- Written by Gaofeng Yue
- Posted on June 15, 2022
- Updated on June 16, 2022
- 5210 Views
This feature adds support for redistributing EOS SDK routes into IS-IS in the multi-agent routing protocol model. This feature existed in the single agent model by the configuration of redistribute static since EosSdk routes are treated as static routes in the single agent model.
- Written by Prateek Mali
- Posted on August 19, 2020
- Updated on November 14, 2024
- 20924 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Abhiram Kalluru
- Posted on June 16, 2022
- Updated on June 17, 2022
- 5611 Views
This feature allows LFIB (Label Forwarding Information Base) & associated counters export through OpenConfig mpls AFT (Abstract Forwarding Tree) YANG model.
- Written by Vallela Kaushik Shashank Reddy
- Posted on June 20, 2022
- Updated on June 29, 2022
- 3219 Views
This feature enables the support of applying a policy-map in egress direction on an SVI interface. A policy-map is a QoS feature in which we have multiple class-maps each with a match criteria and an action. These class-maps match on the given criteria and the configured action is applied on the traffic which matches. We can apply these policy-maps on interfaces in both input and output directions which match on ingress and egress traffic respectively. This feature adds the support of applying such output policy-map on an SVI( Switch Virtual Interface ).
- Written by Alon Pekurovsky
- Posted on March 5, 2020
- Updated on June 16, 2022
- 9188 Views
A secure erase is generally defined as a command (or set of commands) that deliberately, permanently and
- Written by Charlotte Fedderly
- Posted on June 20, 2022
- Updated on July 19, 2024
- 6167 Views
Synchronous Ethernet (SyncE) provides support for frequency synchronization over Ethernet between devices traceable to an external frequency reference, like a primary reference clock, as specified in ITU G.8261.
- Written by Tegar Wicaksono
- Posted on June 20, 2022
- Updated on June 9, 2023
- 5444 Views
This feature provides support for packet counters for Tap Aggregation on default forwarding, GRE tunnel termination, traffic steering based on policy map and traffic steering based on traffic policy (Aegis). For brevity, counters for policy-map traffic steering will be referred to as policy-map counters, and counters for traffic-policy traffic steering will be referred to as traffic-policy counters.
- Written by Vipul Shah
- Posted on August 27, 2019
- Updated on November 23, 2023
- 7232 Views
BGP routing information often contains more than one path to the same destination network. The BGP best-path selection algorithm determines which of these paths should be considered as the best path to that network.
- Written by Victoria Austin
- Posted on June 15, 2022
- Updated on June 16, 2022
- 2839 Views
Common Management Interface Specification (CMIS) compliant transceivers are complex and can have many points of failure. Previously one had to look through transceiver agent logs to determine if a transceiver had any firmware, SMBus, or timeout errors.
- Written by Bharadwaj Gosukonda
- Posted on June 20, 2022
- Updated on February 15, 2024
- 6441 Views
Unicast Reverse Path Forwarding (uRPF) can help limit malicious IPv4/IPv6 traffic on a network. uRPF works by enabling the router to verify reachability (routing) of the source IP address (SIP) in the packet being forwarded. If the SIP is determined to be an invalid address, the packet is dropped.
- Written by Jialong Chen
- Posted on December 17, 2021
- Updated on April 4, 2024
- 8026 Views
This feature expands Multi Domain EVPN VXLAN to support an Anycast Gateway model as the mechanism for gateway
- Written by Isidor Kouvelas
- Posted on February 28, 2022
- Updated on July 29, 2024
- 14514 Views
Virtual Private LAN Service (VPLS) appears in (almost) all respects as an Ethernet type service to customers of a Service Provider (SP). A VPLS glues together several individual LANs across a packet switched network to appear and function as a single bridged LAN. This is accomplished by incorporating MAC address learning, flooding, and forwarding functions in the context of pseudowires that connect these individual LANs across the packet switched network. LDP signaling is used for the setup and teardown of the mesh of pseudowires that constitute a given VPLS instance.
- Written by Aurora Desmarais
- Posted on June 20, 2022
- Updated on July 9, 2024
- 7526 Views
This feature allows traffic ingressing a VLAN to be mirrored. It mirrors based on the VLAN tag in the Ethernet header, so it is not port based.