- Written by Sambath Kumar Balasubramanian
- Posted on 12月 20, 2024
- Updated on 1月 17, 2025
- 429 Views
EOS provides support for the use of IPsec to establish and maintain IPsec tunnels. This feature adds support for redirecting traffic matching on traffic policy rules to an IPSec tunnel.
- Written by Tarun Jaswanth LNU
- Posted on 8月 24, 2020
- Updated on 1月 6, 2025
- 27521 Views
802.1X is an IEEE standard protocol that prevents unauthorized devices from gaining access to the network.
- Written by Subhash S
- Posted on 7月 2, 2024
- Updated on 12月 23, 2024
- 1942 Views
This feature adds support for associating a WAN interface with multiple Dynamic Path Selection (DPS) path groups to allow paths originating from the same interface to have different priorities.
- Written by Nandan Saha
- Posted on 8月 24, 2020
- Updated on 1月 8, 2025
- 11973 Views
The BGP-LS extension allows IGPs (OSPF/IS-IS) link state database information to be injected into BGP. This is typically used in deployments where some external component, (like a controller or Path Computation Engine) can do centralized path computations by learning the entire IGP topology through BGP-LS. The controller can then communicate the computed paths based on the BGP-LS updates to the head end device in the network. The mechanism used by the controller to communicate the computed TE paths is outside the scope of this document. Using BGP-LS instead of an IGP peering with the controller to distribute IGP link state information has the following advantages.
- Written by Yaonan Liang
- Posted on 12月 24, 2024
- Updated on 12月 24, 2024
- 278 Views
BGP Monitoring Protocol (BMP) allows a monitoring station to connect to a router and collect all of the BGP announcements received from the router’s BGP peers. The announcements are sent to the station in the form of BMP Route Monitoring messages generated from path information in the router’s BGP internal tables. A BMP speaker may choose to send either Adj-Rib-In routes, or Loc-Rib routes (as defined by RFC9069), or both.
- Written by Bill Terrell
- Posted on 12月 24, 2024
- Updated on 12月 24, 2024
- 271 Views
On 7280R/R2, "Configurable TPID" enables a TPID to be configured per switchport (default TPID on switchport is 0x8100). A packet is considered tagged (both from ingress and egress point of view) on an interface if and only if TPID of the outermost VLAN tag on the packet matches the TPID configured on the interface. Up to 3 distinct (non-default) TPID values may be recognized per chip.
- Written by Vikas Hegde
- Posted on 11月 22, 2017
- Updated on 12月 23, 2024
- 18270 Views
Connectivity Monitor is an EOS feature that allows users to monitor their network resources from their Arista switches. The resources being monitored may or may not be Arista devices. Connectivity monitoring is unidirectional in nature.
- Written by Ming Han
- Posted on 12月 24, 2024
- Updated on 12月 24, 2024
- 292 Views
This document describes the configuration and behavior of physical interfaces on the DCS-7060CX5 series switch including:
- Written by Fathima Thasneem
- Posted on 4月 25, 2022
- Updated on 12月 23, 2024
- 7868 Views
As Ethernet technologies made their way into the Metropolitan Area Networks ( MAN ) and the Wide Area Networks ( WAN ), from the conventional enterprise level usage, they are now widely being used by service providers to provide end-to-end connectivity to customers. Such service provider networks are typically spread across large geographical areas. Additionally, the service providers themselves may be relying on certain internet backbone providers, referred to as “operators”, to provide connectivity in case the geographical area to be covered is too huge.
- Written by Augusto Wong
- Posted on 2月 17, 2021
- Updated on 12月 20, 2024
- 11898 Views
DHCP Relay feature forwards DHCP packets between client and server when the DHCP Server is not in the same broadcast domain as the client. DHCP Relay should be configured on the gateway interface (SVI/ L3 interface ) for the clients.
- Written by Anthony
- Posted on 12月 24, 2024
- Updated on 12月 24, 2024
- 279 Views
Dynamic Explicit Congestion Notification (D-ECN) configures an ECN marking threshold that changes dynamically based on a transmit queue’s available shared buffers. A D-ECN offset and D-ECN floor is configured per unicast transmit queue which defines how the ECN marking threshold will change as the queue’s shared buffer limit changes.
