These hardware guides are for the Pluribus Networks Freedom Series set of switches. You can find Dell EMC hardware guides here and Edgecore hardware guides here.

Quick Start Guide PDF
F9460-T Quick Start Guide .
F9432-C Quick Start Guide .
F9480-V Quick Start Guide .
F9460-X Quick Start Guide .
F9372-X Quick Start Guide .
F9532L-C Quick Start Guide .
F9572L-V Quick Start Guide .
F9664-C Quick Start Guide .

These compatibility reference guides indicate which transceivers have been tested and qualified with the respective hardware platforms that run Netvisor ONE OS: Freedom Series, Edgecore and Dell EMC Open Networking Switches.

Reference Guide HTML PDF
Transceiver Compatibility Matrix for Freedom and Edgecore Switches . .
Transceiver Compatibility Matrix for Dell Switches . .

 

 

Pluribus Networks Technical Documentation​​

 

This page contains online documentation for Pluribus Networks products now: Arista NetVisor OS, Arista NetVisor UNUM, and Insight Analytics™ releases. To access documentation for earlier software versions or products not listed, log in to the Customer Portal.

Arista NetVisor UNUM Documentation Version 6.3.3 >
Arista NetVisor OS Documentation Version 7.0.2 >
Version 6.1.1 >
Version 5.2.1 >
Hardware Guides Hardware Guides >
Transceiver Compatibility Information Transceiver Compatibility Information >  

Arista NetVisor UNUM Management Platform and Insight Analytics Technical Documentation

Arista NetVisor UNUM is an agile, multi-functional web management portal that enhances the intrinsic automation of the Unified Cloud Fabric architecture. It combines an elastic big data database and intelligent analytics engine with an intuitive and consistent user interface that allows seamless navigation across fully integrated management and analysis modules.

Reference Material HTML PDF
NetVisor UNUM 6.3.3 Setup and User Guide
Step-by-step details on installing NetVisor UNUM and configuring Insight Analytics.
.
NetVisor UNUM 6.3.3 Appliance User Guides
The User Guides provide comprehensive information about installing your NetVisor UNUM appliances.
NetVisor UNUM High Capacity User Guide . .
NetVisor UNUM Medium Capacity User Guide . .

NetVisor UNUM 6.3.3 Release Notes
Release Notes provide comprehensive information about new features, command changes and known and resolved issues in the NetVisor UNUM release and can be found on the Customer Portal

 

Arista NetVisor OS 7.0.2 Software is downloaded to your open networking switch and then enabled with license keys. The documents below will help you install and operate the NetVisor OS.

Arista NetVisor OS 7.0.2 Software

Reference Material HTML PDF
NetVisor OS 7.0.2 Installation and Software Setup Guide
Step-by-step details for installing Netvisor OS on an open networking switch and preparing the device for configuration, provisioning and production use.
. .
NetVisor OS Installation and Software Setup Guide for Dell Z9432F-ON Platforms .
Configuration Guide 7.0.2
provides information about configuring NetVisor OS, including ports, VLANs, vRouters and vFlows.
. .
Command Reference 7.0.2
The Command Reference provides an encyclopedia of all commands, A-Z, in the NetVisor OS CLI.
. .
NetVisor OS Log Messages Guide 7.0.2
The NetVisor OS Log Messages Guide provides information about all messages, systems, events and audits, with severity levels, in PDF and HTML format.
. .
NetVisor OS Troubleshooting Guide 7.0.2
Provides simple steps to perform troubleshooting for NetVisor OS.
.
NetVisor OS OpenStack ML2 Plugin Deployment Guide 7.0.2
The OpenStack ML2 Plugin Deployment Guide explains how to install the NetVisor OS ML2 plugin into an OpenStack environment and use it to configure layer 2 networks in the Unified Cloud Fabric.
. .
NetVisor OS Virtual Netvisor Deployment Guide 7.0.2
Provides simple steps to deploying Netvisor OS virtual configuration on a network.
. .
Complete NetVisor OS RESTful API Guide 7.0.2
Provides a complete listing of all RESTful APIs in NetVisor OS software.
. .

