- Written by Weichen Zhao
- Posted on 6月 29, 2023
- Updated on 11月 9, 2023
- 4713 Views
Prior to this feature, we supported a maximum of two levels of Forward Equivalence Class (FEC) hierarchies for vxlan routing tunnels in hardware.
- Written by Prateek Mali
- Posted on 8月 19, 2020
- Updated on 11月 14, 2024
- 20910 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Matthew Carrington-Fair
- Posted on 3月 3, 2023
- Updated on 10月 24, 2024
- 4634 Views
This feature allows the export of IP FIB (Forwarding Information Base) through the OpenConfig AFT YANG models.
- Written by Abhiram Kalluru
- Posted on 9月 11, 2023
- Updated on 11月 7, 2023
- 3489 Views
This feature allows FDB export through the OpenConfig AFT YANG models. The streaming behavior of mac addresses are Entries associated with SVI or L3 port have an associated VRF name. The VRF name is used to specify which network instance the FDB entry belongs to.
- Written by Lucas Frere
- Posted on 11月 17, 2023
- Updated on 11月 20, 2023
- 3605 Views
Slice reservation can be used to solve TCAM resources limitations due to suboptimal group order in the TCAM because of the FCFS (First come first serve) nature of the TCAM. The user will be able to reserve a certain amount of entries in the TCAM for a specific feature.
- Written by Vipul Shah
- Posted on 8月 27, 2019
- Updated on 11月 23, 2023
- 7225 Views
BGP routing information often contains more than one path to the same destination network. The BGP best-path selection algorithm determines which of these paths should be considered as the best path to that network.
- Written by Pankaj Srivastava
- Posted on 9月 11, 2023
- Updated on 10月 17, 2024
- 3386 Views
The document describes the support for policing on one or more VNIs configured on a Vxlan interface. This feature allows dedicated policing of flows on a VNI in both directions which corresponds to incoming traffic from a remote VTEP and outgoing traffic towards a remote VTEP. Policers in the hardware are created with policer profiles attached to VNIs. Policer profiles can be shared across multiple VNIs but policers are dedicated.