- Written by Can Sun
- Posted on 12月 20, 2024
- Updated on 12月 20, 2024
- 302 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Dylan Walsh
- Posted on 10月 20, 2022
- Updated on 12月 20, 2024
- 7955 Views
EosSdkRpc is an agent built on top of the Arista EOS SDK. It uses gRPC as a mechanism to provide remote access to the EOS SDK. The gRPC interface that EosSdkRpc supports closely matches the interface provided by EOS SDK, and the intent is that the .proto interface can be publicly supported. EosSdkRpc allows for remote access and using protobuf to specify the interface isolates user code from the Linux ABI issues that come with building C++ applications on different compiler, libc, and kernel versions. EosSdkRpc is built using C++ but supports clients written in any of the languages currently supported by the gRPC framework.
- Written by Vamsi Anne
- Posted on 12月 29, 2021
- Updated on 12月 23, 2024
- 10983 Views
As Ethernet technologies made their way into the Metropolitan Area Networks (MAN) and the Wide Area Networks (WAN), from the conventional enterprise level usage, they are now widely being used by service providers to provide end-to-end connectivity to customers. Such service provider networks are typically spread across large geographical areas. Additionally, the service providers themselves may be relying on certain internet backbone providers, referred to as “operators”, to provide connectivity in case the geographical area to be covered is too huge. This mode of operation makes the task of Operations, Administration and Maintenance (OAM) of such networks to be far more challenging, and the ability of service providers to respond to such network faults swiftly directly impacts their competitiveness.
- Written by Vamsi Anne
- Posted on 10月 20, 2022
- Updated on 12月 30, 2024
- 8242 Views
As Ethernet technologies made their way into the Metropolitan Area Networks (MAN) and the Wide Area Networks (WAN) from the conventional enterprise level usage, they are now widely being used by service providers to provide end-to-end connectivity to customers. Such service provider networks are typically spread across large geographical areas. Additionally, the service providers themselves may be relying on certain internet backbone providers, referred to as “operators”, to provide connectivity in case the geographical area to be covered is too huge.
- Written by Christopher Yamashita
- Posted on 1月 3, 2025
- Updated on 1月 3, 2025
- 174 Views
As Ethernet technologies made their way into the Metropolitan Area Networks (MAN) and the Wide Area Networks (WAN) from the conventional enterprise level usage, they are now widely being used by service providers to provide end-to-end connectivity to customers. Such service provider networks are typically spread across large geographical areas. Additionally, the service providers themselves may be relying on certain internet backbone providers, referred to as “operators
”, to provide connectivity in case the geographical area to be covered is too huge. This mode of operation makes the task of Operations, Administration and Maintenance (OAM) of such networks far more challenging, and the ability of service providers to respond to frame loss in such networks directly impacts their competitiveness.
- Written by Aaron Bamberger
- Posted on 4月 23, 2020
- Updated on 1月 10, 2025
- 10680 Views
E-Tree is an L2 EVPN service (defined in RFC8317) in which each attachment circuit (AC) is assigned the role of Root or Leaf. In this implementation, ACs are configured at the VLAN level, and the forwarding rules are enforced using a combination of local configuration of leaf VLANs (for local hosts), and asymmetric route targets (for remote hosts).