NetVisor OS Release Notes 7.0.2
The Release Notes provide comprehensive information about new features, command changes and known and resolved issues in the NetVisor OS release and can be found on the Customer Portal

 
Reference Material HTML PDF
Getting Started Guide 6.1.1
Step-by-step details for installing Netvisor ONE on an open networking switch and preparing the device for configuration, provisioning and production use.
. .
Configuration Guide 6.1.1
The Configuration Guide provides information about configuring Netvisor ONE, including ports, VLANs, vRouters and vFlows.
. .
Command Reference 6.1.1
The Command References provide an encyclopedia of all commands, A-Z, in the Netvisor ONE CLI
. .
Netvisor ONE Log Messages Guide 6.1.1
The Netvisor ONE Log Messages Guide provides information about all messages, systems, events and audits, with severity levels, in PDF and HTML format.
. .
Troubleshooting Guide 6.1.1
Provides simple steps to perform troubleshooting for Netvisor ONE OS.
.
Pluribus OpenStack ML2 Plugin Deployment Guide 6.1.1
The OpenStack ML2 Plugin Deployment Guide explains how to install the Pluribus ML2 plugin into an OpenStack environment and use it to configure layer 2 networks in the Adaptive Cloud Fabric.
. .
Virtual Netvisor Deployment Guide 6.1.1
Provides simple steps to deploying Netvisor ONE virtual configuration on a network.
. .
Complete RESTful API Guide 6.1.1
Provides a complete listing of all RESTful APIs in Netvisor ONE software.
. .

Netvisor ONE Release Notes 6.1.1
The Release Notes provide comprehensive information about new features, command changes and known and resolved issues in the Netvisor ONE release and can be found on the Customer Portal.

 

Pluribus UNUM 5.2.0 Software

Reference Material HTML PDF
Pluribus UNUM 5.2.0 Installation and User Guide
Step-by-step details on installing Pluribus UNUM and configuring Insight Analytics.
.
Pluribus UNUM 5.2.0 Appliance Installation Guides
The Appliance Installation Guides provide comprehensive information about installing your UNUM appliances.
. .
High Capacity Appliance Getting Started Guide . .
Dell Virtual Edge Platform 4600 Getting Started Guide . .
Standard Appliance Getting Started Guide . .
High Capacity Appliance Getting Started Guide . .
Dell Virtual Edge Platform 4600 Getting Started Guide . .

Pluribus UNUM 5.2.0 Release Notes
Release Notes provide comprehensive information about new features, command changes and known and resolved issues in the Pluribus UNUM release and can be found on the Customer Portal.

 
Reference Material HTML PDF
Getting Started Guide 5.2.1
Step-by-step details for installing Netvisor ONE on an open networking switch and preparing the device for configuration, provisioning and production use.
. .
Configuration Guide 5.2.1
The Configuration Guide provides information about configuring Netvisor ONE, including ports, VLANs, vRouters and vFlows.
. .
Command Reference 5.2.1 (A-O)
The Command References provide an encyclopedia of all commands, A-O in the Netvisor ONE CLI.
. .
Command Reference 5.2.1 (P-Z)
The Command References provide an encyclopedia of all commands, P-Z in the Netvisor ONE CLI.
. .
Netvisor ONE Log Messages Guide 5.2.1
The Netvisor ONE Log Messages Guide provides information about all messages, systems, events and audits, with severity levels, in PDF and HTML format.
. .
Troubleshooting and Data Collection Guide 5.2.1
Provides simple steps to perform troubleshooting for Netvisor ONE OS.
.
Pluribus OpenStack ML2 Plugin Deployment Guide 5.2.1
The OpenStack ML2 Plugin Deployment Guide explains how to install the Pluribus ML2 plugin into an OpenStack environment and use it to configure layer 2 networks in the Adaptive Cloud Fabric.
. .
Virtual Netvisor Deployment Guide 5.2.1
Provides simple steps to deploying Netvisor ONE virtual configuration on a network.
. .
Complete RESTful API Guide 5.2.1
Provides a complete listing of all RESTful APIs in Netvisor ONE software.
. .

