- Written by Tula Kraiser
- Posted on January 3, 2021
- Updated on June 24, 2022
- 7696 Views
The primary challenge with using a switching ASIC as a load balancer has been how to deal with changes in the network topology without disrupting existing TCP connections.
- Written by Tarun Jaswanth LNU
- Posted on August 24, 2020
- Updated on October 17, 2024
- 26200 Views
802.1X is an IEEE standard protocol that prevents unauthorized devices from gaining access to the network.
- Written by Michael (Mike) Fink
- Posted on December 22, 2017
- Updated on December 2, 2024
- 14191 Views
Filtered Mirroring allows certain packets to be selected for mirroring, rather than all packets ingressing or egressing a particular port.
- Written by Sandeep Betha
- Posted on January 22, 2021
- Updated on February 6, 2022
- 11484 Views
This feature adds support for user configured BGP Nexthop Resolution RIB profiles for various BGP based services
- Written by Jason Shamberger
- Posted on April 20, 2020
- Updated on February 19, 2024
- 10890 Views
RPKI provides a mechanism to validate the originating AS of an advertised prefix.
- Written by Athish Rao
- Posted on April 8, 2021
- Updated on April 8, 2021
- 6699 Views
Currently, there is a global knob for configuring the preference of all SR TE policies, that affects the comparison
- Written by Digvijay Gahlot
- Posted on December 24, 2021
- Updated on December 24, 2021
- 7745 Views
Configurable Voq Tail Drop Thresholds provides flexibility to change default voq tail drop based on speed of the
- Written by Richard Zhang
- Posted on December 22, 2020
- Updated on December 22, 2020
- 8557 Views
EOS DHCP relay agent forwards all the DHCP requests from the clients using the primary IP address of the interface as
- Written by Leandro Penz
- Posted on December 22, 2020
- Updated on December 22, 2020
- 6478 Views
Dot1x Web authentication feature authenticates a supplicant via a web page, generally referred to as a captive
- Written by Sourabh Bollapragada
- Posted on December 22, 2020
- Updated on January 29, 2024
- 8399 Views
This feature supports counting ECN-marked packets (ECN = Explicit Congestion Notification) on a per egress port per tx-queue basis. The feature can be used to gather these packet counts via CLI or SNMP. There are two cases when an ECN-marked (congestion) packet is counted on the egress port/queue:
- Written by Sridhar Nagarajan
- Posted on December 14, 2020
- Updated on December 14, 2020
- 7536 Views
This feature provides the capability to count the number of packets hitting rules associated with egress ACLs
- Written by Vamsi Anne
- Posted on December 16, 2020
- Updated on December 16, 2020
- 8964 Views
Egress Sflow sampling feature allows to sample unicast packets based on the egress interface. The
- Written by AKSHAYA Sridharan
- Posted on December 17, 2020
- Updated on June 30, 2022
- 8156 Views
Egress traffic-policing can be applied on L3 Ethernet subinterfaces for outbound traffic.
- Written by Rahul Kumar Singh
- Posted on December 14, 2020
- Updated on December 14, 2020
- 6588 Views
From 4.25.1F, Dot1x Modes to MBA Hosts is supported.With this feature enabled MBA hosts will be considered for Dot1x
- Written by Jeff Wen
- Posted on January 21, 2019
- Updated on November 30, 2023
- 10060 Views
In the traditional data center design, inter-subnet forwarding is provided by a centralized router, where traffic traverses across the network to a centralized routing node and back again to its final destination. In a large multi-tenant data center environment this operational model can lead to inefficient use of bandwidth and sub-optimal forwarding.
- Written by Alton Lo
- Posted on June 14, 2019
- Updated on October 7, 2019
- 9231 Views
Starting with EOS release 4.22.0F, the EVPN VXLAN L3 Gateway using EVPN IRB supports routing traffic from IPV6 host to
- Written by Shyam Kota
- Posted on June 13, 2019
- Updated on October 19, 2021
- 8918 Views
Fair Adaptive Dynamic Thresholds (FADT) provides efficient allocation of shared packet buffer resources amongst
- Written by Rahul Vasist
- Posted on April 20, 2020
- Updated on January 29, 2024
- 9407 Views
EOS-4.24.0 adds support for hardware-accelerated sFlow on R3 systems. Without hardware acceleration, all sFlow processing is done in software, which means performance is heavily dependent on the capabilities of the host CPU. Aggressive sampling rates also decrease the amount of processing time available for other EOS applications.