- Written by Alton Lo
- Posted on 12月 24, 2024
- Updated on 12月 24, 2024
- 324 Views
Multihoming in EVPN allows a single customer edge (CE) to connect to multiple provider edges (PE or tunnel endpoint). These PE devices are all connected to the same Ethernet-Segment (ES). Multihoming is activated by assigning a unique Ethernet Segment Identifier (ESI) and ES-Import Route Target (RT) which enables all the PEs connected to the same multihomed site to import the Type 4 ES routes
- Written by Chris Hydon
- Posted on 6月 17, 2019
- Updated on 12月 19, 2024
- 23307 Views
Ethernet VPN (EVPN) networks normally require some measure of redundancy to reduce or eliminate the impact of outages and maintenance. RFC7432 describes four types of route to be exchanged through EVPN, with a built-in multihoming mechanism for redundancy. Prior to EOS 4.22.0F, MLAG was available as a redundancy option for EVPN with VXLAN, but not multihoming. EVPN multihoming is a multi-vendor standards-based redundancy solution that does not require a dedicated peer link and allows for more flexible configurations than MLAG, supporting peering on a per interface level rather than a per device level. It also supports a mass withdrawal mechanism to minimize traffic loss when a link goes down.
- Written by Evelyn Wang
- Posted on 3月 5, 2020
- Updated on 12月 20, 2024
- 9730 Views
The FEC (Forward Error Correction) traffic analyzer is designed to estimate the performance of the FEC layer, identify error statistics, and the source of correlated errors on physical interfaces.
- Written by Mattar Amith Kini
- Posted on 12月 27, 2024
- Updated on 12月 27, 2024
- 231 Views
This document describes the CLI introduced to reallocate ECMP FEC banks on different levels in a hierarchical FEC configuration. Users may run out of entries on a certain level with other levels having little to no usage, and this CLI reconfigures the ECMP FEC entries to meet the requirements of the user.
- Written by David Joseph
- Posted on 12月 24, 2024
- Updated on 12月 24, 2024
- 259 Views
This feature adds support for the front panel Ethernet (Et) interface counters on the platforms listed below and enables the Et interfaces to dynamically adopt the counter values (packet and error)1 of interfaces (Switch, App interfaces etc.) related to the currently running FPGA application, based on user or default configuration. All Arista FPGA applications are supported. Both the receive and transmit packet counters can be independently configured for each interface, as desired. Counters are supported for interfaces of any speed including agile ports.
- Written by Pankaj Srivastava
- Posted on 12月 20, 2024
- Updated on 12月 20, 2024
- 332 Views
This feature provides a CLI to disable storm control policing on known multicast streams. By default, known multicast streams are policed by storm control policers and the behavior is consistent across all platforms supporting storm control feature. With the new CLI we can change the default policing behavior for known multicast streams.
- Written by Ajanthasingam Jegasingam
- Posted on 1月 2, 2025
- Updated on 1月 2, 2025
- 174 Views
This is an implementation of the gNOI Healthz RPCs (version 1.3.0). Note that RPC elements of the Healthz service are supported, and as of 4.33.1F, only the agent information is exposed in healthz yang component containers outlined as in the healthz service.
- Written by Abhiram Kalluru
- Posted on 12月 20, 2019
- Updated on 12月 19, 2024
- 8463 Views
gRIBI (gRPC Routing Information Base Interface) defines an interface through which OpenConfig AFT (Abstract Forwarding Table) entries can be injected from an external client to a network element.
- Written by Rashid Akhtar
- Posted on 12月 17, 2024
- Updated on 12月 17, 2024
- 363 Views
This feature introduces support for scaling both IPv4 and IPv6 hosts on our devices. Existing MDB profiles offer a maximum host scale of 128k with unique MAC rewrites. However, if hosts share the MAC rewrites, the scale can reach up to 204k. To address this issue, we are introducing a new MDB profile that will support a host scale of up to 192k when each host has a unique MAC rewrite. If hosts share the MAC rewrites, the scale can reach up to 256k.
- Written by Freedom Garcia
- Posted on 12月 24, 2024
- Updated on 12月 24, 2024
- 283 Views
This feature, when enabled, allows NAT to function on traffic traversing between VRFs, over inter-VRF static routes or routes leaked to VRFs other than where they were configured.
- Written by Srinivasan Koona Lokabiraman
- Posted on 6月 29, 2023
- Updated on 1月 10, 2025
- 5287 Views
The internet exit feature enables hosts attached to a VRF in an edge router to reach prefixes that may be reachable over the internet. Since the addresses assigned within a VRF may be non-routable private addresses which cannot be directly used when going to the Internet, the NAT feature is used as a part of the Internet exit solution to provide internet connectivity.
