- Written by Shamit Kapadia
- Posted on 5月 3, 2022
- Updated on 6月 5, 2023
- 8285 Views
Routing Control Functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by David Cronin
- Posted on 3月 4, 2022
- Updated on 4月 16, 2024
- 16924 Views
Routing control functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by Kalash Nainwal
- Posted on 12月 14, 2020
- Updated on 7月 31, 2024
- 12300 Views
RSVP-TE, the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), is used to distribute MPLS labels for steering traffic and reserving bandwidth. The Label Edge Router (LER) feature implements the headend functionality, i.e., RSVP-TE tunnels can originate at an LER which can steer traffic into the tunnel.
- Written by Jeevan Kamisetty
- Posted on 11月 4, 2020
- Updated on 10月 4, 2024
- 14427 Views
Network administrators require access to flow information that passes through various network elements, for the purpose of analyzing and monitoring their networks. This feature provides access to IP flow information by sampling traffic flows in ingress and/or egress directions on the interfaces on which it is configured. The samples are then used to create flow records, which are exported to the configured collectors in the IPFIX format. Egress Flow tracking is supported from EOS-4.29.0F on the DCS-7170B-64C series and supported on 7280, 7500 and 7800 series platforms from EOS-4.31.1".
- Written by Zhen Xue
- Posted on 6月 29, 2020
- Updated on 6月 5, 2023
- 10455 Views
Bidirectional Forwarding Detection (BFD) is a protocol that provides low-overhead, short-duration detection of failures of arbitrary paths between two systems.
- Written by Vishrant Vasavada
- Posted on 6月 5, 2023
- Updated on 6月 5, 2023
- 4102 Views
A new configuration command label local-termination explicit-null under BGP LU address family allows BGP LU speakers to send explicit-null labels for prefixes for which the router is a terminating LSP node. The prefix is expected to be originating locally (via network command).
- Written by Harsimran
- Posted on 6月 5, 2023
- Updated on 6月 5, 2023
- 4203 Views
STUN (Session Traversal Utilities for NAT) is a client-server protocol that can be used by a network endpoint to determine the IP address and port assigned to it by a NAT device. The protocol is defined in RFC8489.
This document describes the STUN client and server capabilities in CloudEOS, and how this is used by Dynamic Path Selection (DPS) feature.
- Written by Harsimran
- Posted on 6月 5, 2023
- Updated on 6月 5, 2023
- 3464 Views
STUN Debugging Guide Questions and Answers
- Written by Deepanshu Shukla
- Posted on 8月 21, 2020
- Updated on 6月 3, 2024
- 13670 Views
This feature adds support for “Dynamic Load Balancing (DLB)” on Equal Cost Multi Path (ECMP) groups.
It is intended to help overcome the potential shortcomings of traditional hash-based load balancing by considering the traffic load of members of ECMP groups. DLB considers the state of the port while assigning egress ports to packets, resulting in a more even flow. The state of each port member is determined by measuring the amount of data transmitted from a given port and total number of packets enqueued to a given port.
- Written by Shashank Manjunath
- Posted on 6月 5, 2023
- Updated on 9月 18, 2024
- 4085 Views
This feature adds support for configuring multiple authentication keys each with a specified lifetime using a shared secret profile. With a shared secret profile, a current key (key having the most recent start time) is automatically picked as per the lifetime specified. Authentication types supported are MD5 and SHA. The feature can be configured at both global and interface level. SHA algorithms supported are SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512.
- Written by Neil Jarvis
- Posted on 3月 2, 2022
- Updated on 6月 7, 2023
- 9008 Views
A L2 sub-interface is a logical bridging endpoint associated with traffic on an interface distinguished by 802.1Q tags, where each <interface, 802.1Q tag> tuple is treated as a first-class bridging interface.
