- Written by Martin Stigge
- Posted on 10月 22, 2018
- Updated on 7月 19, 2024
- 10358 Views
RSVP-TE applies the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), i.e., to distribute MPLS labels for steering traffic and reserving bandwidth.
- Written by Athish Rao
- Posted on 3月 5, 2021
- Updated on 5月 30, 2024
- 11681 Views
Segment Routing Traffic Engineering Policy (SR-TE) aka SR Policy makes use of Segment Routing (SR) to allow a headend to steer traffic along any path without maintaining per flow state in every node. A headend steers traffic into an SR Policy.
- Written by Michael Chin
- Posted on 1月 18, 2019
- Updated on 9月 15, 2023
- 9213 Views
The ‘show interfaces interactions’ command aims to provide users a resource that explains various relationships between ethernet interfaces. It describes interactions in which a configuration on an interface causes another set of interfaces to become inactive or have reduced capabilities.Examples include a primary interface consuming subordinate interfaces to service a four-lane speed or platform restrictions that require four interfaces of a port to operate at the same speed.
- Written by Yaonan Liang
- Posted on 9月 11, 2023
- Updated on 9月 14, 2023
- 3523 Views
Normally BGP allocates local labels and installs LFIB entries for all received IPv4/IPv6 Labeled Unicast (LU) routes in anticipation of readvertising them with nexthop-self. However, some deployments don’t require nexthop-self with LU routes, so LFIB hardware resources are needlessly allocated, which can present an issue in large scale LU deployments.
- Written by Joshua Portelance
- Posted on 8月 31, 2023
- Updated on 10月 13, 2023
- 4501 Views
Smart System Upgrade (SSU) provides the ability to upgrade the EOS image with minimal traffic disruption. This is an existing feature on many fixed system products. This resource will outline the SSU feature in reference to CCS-750XP, which is the first modular product to support SSU.
- Written by Ryan Lui
- Posted on 8月 21, 2023
- Updated on 8月 23, 2023
- 5673 Views
Storm control is a feature that allows the data plane to drop excess broadcast, unknown unicast, and/or multicast packets if the ingress packet rate exceeds a user-configurable threshold.
- Written by Deepak Vijayakumar
- Posted on 8月 31, 2023
- Updated on 9月 12, 2023
- 3597 Views
Storm control allows users to configure a traffic level above which incoming broadcast, unknown-unicast and multicast traffic on a port gets dropped, thus preventing flooded traffic from bringing the switch down.
- Written by Chandrakala
- Posted on 8月 22, 2023
- Updated on 8月 24, 2023
- 4454 Views
The capabilities of TCAM-based features, such as ACLs, to match qualifiers and perform actions on traffic is dependent on the TCAM profile configured on the switch. Sometimes the TCAM profile does not support all qualifiers or actions configured in a feature. In the case of PACLs and RACLs, the unsupported operations are logged and warned. This document describes enabling strict handling of such PACLs and RACLs, resulting in errors upon their configuration.
- Written by Josh Pfosi
- Posted on 6月 11, 2019
- Updated on 11月 11, 2024
- 12060 Views
This feature adds support for CPU traffic policy capable of matching and acting on IP traffic which would otherwise
- Written by Ruoyi Wang
- Posted on 8月 31, 2023
- Updated on 2月 16, 2024
- 4431 Views
This feature allows exporting the route count by protocol, i.e., a summary of routes, in the FIB (Forwarding Information Base) through the OpenConfig AFT YANG model.
- Written by Harsh Goyal
- Posted on 12月 21, 2020
- Updated on 2月 15, 2024
- 7894 Views
IPv4 Unicast Reverse Path Forwarding (uRPF) can help limit malicious IPv4 traffic on a network. uRPF works by enabling the router to verify reachability (routing) of the source IP address (SIP) in the packet being forwarded. If the SIP is determined to not be a valid address, the packet is dropped.
- Written by Legena P K
- Posted on 8月 21, 2020
- Updated on 5月 31, 2024
- 7149 Views
IPv6 Unicast Reverse Path Forwarding (uRPF) can help limit malicious IPv6 traffic on a network. uRPF works by
- Written by Scott Bailey
- Posted on 11月 6, 2023
- Updated on 11月 7, 2023
- 3733 Views
This feature allows configuring a per-port PTP domain number, which may be different from the global PTP domain number, which will apply to PTP messages sent or received on that port. With this configuration applied, transmitted messages will contain the port-specific domain number and received messages will be accepted if they contain the port-specific or global domain number.
- Written by Santosh Kumar
- Posted on 8月 31, 2023
- Updated on 9月 4, 2023
- 3524 Views
PimReg DR Filtering provides the ability to prevent unauthorized unicast addresses from registering with a rendezvous-point (RP) router. This is accomplished by adding the unauthorized unicast address to a standard access-list. When the ACL is used on the RP, the RP inspects the source information on the PIM Register packet for a match before accepting/dropping the message.
- Written by Sulyab Thottungal Valapu
- Posted on 12月 7, 2020
- Updated on 9月 4, 2023
- 6579 Views
This document describes the OSPFv2 feature that allows the setting of “Down” (DN) bit in type-5 and type-7 LSAs. The DN Bit is a loop prevention mechanism implemented when OSPF is used as CE - PE IGP protocol. Its usage in OSPF is explained by RFC4576. By default, OSPF honors the DN-bit in type-3, type-5 or type-7 LSAs in non-default VRFs.
