- Written by Radu Handolescu
- Posted on October 14, 2021
- Updated on July 31, 2024
- 8722 Views
The 400GBASE ZRP (also known as ZR+) is a transceiver that follows the OpenZR+ MSA (Multi Source Agreement)
- Written by Sachin Subramanya
- Posted on September 1, 2021
- Updated on September 1, 2021
- 6644 Views
Starting with 4.26.2F the platform default traffic class (TC) to network qos will be configurable via a CLI. The
- Written by Tarun Jaswanth LNU
- Posted on August 24, 2020
- Updated on October 17, 2024
- 25980 Views
802.1X is an IEEE standard protocol that prevents unauthorized devices from gaining access to the network.
- Written by Qin Zhang
- Posted on May 21, 2019
- Updated on September 5, 2019
- 8657 Views
BGP Monitoring Protocol (BMP) allows a monitoring station to connect to a router and collect all of the BGP
- Written by Paulo Panhoto
- Posted on September 3, 2021
- Updated on September 3, 2021
- 7642 Views
The route reflector, as described in RFC 4456, is a router allowed to advertise (reflect) iBGP learned routes to other
- Written by Ayush Mittal
- Posted on September 6, 2021
- Updated on September 6, 2021
- 6200 Views
Routing changes in BGP can be caused by planned maintenance Operations. GRACEFUL SHUTDOWN community allows
- Written by Kumar Narayanan
- Posted on September 2, 2021
- Updated on September 2, 2021
- 7735 Views
Dynamic Path Selection (DPS) feature selects a path to deliver customer traffic to the destination that meets or
- Written by Promise Nnogharam
- Posted on April 16, 2024
- Updated on April 16, 2024
- 3056 Views
Routing control functions (RCF) is a new language, a different way of policy definition and application in a programmatic fashion (https://www.arista.com/en/support/toi/eos-4-27-2f/15102-routing-control-functions-language-and-configuration). EOS Application Programmable Interface (eAPI) is another means whereby commands are sent to the switch (i.e. aside from the switch’s command-line interface - CLI which has been the norm), which can be executed through various methods like web interface, shell or a program/script.
- Written by Emil Maric
- Posted on September 1, 2021
- Updated on September 1, 2021
- 7024 Views
In order for forwarding equivalence classes (FECs) to get programmed in the ASIC, they must have some form of a
- Written by Edwin Tambi
- Posted on August 19, 2020
- Updated on July 3, 2024
- 20220 Views
EOS supports the ability to match on a single VLAN tag (example: encapsulation dot1q vlan 10) or a VLAN tag pair (example: encapsulation dot1q vlan 10 inner 20) to map matching packets to an interface. In this case, the encapsulation string is considered consumed by the mapped interface before forwarding, which means that the tags are effectively removed from the incoming packet for the purposes of any downstream forwarding.
- Written by Sudheer Y R
- Posted on October 9, 2018
- Updated on December 5, 2023
- 19166 Views
This feature introduces the hardware forwarding support for IPv4 over IPv4, GRE-Tunnel interfaces on Arista Switches. A GRE-Tunnel interface acts as a logical interface which performs the GRE encapsulation or decapsulation.
- Written by Thomas Altenburger
- Posted on January 20, 2022
- Updated on August 27, 2024
- 8989 Views
NAT (Network Address Translation) is a feature that allows each packet's addresses to be rewritten according to the user configuration. The packet qualification happens within the ingress pipeline of the forwarding plane, then the egress pipeline uses a shared table memory to decide which fields to adapt.
- Written by Padmanabh Ratnakar
- Posted on October 7, 2021
- Updated on October 14, 2024
- 12444 Views
For network monitoring and troubleshooting flow related issues, it is desirable to know the path, latency, queue and congestion information for flows at different times. The inband telemetry feature(INT), based on Inband Flow Analyzer RFC draft -IFA 2.0 and IFA 1.0(on some platforms) , is used to gather per flow telemetry information like path, per hop latency and congestion. INT is supported for both IPv4 and IPv6 traffic.