Netvisor ONE Release Notes 5.2.1
The Release Notes provide comprehensive information about new features, command changes and known and resolved issues in the Netvisor ONE release and can be found on the Customer Portal.

 

 

 

Pluribus Registration
Tech Docs
Contact Us
Arista Community Central Search and View Tech Articles,
Q & A Forum, Videos and more!
Customer Support
Support Portal

PURPOSE

The purpose of this Anti-Counterfeit Policy (this “Policy”) is to define actions to be taken by Arista Networks (“Arista”) for the avoidance of the introduction of counterfeit materials into the supply chain for its finished products. This Policy also addresses measures that are taken to avoid the sale of counterfeit Arista products into the marketplace.

 

SCOPE

This Policy covers items acquired by Arista either directly or through its contract manufacturers. It applies to the parts and components that comprise Arista’s end-products.

 

STATEMENT OF POLICY

Arista will not knowingly, and shall take all reasonable steps to ensure that it will not, procure, use, or supply any counterfeit item or material. Arista shall implement certain procedures as detailed below to manage the risk of counterfeit material in the supply chain. All Arista staff shall follow this Policy and associated anti-counterfeit management plans and promote awareness of the issues concerning counterfeit material in Arista’s supply chain.

 

ARRANGEMENTS FOR MANAGEMENT OF RISK

Arista shall mitigate the risk of acquiring counterfeit material by undertaking the following steps:

Approved Supplier List - Arista provides its contract manufacturers with a list of preferred suppliers that it has prescreened for quality and security purposes (the “Approved Supplier List”) and requires its contract manufactured to purchase all parts and components from vendors on this list.

Assessment – of likelihood and criticality of encountering counterfeit materiel in the supply chain for a particular product, part, or application; taking into account the criticality of the material in relation to performance and safety and the geo-political region from which it is sourced.

Avoidance – through application of Arista’s supplier selection process and Approved Supplier List, Arista will only acquire products and services from known, reputable and traceable sources. The business policy is to purchase directly from the original manufacturer whenever possible and to flow down the requirement to manage counterfeit material where risk is identified.

Certification – by requiring our contract manufacturers to certify on a regular basis that all purchases of parts, components and testing equipment is only from vendors on Arista’s Approved Supplier List.

Detection – by inspection of goods and materials, any new or potentially risk-bearing suppliers will have their supplied goods inspected. In addition, all goods inwards staff and technicians will be required to be vigilant for counterfeit material using their experience, training and awareness.

Elimination – any instances of counterfeit material will result in quarantine of the items and reporting of detected instances to the customer, industry, and the appropriate authorities. Counterfeit material will not be returned to the supplier. Instances of counterfeit material detection shall be communicated to the intellectual property right holder as known, the supplier, the customer if in receipt, relevant organizations, relevant authorities, including the Trading Standards Office if the occurrence is in the UK.

Testing - by requiring Arista’s contract manufacturers to test and verify suspected counterfeit material on a case-by-case basis commensurate with risk and criticality in relation to safety and performance and report all instances of counterfeit materials to Arista.

 

ROLES & RESPONSIBILITIES

This Policy will be maintained by Arista’s Vice President of Manufacturing or such other person as Arista’s Chief Executive Officer may designate from time to time (“VPM”). The VPM shall ensure that the Policy is available, communicated, understood, and implemented by relevant staff members. The VPM has the responsibility and authority to ensure that the necessary measures required to manage the risk of counterfeit material in the supply chain are implemented and maintained by the company.

Any Arista Employee that becomes suspicious or aware of counterfeit parts or materials in the supply chain should report any concerns to the VPM and to Arista’s vendor quality alias (This email address is being protected from spambots. You need JavaScript enabled to view it.). Reports are tracked through Arista’s Line Alert Process (DOC-00553-01).

Arista’s contract manufacturers must test and verify suspected counterfeit material on a case-by-case basis commensurate with risk and criticality in relation to safety and performance. All instances of counterfeit materials must be reported to Arista.

