- Written by Manoj Agiwal
- Posted on 9月 30, 2015
- Updated on 7月 12, 2024
- 17524 Views
BGP Non Stop Forwarding (NSF) aims to minimize the traffic loss when the the following scenarios occur:
- Written by Jeff Wen
- Posted on 1月 21, 2019
- Updated on 11月 30, 2023
- 9898 Views
In the traditional data center design, inter-subnet forwarding is provided by a centralized router, where traffic traverses across the network to a centralized routing node and back again to its final destination. In a large multi-tenant data center environment this operational model can lead to inefficient use of bandwidth and sub-optimal forwarding.
- Written by Prajul Sreedharan
- Posted on 1月 22, 2019
- Updated on 11月 7, 2024
- 8508 Views
This feature introduces the support for IPv4 ACL configuration under GRE and IPsec tunnel interfaces and IPv6 ACL configuration under GRE tunnel interfaces. The configured ACL rules are applied to a tunnel terminated GRE packet i.e. any IPv4/v6-over-GRE-over-IPv4 that is decapsulated by the GRE tunnel-interface on which the ACL is applied, or a packet terminated on IPsec tunnel i.e, IPv4-over-ESP-over-encrypted-IPv4 packet that is decapsulated and decrypted by the IPsec tunnel interface on which the ACL is applied.
- Written by Jonathan Kehler
- Posted on 1月 22, 2019
- Updated on 10月 19, 2021
- 6851 Views
This feature introduces the ability to match on 1) any BGP aggregate contributor or 2) a specific BGP aggregate’s
- Written by Vivek Ilangovan
- Posted on 1月 18, 2019
- Updated on 7月 20, 2023
- 6698 Views
This feature implements RFC 5310 that allows IS-IS PDUs to be authenticated using following secure hash algorithms (SHA): SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512. The feature is supported in both default and non-default vrf. Unlike the existing authentication scheme based on MD5 and ClearText, with this feature two IS-IS nodes can be configured with different SHA algorithm and secret-key and can still exchange IS-IS PDUs.
- Written by Arnab Das
- Posted on 1月 22, 2019
- Updated on 9月 30, 2024
- 6584 Views
The ‘clear isis instance’ command can be used to reset the ISIS instance that is running. All ISIS instance and interface states will be cleared and re-initialized from the configuration so that ISIS rediscovers neighbors and reconverges the different instances in the ISIS routing tables.
- Written by Ravi Teja Guthikonda
- Posted on 1月 21, 2019
- Updated on 5月 20, 2024
- 5579 Views
Time stamping is an important tool for network engineering and performance analysis. EOS-4.21.3F adds support for payload timestamping of all GRE encapsulated mirrored packets at line rate (initially only supported on the 7500R/7280R/7500R2/7280R2 series). A timestamp is taken on ingress and inserted into the GRE encapsulated mirrored packet payload at egress.
- Written by Vincent Lam
- Posted on 1月 18, 2019
- Updated on 3月 22, 2024
- 13583 Views
In conventional VXLAN deployments, each MLAG pair of switches are represented as a common logical VTEP. VXLAN traffic can be decapsulated on either switch. In some networks, there are hosts that are singly connected to one of the MLAG pair.
- Written by Kallol Mandal
- Posted on 1月 17, 2019
- Updated on 10月 9, 2024
- 8029 Views
Selective ARP install is the selective programming of remote ARPs in hardware as received through EVPN Type 2 MAC-IP routes in an EVPN VXLAN/ MPLS Integrated Routing and Bridging (IRB) scenario. Instead of installing every MAC+IP binding received from EVPN into the hardware, the switch installs them only when there is routed traffic destined to the IP, thereby saving TCAM space on the switch. However, there is a tradeoff as there is an initial one-time latency to install the hardware TCAM entry on the first flow of routed traffic to the IP.
- Written by Shyam Kota
- Posted on 1月 22, 2019
- Updated on 1月 22, 2019
- 6330 Views
RIB Route Control is a collection of mechanisms for controlling how IP routing table entries get used. Next hop
- Written by Michael Chin
- Posted on 1月 18, 2019
- Updated on 9月 15, 2023
- 9160 Views
The ‘show interfaces interactions’ command aims to provide users a resource that explains various relationships between ethernet interfaces. It describes interactions in which a configuration on an interface causes another set of interfaces to become inactive or have reduced capabilities.Examples include a primary interface consuming subordinate interfaces to service a four-lane speed or platform restrictions that require four interfaces of a port to operate at the same speed.
- Written by Max Xiao
- Posted on 1月 18, 2019
- Updated on 6月 7, 2024
- 5559 Views
This feature enables support for hardware accelerated sFlow while running in Tap Aggregation exclusive mode. This