- Written by Sean Waclawik
- Posted on 11月 14, 2019
- Updated on 2月 5, 2022
- 7150 Views
Configurable port qualifier sizing allows for dynamic resizing of the hardware TCAM feature qualifier for IPKGV
- Written by Legena P K
- Posted on 8月 21, 2020
- Updated on 5月 31, 2024
- 7387 Views
IPv6 Unicast Reverse Path Forwarding (uRPF) can help limit malicious IPv6 traffic on a network. uRPF works by
- Written by Nikhil Kallat
- Posted on 8月 24, 2020
- Updated on 8月 24, 2020
- 6059 Views
This feature adds the support for MD5 authentication in RIP. MD5 authentication adds the additional layer of
- Written by Kaustav Majumdar
- Posted on 8月 20, 2020
- Updated on 8月 20, 2020
- 6913 Views
Media Access Control Security (MACsec) is an industry standard encryption mechanism that protects all traffic
- Written by Charlotte Fedderly
- Posted on 8月 25, 2020
- Updated on 2月 21, 2024
- 9731 Views
This feature adds support for a selected set of configured interfaces to collect egress flow samples. Egress sFlow can be configured on ethernet and port-channel interfaces.
- Written by Sandeep Kopuri
- Posted on 10月 7, 2019
- Updated on 10月 24, 2024
- 11431 Views
Topology Independent Fast Reroute, or TI-LFA, uses IS-IS SR to build loop-free alternate paths along the post-convergence path. These loop-free alternates provide fast convergence.
- Written by Prateek Mali
- Posted on 8月 19, 2020
- Updated on 11月 14, 2024
- 21776 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Vipul Shah
- Posted on 8月 27, 2019
- Updated on 11月 23, 2023
- 7403 Views
BGP routing information often contains more than one path to the same destination network. The BGP best-path selection algorithm determines which of these paths should be considered as the best path to that network.
- Written by Neel Neogi
- Posted on 12月 19, 2019
- Updated on 12月 21, 2021
- 8803 Views
Two rate three color marker (TrTCM) meters an incoming packet stream and marks the packets based on two rates, PIR
- Written by Lavanya Conjeevaram
- Posted on 9月 11, 2017
- Updated on 9月 7, 2021
- 9368 Views
Unidirectional links is a feature that configures an Ethernet interface transmit and receive paths to be
- Written by Gary McCarthy
- Posted on 6月 29, 2020
- Updated on 7月 12, 2023
- 7920 Views
Prior to EOS 4.24.1F, per-destination steering into an SR Policy was only supported for IP unicast BGP routes in the default VRF. Support for additional AFI/SAFIs were added as follows: EOS 4.24.2F: L2 EVPN — EOS 4.27.2F: BGP Labeled Unicast
- Written by Supriya Singh
- Posted on 9月 16, 2020
- Updated on 4月 4, 2024
- 3652 Views
This document describes the support of VxLAN Bridging and Routing on the R3 series of DCS 7280, 7500 and 7800 Arista
- Written by Bin Wang
- Posted on 8月 20, 2020
- Updated on 2月 5, 2022
- 6054 Views
The VxLAN VTEP counters feature allows the device to count VxLAN packets received and sent by the device on a per VTEP
- Written by Ravi Krishnamurthy
- Posted on 8月 23, 2019
- Updated on 8月 27, 2020
- 9233 Views
The “vxlan bridging vtep to vtep” feature allows VXLAN encapsulated packets ingressed at an Arista switch from a
- Written by Yagna Siriki
- Posted on 8月 24, 2020
- Updated on 8月 24, 2020
- 7366 Views
Some devices connected to Dot1x port in trunk phone mode won’t start authentication until it is awakened with a