- Written by Srinivasan Viswanathan
- Posted on 12月 27, 2024
- Updated on 12月 27, 2024
- 213 Views
With this feature, Arista 7050 and 7050X series of switches can now decapsulate IP in IP tunneled packets. When IP in IP decapsulation is configured, incoming packets with an outer IP header having IpProto=4 (IP in IP) and IpDest matching the one configured will be decapsulated, meaning that the outer IP header will be removed from the packet and all subsequent forwarding decisions will be based on the inner IP header.
- Written by Srinivasan Viswanathan
- Posted on 12月 27, 2024
- Updated on 12月 27, 2024
- 223 Views
With this feature, IPv4 or IPv6 packets matching a static nexthop-group route can be encapsulated within an IP-in-IP tunnel and forwarded
- Written by Indu Mahadevan
- Posted on 12月 24, 2024
- Updated on 12月 24, 2024
- 244 Views
Support for IPSec connections in a full-cone Network/Port Address Translation (NAT) environment has been added to the Dynamic Path Selection (DPS) setup. DPS optimizes application performance by selecting different paths for various types of traffic. In this configuration, STUN is used to discover the translated IP address of WAN interfaces and export it to BGP.
- Written by Anoop Dawani
- Posted on 9月 30, 2015
- Updated on 12月 19, 2024
- 6644 Views
With this feature, IPv4 and IPv6 packets matching a static nexthop-group route can be encapsulated within an IP-in-IP tunnel and forwarded
- Written by Srinivasan Viswanathan
- Posted on 12月 27, 2024
- Updated on 12月 27, 2024
- 220 Views
The document describes an extension of the decap group feature, that allows IPv6 addresses to be configured and used as part of a group. IP-in-IP packets with v6 destination matching a configured decap group IP will be decapsulated and forwarded based on the inner header. That will allow any IP-to-IP packet type to be decapsulated, i.e. IPv4 in IPv4, IPv4 in IPv6, IPv6 in IPv4 and IPv6 in IPv6.
- Written by Zeyad Tamimi
- Posted on 3月 3, 2023
- Updated on 12月 19, 2024
- 8928 Views
At a high level, L1 profiles are a set of configurations which allow EOS users to change the numbering scheme and default L1 configurations of all front panel interfaces across their network switch. On Arista network switches, front panel transceiver cages are exposed as ports which are numbered sequentially: 1, 2, 3, 4, etc. These identifiers are usually marked on the front panel to allow for easier identification.
- Written by Ajay Chhatwal
- Posted on 5月 15, 2020
- Updated on 1月 7, 2025
- 8309 Views
L2 protocol packets - LLDP, LACP and STP are trapped to the CPU by default. This feature allows for disabling the per protocol trap on a given set of interfaces.
- Written by Piotr Nowakowski
- Posted on 12月 20, 2024
- Updated on 12月 20, 2024
- 290 Views
Switches can now use two LAG partitions (A and B) to support double the number of available Port Channels dictated by the chosen LAG mode. This is useful if the selected LAG mode does not allow the creation of the desired number of Port Channels on a single partition.
- Written by Michael Chin
- Posted on 2月 22, 2021
- Updated on 12月 20, 2024
- 8548 Views
Line system commands are used to apply configuration and query the status of line system modules in EOS. The supported line system modules are the OSFP-AMP-ZR and the QSFP-AMP-ZR.
- Written by Nikos Kokkalis
- Posted on 12月 27, 2024
- Updated on 12月 27, 2024
- 228 Views
The low latency tx-queue scheduler profile feature aims to provide an alternative operating mode for the queue that is fine-tuned for reduced latency. This involves a tradeoff between achieving lower latency and being able to sustain full throughput over a large number of flows.
- Written by Kieran Weaver
- Posted on 12月 20, 2024
- Updated on 12月 20, 2024
- 310 Views
Media Access Control Security (MACsec) is an industry standard encryption mechanism that protects all traffic flowing on the Ethernet links. MACsec is based on IEEE 802.1X and IEEE 802.1AE standards.
