- Written by Alexandru Suciu
- Posted on January 22, 2019
- Updated on March 4, 2022
- 7178 Views
As of EOS release 4.19.0F, breakout mode is not supported on any ports between 11-26 (inclusive) and ports between 47-62 (inclusive), and these ports can only run at 1x40GbE or 1x100GbE
- Written by Shyam Kota
- Posted on February 14, 2019
- Updated on September 4, 2019
- 9343 Views
This document explains how to configure and deploy Arista MSS with Fortinet FortiGate firewalls (also called
- Written by Todor Nikolov
- Posted on February 27, 2018
- Updated on February 5, 2022
- 1103 Views
Support for asset tagging aids hardware identification by the use of user supplied strings. Fixed
- Written by Pranav Choudhary
- Posted on January 21, 2019
- Updated on June 22, 2021
- 7435 Views
BGP conditional route inject functionality is available with the ribd routing protocol model since EOS 4.21.0F
- Written by Jason Shamberger
- Posted on March 11, 2020
- Updated on November 14, 2024
- 15962 Views
EOS 4.21.3F introduces support for BGP Flowspec, as defined in RFC5575 and RFC7674. The typical use case is to filter or redirect DDoS traffic on edge routers.
- Written by Vivek Subbarao
- Posted on January 18, 2019
- Updated on February 14, 2022
- 8943 Views
This feature adds support for a dynamic configuration model to eliminate the need for the network administrator to
- Written by Gary McCarthy
- Posted on February 8, 2017
- Updated on October 13, 2021
- 7796 Views
The default policy behavior is to permit/accept all routes when a BGP neighbor or peer group is configured with a route
- Written by Saurav Arora
- Posted on January 18, 2019
- Updated on September 3, 2020
- 7654 Views
Neighbor default originate feature is used to advertise a default route to the neighbor (peer or peer group) even when
- Written by Manoj Agiwal
- Posted on September 30, 2015
- Updated on July 12, 2024
- 17522 Views
BGP Non Stop Forwarding (NSF) aims to minimize the traffic loss when the the following scenarios occur:
- Written by Gary McCarthy
- Posted on January 22, 2019
- Updated on February 5, 2022
- 6798 Views
BGP out delay is an existing feature in EOS where an optional delay could be applied prior to advertising a route. The
- Written by Andrew Li
- Posted on January 23, 2019
- Updated on July 19, 2024
- 7524 Views
The BGP Prefix Independent Convergence (PIC) Edge feature refers to fast re convergence of traffic destined for BGP
- Written by Shyam Kota
- Posted on January 21, 2019
- Updated on January 21, 2019
- 6022 Views
4.21.3F introduces support for Bidirectional PIM in the platforms listed below. The TOI for the support in earlier
- Written by Jifei Song
- Posted on January 21, 2019
- Updated on January 23, 2019
- 6882 Views
Starting from EOS 4.21.3F, license for feature BRCM STRATA SCHW TP, which stands for Broadcom Strata Single Chip
- Written by Shyam Kota
- Posted on January 21, 2019
- Updated on January 21, 2019
- 5789 Views
The CLI command “switchport dot1q vlan tag disallowed” disallows all the vlan tagged packets sent on L2
- Written by Alex Volinsky
- Posted on January 17, 2019
- Updated on January 23, 2019
- 6318 Views
DCS 7280SRM 40CX2 is a 1RU fixed system, which has two CFP2 ports (41 and 42), capable of hosting either CFP2 DCO, or
- Written by Dinu Chacko
- Posted on January 18, 2019
- Updated on January 18, 2019
- 6552 Views
If a network uses deep packet inspection for its ECMP, RFC7432 recommends deployments to use a control word in L2 EVPN
- Written by Ismaël Fezzaz
- Posted on January 18, 2019
- Updated on January 21, 2019
- 6268 Views
Log archiving is used to periodically (every minute) copy logs and core files from tmpfs filesystems /var/log and
- Written by Ronish Kalia
- Posted on January 21, 2019
- Updated on January 23, 2019
- 8669 Views
Explicit Congestion Notification (ECN) is an extension to the Internet Protocol and to the Transmission Control
- Written by Shyam Kota
- Posted on February 14, 2019
- Updated on February 14, 2019
- 8058 Views
ContainerTracer provides a composite view of the physical network topology and Kubernetes. Kubernetes and CVX must
- Written by Ronish Kalia
- Posted on January 21, 2019
- Updated on January 21, 2019
- 5865 Views
Headroom buffers are used to store packets when ingress admission control checks fail to store them in both the
- Written by Scott Smith
- Posted on January 22, 2019
- Updated on January 23, 2019
- 6114 Views
This is an addendum to the “IP in IP decapsulation” document.