- Written by Chris Roche
- Posted on 8月 22, 2023
- Updated on 8月 22, 2023
- 3542 Views
This document describes the OSPFv3 feature that allows the setting of “Down” (DN) bit in type-5 and type-7 LSAs. The DN Bit is a loop prevention mechanism implemented when OSPFv3 is used as CE - PE IGP protocol. Its usage in OSPFv3 is explained by RFC4576. By default, OSPFv3 honors the DN-bit in type-3, type-5 or type-7 LSAs in non-default VRFs.
- Written by Sandeep Kopuri
- Posted on 10月 7, 2019
- Updated on 10月 24, 2024
- 11077 Views
Topology Independent Fast Reroute, or TI-LFA, uses IS-IS SR to build loop-free alternate paths along the post-convergence path. These loop-free alternates provide fast convergence.
- Written by Prateek Mali
- Posted on 8月 19, 2020
- Updated on 11月 14, 2024
- 21003 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Aoxi Yao
- Posted on 5月 3, 2022
- Updated on 11月 5, 2024
- 7585 Views
This feature introduces the support for Traffic Policy on VLANs. Traffic Policy allows the user to configure rules to match on certain packets through the packet processing pipeline. The user can also place actions to match packets.
- Written by Abhiram Kalluru
- Posted on 9月 11, 2023
- Updated on 11月 7, 2023
- 3515 Views
This feature allows FDB export through the OpenConfig AFT YANG models. The streaming behavior of mac addresses are Entries associated with SVI or L3 port have an associated VRF name. The VRF name is used to specify which network instance the FDB entry belongs to.
- Written by Travis Hammond
- Posted on 9月 21, 2021
- Updated on 9月 8, 2023
- 10539 Views
Timestamping is an important tool for network engineering and performance analysis. The timestamp can be applied to a packet as either an inserted header or replacing the source MAC address of the original packet. Timestamps are recorded on ingress and applied on egress.
- Written by Gowtham Rameshkumar
- Posted on 9月 15, 2023
- Updated on 10月 14, 2024
- 3640 Views
The Unified Forwarding Table (UFT) is memory that is shared between Layer2 and Layer3 lookup tables with capabilities for variable partitions. Rather than separate Layer2 and Layer3 lookup tables of fixed size, the UFT may be partitioned to support user-requested combinations of Layer2 and Layer3 lookup table sizes.
- Written by Bharadwaj Gosukonda
- Posted on 6月 20, 2022
- Updated on 2月 15, 2024
- 6470 Views
Unicast Reverse Path Forwarding (uRPF) can help limit malicious IPv4/IPv6 traffic on a network. uRPF works by enabling the router to verify reachability (routing) of the source IP address (SIP) in the packet being forwarded. If the SIP is determined to be an invalid address, the packet is dropped.
- Written by Pratishtha Panwar
- Posted on 8月 31, 2023
- Updated on 2月 15, 2024
- 2438 Views
This feature allows Unicast Reverse Path Forwarding (uRPF) to be enabled along with Routes in Exact Match Table( REM/FlexRoute ). One prefix length can be selected to be in the Large Exact Match table (LEM) along with uRPF support.
- Written by Anirudh Ramesh Iyer
- Posted on 5月 5, 2021
- Updated on 7月 19, 2024
- 17623 Views
This article describes how to customize TCAM ( Ternary Content Addressable Memory ) lookup for each feature which uses TCAM.
- Written by Zhuang Liu
- Posted on 8月 22, 2023
- Updated on 8月 25, 2023
- 3771 Views
This feature is adding VARP support for proxy ARP and local proxy ARP. Without this feature, when an active VARP instance and proxy ARP / local proxy ARP are both configured on the same interface, proxy ARP / local proxy ARP uses the interface physical MAC address in the proxy ARP / local proxy Arp replies. With this feature, when an active VARP instance and proxy ARP / local proxy ARP are both configured on the same interface, proxy ARP / local proxy ARP uses the VARP virtual MAC address in the proxy ARP / local proxy Arp replies.
- Written by Isidor Kouvelas
- Posted on 2月 28, 2022
- Updated on 7月 29, 2024
- 14532 Views
Virtual Private LAN Service (VPLS) appears in (almost) all respects as an Ethernet type service to customers of a Service Provider (SP). A VPLS glues together several individual LANs across a packet switched network to appear and function as a single bridged LAN. This is accomplished by incorporating MAC address learning, flooding, and forwarding functions in the context of pseudowires that connect these individual LANs across the packet switched network. LDP signaling is used for the setup and teardown of the mesh of pseudowires that constitute a given VPLS instance.
- Written by Pankaj Srivastava
- Posted on 9月 11, 2023
- Updated on 10月 17, 2024
- 3413 Views
The document describes the support for policing on one or more VNIs configured on a Vxlan interface. This feature allows dedicated policing of flows on a VNI in both directions which corresponds to incoming traffic from a remote VTEP and outgoing traffic towards a remote VTEP. Policers in the hardware are created with policer profiles attached to VNIs. Policer profiles can be shared across multiple VNIs but policers are dedicated.