- Written by Sourav Basu
- Posted on December 9, 2020
- Updated on July 12, 2023
- 17293 Views
In VXLAN networks, broadcast DHCP requests are head-end-replicated to all VXLAN tunnel endpoints (VTEP). If a DHCP relay helper address is configured on more than one VTEP, each such VTEP relays the DHCP request to the configured DHCP server. This could potentially overwhelm the DHCP server as it would receive multiple copies of broadcast packets originated from a host connected to one of the VTEPs.
- Written by Arpit Bansal
- Posted on December 21, 2020
- Updated on January 17, 2022
- 8363 Views
IGP shortcuts enable traffic to get forwarded along traffic engineered paths computed by RSVP using a modified SPF
- Written by Neel Neogi
- Posted on December 30, 2020
- Updated on June 8, 2023
- 12404 Views
The document describes the support for dedicated and group ingress policing on interfaces without using QoS policy-maps to match on the traffic and apply policing.
- Written by Pratik Mangalore
- Posted on December 14, 2020
- Updated on November 13, 2024
- 12438 Views
IP Locking is an EOS feature configured on an Ethernet Layer 2 port. When enabled, it ensures that a port will only permit IP and ARP packets with IP source addresses that have been authorized. As of EOS-4.25.0F release update, IP Locking can run in two modes - IPv4 Locking (which will be referred to as IP Locking) and IPv6 Locking, which can be configured using the commands mentioned in the below sections. IP Locking prevents another host on a different interface from claiming ownership of an IP address through either IP or ARP spoofing.
- Written by Tony Li
- Posted on December 22, 2020
- Updated on December 22, 2020
- 7738 Views
IS IS area proxy allows the creation of more scalable networks. IS IS already has hierarchical mechanisms for
- Written by Athichart Tangpong
- Posted on October 22, 2018
- Updated on October 1, 2024
- 13748 Views
A L2 sub-interface is a logical bridging endpoint associated with traffic on an interface distinguished by 802.1Q tags, where each <interface, 802.1q tag> tuple is treated as a first class bridging interface.
- Written by Vijay Mahadevan
- Posted on April 18, 2018
- Updated on December 8, 2020
- 12124 Views
The L2EVPN MPLS feature is available when configuring BGP in the multi agent routing protocol model. Ethernet VPN
- Written by Isidor Kouvelas
- Posted on December 22, 2017
- Updated on December 9, 2020
- 8226 Views
This feature is available when configuring BGP in the multi agent routing protocol model. Ethernet
- Written by Manuel Mendez
- Posted on September 30, 2019
- Updated on December 16, 2020
- 8368 Views
Subinterfaces divide a single ethernet or port channel interface into multiple logical L3 interfaces based on the
- Written by Nathan Wolfe
- Posted on February 15, 2018
- Updated on November 7, 2024
- 12020 Views
Introduced in EOS-4.20.1F, “selectable hashing fields” feature controls whether a certain header’s field is used in the hash calculation for LAG and ECMP.
- Written by Bharathram Pattabhiraman
- Posted on February 11, 2021
- Updated on June 15, 2022
- 15617 Views
This solution allows the delivery of customer BUM (Broadcast, Unknown unicast and Multicast) traffic in a VLAN using
- Written by Jeff Hornsberger
- Posted on December 16, 2020
- Updated on April 19, 2022
- 8343 Views
LSPs formed by LDP normally follow IGP routing. The LDP speaker selects the downstream LSR for a particular prefix as
- Written by Pedro Coutinho
- Posted on December 22, 2020
- Updated on October 10, 2022
- 11249 Views
The LDP pseudowire feature provides support for emulating Ethernet connections over a Multiprotocol Label
- Written by Bin Wang
- Posted on December 22, 2020
- Updated on December 22, 2020
- 7569 Views
For various peering applications, there is a need to support the assignment of a MAC address on routed interfaces.
- Written by Arup Raton Roy
- Posted on December 22, 2020
- Updated on January 6, 2021
- 8321 Views
This document presents how Arista Macro Segmentation Service (MSS) can be deployed in a brownfield environment with
- Written by Megha Sinha
- Posted on October 9, 2018
- Updated on December 9, 2020
- 8357 Views
If MACsec is enabled on an interface, it tries to establish MACsec Key Agreement (MKA) session(s) with its peer.