- Written by Prateek Mali
- Posted on 8月 19, 2020
- Updated on 11月 14, 2024
- 20968 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Naresh Kumar L S
- Posted on 2月 22, 2022
- Updated on 4月 4, 2024
- 8504 Views
Several customers have expressed interest in using IPv6 addresses for VxLAN underlay in their Data Centers (DC). Prior to 4.27.2F, only IPv4 addresses are supported for VxLAN underlay, i.e VTEPs are reachable via IPv4 addresses only. This feature enables a VTEP to send VxLAN Encapsulated packets using IPv6 underlay.
- Written by Shyam Kota
- Posted on 5月 21, 2019
- Updated on 6月 7, 2023
- 9106 Views
Add the ability to generate SYSLOG messages when a transceiver's digital optical monitoring threshold is crossed.
- Written by Victoria Austin
- Posted on 6月 5, 2023
- Updated on 5月 2, 2024
- 2875 Views
This feature is disabled by default. It can be enabled by a CLI toggle "logging transceiver communication" under the "monitor layer1" config mode. Note that “logging transceiver” will enable SMBus communication failure and digital optical monitoring syslogs. See under Resources for more information on digital optical monitoring syslogs.
- Written by Tegar Wicaksono
- Posted on 6月 20, 2022
- Updated on 6月 9, 2023
- 5457 Views
This feature provides support for packet counters for Tap Aggregation on default forwarding, GRE tunnel termination, traffic steering based on policy map and traffic steering based on traffic policy (Aegis). For brevity, counters for policy-map traffic steering will be referred to as policy-map counters, and counters for traffic-policy traffic steering will be referred to as traffic-policy counters.
- Written by Brian Schuette
- Posted on 6月 5, 2023
- Updated on 6月 9, 2023
- 3939 Views
In an optical transceiver, electrical signals leaving the switch are converted to optical signals in the transmit path. Optical signals arriving at the transceiver are converted to electrical signals that enter the switch in the receive path. At the point of conversion, an automatic decision can be made to turn off (squelch) output when the input level drops below a certain threshold of usability (usually, LOS condition.) This is referred to as automatic squelching.
- Written by Vishrant Vasavada
- Posted on 1月 3, 2023
- Updated on 5月 21, 2024
- 4369 Views
The new show command show configuration consistency adds the ability to check for “dangling” references in the configuration. For example, it is possible to configure an access-list, TEST-ACL, to an interface (ip access-group TEST-ACL in), without actually defining TEST-ACL (ip access-list TEST-ACL). This show command will list such “undefined” references.
- Written by Anirudh Ramesh Iyer
- Posted on 5月 5, 2021
- Updated on 7月 19, 2024
- 17611 Views
This article describes how to customize TCAM ( Ternary Content Addressable Memory ) lookup for each feature which uses TCAM.
- Written by Shyam Kota
- Posted on 6月 14, 2019
- Updated on 6月 1, 2023
- 8498 Views
This article describes a set of CLI commands to create TCAM profiles. The profile is composed of a set of TCAM features, with each feature having customized lookup key, actions and packet types to hit.
- Written by Isidor Kouvelas
- Posted on 2月 28, 2022
- Updated on 7月 29, 2024
- 14528 Views
Virtual Private LAN Service (VPLS) appears in (almost) all respects as an Ethernet type service to customers of a Service Provider (SP). A VPLS glues together several individual LANs across a packet switched network to appear and function as a single bridged LAN. This is accomplished by incorporating MAC address learning, flooding, and forwarding functions in the context of pseudowires that connect these individual LANs across the packet switched network. LDP signaling is used for the setup and teardown of the mesh of pseudowires that constitute a given VPLS instance.
- Written by Sarah Chen
- Posted on 6月 5, 2023
- Updated on 7月 19, 2024
- 4212 Views
Wan Routing System solution provides connectivity between different enterprise branches, DCs and head office across different geographical regions, zones and sites by using the best optimal path available based on the type of application.
- Written by Eamon Doyle
- Posted on 6月 5, 2023
- Updated on 6月 13, 2023
- 3452 Views
A fundamental business requirement for any network operator is to reduce costs where possible. For network operators, deploying devices to many locations can be a significant cost as sending trained specialists to each site for installations is both time-consuming and expensive.