- Written by Peter Rufer
- Posted on January 18, 2019
- Updated on January 18, 2019
- 6233 Views
This feature sets the default administrative status of physical Ethernet interfaces to
- Written by Kiranmayi Kasarapu
- Posted on February 8, 2017
- Updated on April 18, 2018
- 8350 Views
DirectFlow runs alongside the existing layer 2/3 forwarding plane, enabling a network architecture that
- Written by Emil Maric
- Posted on January 18, 2019
- Updated on January 23, 2019
- 6682 Views
On Algomatch platforms, expansions and encoding transformations on IP prefixes are performed before attempting to
- Written by Johnny Chen
- Posted on January 21, 2019
- Updated on January 21, 2019
- 6160 Views
This feature tracks the number of IPv4 unicast, IPv6 unicast and IPv4 multicast packets routed by each physical port.
- Written by Prasoon Saurav
- Posted on January 22, 2019
- Updated on January 22, 2019
- 6115 Views
The feature is close to Assured Forwarding Per Hop Behavior where the classification of the incoming packets is based
- Written by Michelle Wang
- Posted on January 18, 2019
- Updated on February 5, 2022
- 6761 Views
SWI Image Verification is a feature that allows one to determine if their SWI image has been tampered with. It verifies
- Written by Jeff Wen
- Posted on January 21, 2019
- Updated on November 30, 2023
- 9898 Views
In the traditional data center design, inter-subnet forwarding is provided by a centralized router, where traffic traverses across the network to a centralized routing node and back again to its final destination. In a large multi-tenant data center environment this operational model can lead to inefficient use of bandwidth and sub-optimal forwarding.
- Written by Alton Lo
- Posted on January 23, 2019
- Updated on January 23, 2019
- 15018 Views
“MLAG Domain Shared Router MAC” is a new mechanism to introduce a new router MAC to be used for MLAG TOR
- Written by Madhu Sudan
- Posted on February 14, 2019
- Updated on July 12, 2023
- 7211 Views
Many Layer 2 VXLAN deployments span more than one physical data center (DC) location. Typically, each DC has several
- Written by Gaofeng Yue
- Posted on January 23, 2019
- Updated on January 23, 2019
- 8643 Views
FIB compression allows us to program routes into the hardware more efficiently. Routes are programmed in the route
- Written by Jeff Chan
- Posted on January 18, 2019
- Updated on January 23, 2019
- 7596 Views
Until now, all PTP packets received on Arista switches with PTP boundary mode enabled will automatically be sent to
- Written by Ketan Kotak
- Posted on January 17, 2019
- Updated on September 5, 2019
- 7041 Views
All modern high density electronic circuit chips are susceptible to naturally occurring phenomenon called single
- Written by Ketan Kotak
- Posted on January 17, 2019
- Updated on August 28, 2019
- 7395 Views
Some of Arista’s products may use one or more FPGAs for certain tasks pertaining to controlling one or more of the
- Written by Prajul Sreedharan
- Posted on January 22, 2019
- Updated on November 7, 2024
- 8505 Views
This feature introduces the support for IPv4 ACL configuration under GRE and IPsec tunnel interfaces and IPv6 ACL configuration under GRE tunnel interfaces. The configured ACL rules are applied to a tunnel terminated GRE packet i.e. any IPv4/v6-over-GRE-over-IPv4 that is decapsulated by the GRE tunnel-interface on which the ACL is applied, or a packet terminated on IPsec tunnel i.e, IPv4-over-ESP-over-encrypted-IPv4 packet that is decapsulated and decrypted by the IPsec tunnel interface on which the ACL is applied.