- Written by Phillip Jie
- Posted on November 10, 2020
- Updated on October 30, 2024
- 7975 Views
MRU (maximum receive unit) enforcement provides the ability to drop frames that exceed a configured threshold on the ingress interface.
- Written by Swati Patel
- Posted on February 11, 2021
- Updated on October 22, 2024
- 12721 Views
[L2 EVPN] and [Multicast EVPN IRB] solutions allow for the delivery of customer BUM (Broadcast, Unknown unicast
- Written by Bharathram Pattabhiraman
- Posted on February 11, 2021
- Updated on September 21, 2023
- 25155 Views
This solution allows delivery of multicast traffic in an IP VRF using multicast in the underlay network. It builds on
- Written by Aparna Karanjkar
- Posted on June 17, 2019
- Updated on May 3, 2024
- 9852 Views
EOS supports reading and streaming various OpenConfig configuration and state models over gNMI (gRPC Network Management Interface), RESTCONF, and NETCONF transports. A subset of the configuration models may also be modified over these transports
- Written by Hind Kishore Geel
- Posted on December 22, 2020
- Updated on February 5, 2022
- 8426 Views
This feature introduces the support for OSPF routes over GRE tunnels under default as well as non default VRFs. The
- Written by Tanushree Bansal
- Posted on February 23, 2022
- Updated on June 2, 2022
- 7082 Views
This feature provides isolation and allows segregating/dividing the link state database based on interface.
- Written by Rahul Kumar Singh
- Posted on November 7, 2019
- Updated on December 27, 2021
- 7965 Views
In campus network deployments, classification of the devices connected to a switch port is required. Based on the
- Written by Petr Budnik
- Posted on December 16, 2020
- Updated on June 23, 2022
- 8100 Views
ITU-T G8275.1 is a PTP profile defined by ITU-T for telecommunication applications. It defines a set of functions from the IEEE 1588 to achieve phase/time synchronization with full timing support from the network (meaning, all of the network devices support PTP).
- Written by Shifeng Jin
- Posted on December 7, 2020
- Updated on December 9, 2020
- 7993 Views
Since the introduction of PTP Monitoring feature[1], PTP is capable of recording recent metrics for offset from
- Written by Sulyab Thottungal Valapu
- Posted on December 7, 2020
- Updated on December 9, 2020
- 7656 Views
This document describes the feature that allows the redistribution of VRF leaked BGP routes into OSPFv2 and OSPFv3.
- Written by Ram Prasad
- Posted on October 22, 2018
- Updated on October 19, 2021
- 10354 Views
This feature allows a Service Provider (SP) or an Enterprise to provide the service of interconnecting
- Written by Paulo Panhoto
- Posted on December 15, 2020
- Updated on August 19, 2021
- 7814 Views
This is an extension to BGP MPLS VPNs that allows us to use iBGP as the PE CE protocol. This feature also provides a way to
- Written by Nikhil Satish Pai
- Posted on December 7, 2020
- Updated on December 9, 2020
- 7094 Views
This feature adds support for the match ospf instance <instanceID> clause under the route map config.
- Written by Eamon Doyle
- Posted on December 15, 2020
- Updated on March 15, 2024
- 9857 Views
In a Service Provider (SP) network, a Provider Edge (PE) device learns virtual private network (VPN) paths from remote PEs and uses the Route Target (RT) extended communities carried by those paths to determine which customer Virtual Routing and Forwarding (VRF) the paths should be imported into (from where they can be subsequently advertised to Customer Edge (CE) devices).
- Written by Kalash Nainwal
- Posted on December 14, 2020
- Updated on July 31, 2024
- 12359 Views
RSVP-TE, the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), is used to distribute MPLS labels for steering traffic and reserving bandwidth. The Label Edge Router (LER) feature implements the headend functionality, i.e., RSVP-TE tunnels can originate at an LER which can steer traffic into the tunnel.
- Written by Gaofeng Yue
- Posted on June 3, 2020
- Updated on December 9, 2021
- 7263 Views
This feature introduces a metric for static routes so that the user can configure both administrative distance and