- Written by Ramakrishnan G
- Posted on September 6, 2021
- Updated on March 16, 2023
- 6682 Views
IPv6 routes of certain prefix lengths can be optimized for enhanced route scale on R3. This TOI explains the usage of these optimizations.
- Written by Prakrati Vidyarthi
- Posted on August 16, 2018
- Updated on November 5, 2024
- 15296 Views
Normally, a switch traps L2 protocol frames to the CPU. However, certain use-cases may require these frames to be forwarded or dropped. And in cases where the L2 protocol frames are forwarded (eg: Pseudowire), we may require the frames to be trapped to the CPU or dropped. The L2 Protocol Forwarding feature provides a mechanism to control the behavior of L2 protocol frames received on a port or subinterface.
- Written by Sean Hope
- Posted on May 8, 2020
- Updated on September 21, 2021
- 8444 Views
MAP T is a double stateless NAT64 translation technology. It allows an internet service provider to share IPv4
- Written by Nanda Kurella
- Posted on September 5, 2021
- Updated on September 17, 2021
- 5801 Views
This feature allows classification of packets based on the inner CoS value in a double tagged packet.
- Written by Arup Raton Roy
- Posted on September 7, 2021
- Updated on September 21, 2021
- 7657 Views
Macro Segmentation Service with Layer 3 firewall (MSS FW) enforces all security policies bi directionally by
- Written by Suresh Nalagatla
- Posted on September 16, 2021
- Updated on September 21, 2021
- 10063 Views
Multicast EVPN IRB solution allows for the delivery of customer BUM (Broadcast, Unknown unicast and Multicast)
- Written by Nicholas Cheng
- Posted on September 2, 2021
- Updated on September 2, 2021
- 6817 Views
A router keeps track of the total number of LSAs for each OSPFv3 instance. The LSA Limit feature provides a mechanism to
- Written by Ethan Vadai
- Posted on March 6, 2020
- Updated on March 14, 2024
- 17008 Views
Policy-based routing (PBR) is a feature that is applied on routable ports, to preferentially route packets. Forwarding is based on a policy that is enforced at the ingress of the applied interface and overrides normal routing decisions. In addition to matches on regular ACLs, PBR policy-maps can also include “raw match” statements that look like a single entry of an ACL as a convenience for users.
- Written by Padmanabh Ratnakar
- Posted on April 20, 2021
- Updated on July 15, 2024
- 13601 Views
The postcard telemetry (GreenT - GRE Encapsulated Telemetry) feature is used to gather per flow telemetry information like path and per hop latency. For network monitoring and troubleshooting flow related issues, it is desirable to know the path, latency and congestion information for flows at different times.
- Written by Shyam Kota
- Posted on September 2, 2021
- Updated on September 2, 2021
- 6715 Views
Line cards, fabric cards, and switch cards now alert the user whenever a card consumes excessive power. There are
- Written by Rohit Maurya
- Posted on June 21, 2021
- Updated on July 13, 2022
- 13645 Views
Private VLAN is a feature that segregates a regular VLAN broadcast domain while maintaining all ports in the same IP
- Written by Prakhar Rastogi
- Posted on September 2, 2021
- Updated on January 10, 2023
- 8133 Views
RADIUS over TLS provides secure and reliable transport for RADIUS clients. RADIUS over TLS allows RADIUS
- Written by Martin Stigge
- Posted on September 16, 2020
- Updated on January 11, 2022
- 9123 Views
RSVP TE, the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), is used to distribute MPLS labels
- Written by Joel Katticaran
- Posted on September 1, 2021
- Updated on November 10, 2021
- 6926 Views
This feature extends the existing functionality to set explicit next hop addresses for vpn ipv4 and vpn ipv6 routes.
- Written by Augusto Wong
- Posted on September 1, 2021
- Updated on September 1, 2021
- 7248 Views
This feature adds a SNMP CLI knob to allow an interface’s speed, as shown in IF MIB, to reflect its shaped bandwidth.