- Written by Jonathan Kehler
- Posted on January 22, 2019
- Updated on October 19, 2021
- 6851 Views
This feature introduces the ability to match on 1) any BGP aggregate contributor or 2) a specific BGP aggregate’s
- Written by Adam Calabrigo
- Posted on January 18, 2019
- Updated on January 18, 2019
- 6060 Views
This feature enhances the feature limitation checking when performing Smart System Upgrade (SSU) and enables
- Written by Abhirami Shankar
- Posted on January 21, 2019
- Updated on February 5, 2022
- 14251 Views
This feature allows inter VRF route leaking locally from one VRF into another on the same device. Inter VRF routes can
- Written by Sriram Sellappa
- Posted on January 23, 2019
- Updated on April 21, 2021
- 7838 Views
IPv4 routes of certain prefix lengths can be optimized for enhanced route scale. The feature is described here. This
- Written by Saurav Sarkar
- Posted on January 23, 2019
- Updated on January 23, 2019
- 7580 Views
IPv4 routes of certain prefix lengths can be optimized for enhanced route scale on 7500R, 7280R, 7500R2 and 7280R2
- Written by Vivek Ilangovan
- Posted on January 18, 2019
- Updated on July 20, 2023
- 6697 Views
This feature implements RFC 5310 that allows IS-IS PDUs to be authenticated using following secure hash algorithms (SHA): SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512. The feature is supported in both default and non-default vrf. Unlike the existing authentication scheme based on MD5 and ClearText, with this feature two IS-IS nodes can be configured with different SHA algorithm and secret-key and can still exchange IS-IS PDUs.
- Written by Arnab Das
- Posted on January 22, 2019
- Updated on September 30, 2024
- 6584 Views
The ‘clear isis instance’ command can be used to reset the ISIS instance that is running. All ISIS instance and interface states will be cleared and re-initialized from the configuration so that ISIS rediscovers neighbors and reconverges the different instances in the ISIS routing tables.
- Written by Nikhil Goyal
- Posted on November 22, 2017
- Updated on December 23, 2021
- 6800 Views
IS IS Graceful Restart adds support for Restart Signaling for IS IS, IETF RFC 5306. When IS IS is used
- Written by Nikhil Goyal
- Posted on January 21, 2019
- Updated on January 21, 2019
- 6284 Views
This feature provides streaming of the IS IS Link State Database via TerminAttr. The IS IS LSDB is exported to Smash at
- Written by Kaverappa O. T.
- Posted on January 21, 2019
- Updated on January 23, 2019
- 5635 Views
The IS IS minimum remaining lifetime feature ensures that no matter what value of Remaining Lifetime is received, a
- Written by Shyam Kota
- Posted on January 22, 2019
- Updated on January 22, 2019
- 5819 Views
This feature introduces a configurable LSP refresh interval for originating ISIS LSPs. The default
- Written by Shyam Kota
- Posted on January 21, 2019
- Updated on January 21, 2019
- 5766 Views
Sub interface counters provide ability to count packets and bytes incoming and outgoing on L3 sub interfaces. This
- Written by Manuel Mendez
- Posted on September 30, 2019
- Updated on December 16, 2020
- 8264 Views
Subinterfaces divide a single ethernet or port channel interface into multiple logical L3 interfaces based on the
- Written by Shyam Kota
- Posted on January 21, 2019
- Updated on May 7, 2020
- 7333 Views
This feature enables MACsec service for non MACsec capable front panel ports. MACsec over front panel port is
- Written by Coy Humphrey
- Posted on January 21, 2019
- Updated on February 5, 2022
- 6662 Views
Explicit Congestion Notification (ECN) is an IP and TCP extension that facilitates end to end network congestion