2 traffic from a given interface or subinterface over a GRE tunnel. An MPLS label is added to identify the ingress interface (similar to MPLS pseudowires) and the GRE tunnel is used to transport the packets to a remote endpoint.
- Written by John Li
- Posted on February 16, 2022
- Updated on July 18, 2024
- 7683 Views
This TOI describes the MAC limit per VLAN feature which can be used to limit the number of locally learned MAC addresses per VLAN.
- Written by Coy Humphrey
- Posted on September 15, 2020
- Updated on June 7, 2024
- 11075 Views
This TOI describes a set of enhancements made to the existing Port Security: Protect Mode (PortSec-Protect) feature. Please see the existing TOI for this feature here:Port Security: Protect Mode
- Written by Srinivasan Viswanathan
- Posted on April 18, 2022
- Updated on June 2, 2022
- 7300 Views
Compatible platforms start up in the “default” forwarding-table partition mode, which provides the ability to program up to 8K L2 addresses.
- Written by Alok Kumar
- Posted on November 29, 2023
- Updated on October 15, 2024
- 3514 Views
This feature provides a cli command showing the list of mac addresses which could not be learned due to hash collision in the hardware table. A hash collision occurs when two or more distinct pieces of data map to the same entry ( or slot ) in the hardware table. It can happen when the hash function used to calculate the index for a given mac address results in the already occupied index, resulting in failure of inserting the later mac address to the hardware table.
- Written by Yuyang Chen
- Posted on June 15, 2021
- Updated on June 21, 2021
- 8539 Views
Port wide port security: Port security with address limit on the port configured by the existing shutdown mode port