- Written by John Foley
- Posted on January 20, 2022
- Updated on January 20, 2022
- 6493 Views
Starting with 4.26.2F it is possible to assign costs to Shared Risk Link Groups (SRLGs) which will be taken into
- Written by Venkata Kishore Madhbhaktula
- Posted on September 1, 2021
- Updated on February 22, 2024
- 8594 Views
This TOI describes details and limitations of Stateful Switchover on Modular chassis with 7500R3, 7800R3, 7800R3A based line cards.
- Written by Joshua Portelance
- Posted on September 6, 2021
- Updated on January 24, 2022
- 6671 Views
Sub second switchcard failover is a redundancy mode available on systems with two switchcards. One switchcard is the
- Written by Eamon Doyle
- Posted on September 3, 2021
- Updated on September 5, 2021
- 6377 Views
BGP address aggregation was previously only supported for IPv4 and IPv6 unicast address families. Equivalent BGP
- Written by Corentin Le Bigot
- Posted on September 5, 2021
- Updated on August 29, 2024
- 7144 Views
Hardware accelerated NAT for transit fragmented traffic is enabled by default. It’s important to note that
- Written by Nik Zaborovskii
- Posted on December 8, 2020
- Updated on August 29, 2024
- 9894 Views
Multicast NAT is a feature that performs NAT translations on multicast traffic. It can be configured under SVIs,
- Written by Zhen Xue
- Posted on September 2, 2021
- Updated on July 19, 2023
- 9543 Views
From the Precision Time Protocol (PTP) perspective, Multi Chassis Link Aggregation (MLAG) peers are two physical
- Written by Bidong Chen
- Posted on September 7, 2021
- Updated on March 12, 2024
- 8953 Views
This feature extends the capabilities of Tap Aggregation traffic steering to allow for using traffic policies.
- Written by Muhammad Yousuf
- Posted on September 9, 2021
- Updated on February 27, 2024
- 8824 Views
This TOI supplements the Ingress Traffic Policy applied on ingress interfaces. Please refer to that document for a description of Traffic Policies and field-sets. This TOI explains the Traffic Policies as applied in the egress direction on interfaces
- Written by Prateek Mali
- Posted on August 19, 2020
- Updated on November 14, 2024
- 20910 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Travis Hammond
- Posted on September 21, 2021
- Updated on September 8, 2023
- 10488 Views
Timestamping is an important tool for network engineering and performance analysis. The timestamp can be applied to a packet as either an inserted header or replacing the source MAC address of the original packet. Timestamps are recorded on ingress and applied on egress.
- Written by Radu Handolescu
- Posted on September 17, 2021
- Updated on September 17, 2021
- 7482 Views
Common Management Interface Specification (CMIS) compliant transceivers are configured by selecting an
- Written by Lavanya Conjeevaram
- Posted on September 11, 2017
- Updated on September 7, 2021
- 8920 Views
Unidirectional links is a feature that configures an Ethernet interface transmit and receive paths to be
- Written by Simon Liang
- Posted on September 5, 2021
- Updated on October 18, 2024
- 9105 Views
This document describes the VRF selection policy and VRF fallback feature. A VRF selection policy contains match rules that specify certain criteria (e.g. DSCP, IP protocol) as well as a resulting action to select a VRF in which to do the FIB lookup. The VRF fallback feature is an extension of these policies which allows users to optionally specify a “fallback” VRF for each VRF. The behavior is such that if the FIB lookup fails in a match rule’s selected VRF, another lookup will be attempted in the configured fallback VRF. Additionally, the fallback VRF itself can have yet another fallback VRF, such that if the lookup in the VRF and fallback VRF fail, the fallback-of-the-fallback VRF will be looked up (see the Configuration section for an example of this).
- Written by Terence Hui
- Posted on September 1, 2021
- Updated on July 14, 2022
- 7579 Views
Current VXLAN decapsulation logic requires the following hits on affected switches listed in the following