- Written by Japraj Sandhu
- Posted on 12月 20, 2024
- Updated on 12月 20, 2024
- 288 Views
By default, the only visibility a user has into packets that are dropped due to errors with the MACsec/IPsec protocols is a set of counters, such as with show mac security counters detail. This feature enables redirecting such packets to the CPU for manual inspection; it is intended to assist with debugging unexpected packet drops.
- Written by Can Sun
- Posted on 12月 20, 2024
- Updated on 12月 20, 2024
- 284 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, and the event is associated with a revision number to help the user identify changes to the event.
- Written by David Mirabito
- Posted on 12月 30, 2021
- Updated on 1月 8, 2025
- 16492 Views
MetaWatch is an FPGA-based feature available for Arista 7130 Series platforms. It provides precise timestamping of packets, aggregation and deep buffering for Ethernet links. Timestamp information and other metadata such as device and port identifiers are appended to the end of the packet as a trailer.
- Written by Anurag Mishra
- Posted on 1月 22, 2019
- Updated on 12月 17, 2024
- 6329 Views
This feature allows a user to configure a mirror session with subinterface sources from the CLI. This feature is only available with ingress mirroring (rx direction)
- Written by Kevin Amiraux
- Posted on 9月 30, 2015
- Updated on 1月 8, 2025
- 12804 Views
Arista switches provide several mirroring features. Filtered mirroring to CPU adds a special destination to the mirroring features that allows the mirrored traffic to be sent to the switch supervisor. The traffic can then be monitored and analyzed locally without the need of a remote port analyzer. Use case of this feature is for debugging and troubleshooting purposes.
- Written by Ryan Megathlin
- Posted on 9月 12, 2024
- Updated on 12月 20, 2024
- 1252 Views
This feature allows users to configure L2 subinterfaces on MLAG interfaces. L2 subinterfaces are not supported on the MLAG peer-link.
- Written by Travis Hammond
- Posted on 3月 6, 2020
- Updated on 1月 2, 2025
- 6696 Views
This feature allows the removal of a configurable number of leading bytes starting from the Ethernet layer of packets sent to a monitor session. A new per-monitor session CLI command is provided to configure this, up to a maximum of 90 bytes.
- Written by Jeffrey Nelson
- Posted on 6月 21, 2021
- Updated on 12月 20, 2024
- 39830 Views
This feature provides the ability to interconnect EVPN VXLAN domains. Domains may or may not be within the same data center network, and the decision to stretch/interconnect a subnet between domains is configurable. The following diagram shows a multi-domain deployment using symmetric IRB. Note that two domains are shown for simplicity, but this solution supports any number of domains.
- Written by Thippanna Hongal
- Posted on 12月 17, 2024
- Updated on 12月 18, 2024
- 351 Views
OSPFv3 distribute-list is a policy construct to filter out routes received from OSPFv3 LSAs so that they will not be installed on the router even though the routes are resolved and are installable. The filtering is performed after SPF calculation and only on routes from received LSAs, not on self-originated LSAs. This feature does not affect the OSPFv3 protocol behavior of the router. LSAs are exchanged, e.g. flooded, even if the routes are not installed locally on the router.
- Written by Robert Rada
- Posted on 4月 22, 2024
- Updated on 1月 8, 2025
- 2630 Views
By default, the scheduling between parent interfaces and the attached shaped subinterfaces is done in strict priority mode where the parent interface has higher priority than shaped subinterfaces. Subinterfaces that are not shaped use the same queues as the parent so the traffic on these subinterfaces will also have strict priority over shaped subinterfaces.
- Written by Kushagra Mohan
- Posted on 3月 18, 2020
- Updated on 12月 20, 2024
- 8841 Views
This feature enables per port TC-To-COS mapping, where TC represents Traffic-Class and COS represents Vlan tag PCP bits. While at present there is a global TC-To-COS mapping, we can use the TC-To-COS feature to create custom profiles which can be applied to the required interfaces.