 

COMPETENCE, TRAINING, AWARENESS & COMMUNICATION

All staff that are involved in the procurement, design or manufacturing process shall receive Anti Counterfeit Training that include this Policy and its implications for Arista. The training shall be compulsory and records of training shall be maintained. This Policy shall be available to all staff through publication on the Arista Intranet. This Policy shall be made available to third parties on request and published on the Company website (https://www.arista.com/en/support/product-documentation/policies)

 

ARISTA BRAND PROTECTION

Arista takes measures to avoid the misrepresentation of its material by others. These measures include, among other things:

  • Arista applies unique serial numbers on all manufactured products.
  • Arista utilizes unique trusted platform module (TPM) chips to deter counterfeiting of select hardware products.
  • Arista actively enforces its registered trademarks against manufacturers and suppliers of counterfeit materials.
  • Arista controls production, packaging, and documentation to avoid misrepresentation of its products in the supply chain.
  • Arista controls the production processes to prevent the misappropriation of material or unauthorized production overruns
  • Arista’s channel agreements strictly prohibit the sale or distribution of counterfeit Arista products by our partners.
 

APPENDIX A: Standards Referenced In This Policy

  • Defense Standard 05-135 Avoidance of Counterfeit Materiel

Introduction

Arista modular platforms such as the 750, 7300, 7500 and 7800 families support mixed generations of line cards, fabric cards, supervisors and power supplies (referred to in this document as “modules”). A-Care is applied to the entire chassis, rather than specific modules within the chassis. This can lead to inadequate support coverage and deployed devices that contain components that are End of Support.

This document explains how to update A-Care coverage through the lifecycle of a modular platform that includes mixed generations of modules.

A-Care Entitlement Policy for Modular Products

The level of support for a modular platform is defined by the generation of the switch fabric or switch card and therefore A-Care coverage must be updated to reflect the correct switch fabric or switch card as part of the next renewal. Line cards, supervisor modules and power supplies are not considered when choosing the correct level of A-Care for a modular system.

For example, a 7500 series product with E series switch fabrics requires A-Care coverage for E series systems while the same 7500 series product with R3 series switch fabrics requires A-Care coverage for R3 systems. 

If, in month 30 of a 36 month A-Care term, a 7500E is updated with R3 series switch fabric cards and therefore becomes an R3 series system, the existing A-Care coverage will remain valid until the A-Care renewal date but future A-Care coverage must be changed to the R3 coverage level instead of E series A-Care plans.

Documenting Component Upgrades to Ensure RMA Support

Although A-Care coverage may continue, when changes are made to the installed base, up to date records must be provided to Arista TAC to ensure continuity of RMA coverage in the correct geographical locations for the newly upgraded systems.

End of Sale Components Are Not Supported

In a modular platform, it is possible that a system could contain both supported and End of Support components (for example a mixture of line cards from different generations). The purchased A-Care contract will provide coverage for all components except those that are End of Support.

Overview

An organization's communications infrastructure and the tools that support that infrastructure are critical to the business' ability to function. That same importance also makes the infrastructure a high value target for malicious actors seeking to gain entry deeper into the organization or to exfiltrate sensitive intellectual property.

Arista Networks sees its role in security as a continuous process that begins at manufacturing and continues throughout the lifecycle of the product as vulnerabilities are detected, mitigated, and remediated.

The following document is intended to cover Arista's vulnerability management process. This process is broken down into four primary components: design choices for vulnerability avoidance, vulnerability detection, vulnerability communication, and security assessment testing.

Product security must also be complemented through best practice configuration during the installation and operation of the infrastructure. Arista provides regularly updated hardening guides and security recommendations through living documents available via EOS Central.

Design Choices

  • Safe Choices in Design and Runtime

    • Arista's product family encompasses a variety of software products including EOS, DANZ Monitoring Fabric (DMF), CloudVision (CV) and CloudVision Wi-Fi (CV Wi-Fi), each of which is designed with safe execution in mind. As a result, many types of common programming issues are caught during development or not able to occur due to the frameworks and policies in use.

      The following list provides some examples of fundamental design choices that form part of Arista's software design process:

      • Safe language choices ensure mitigation against common flaws such as buffer overflows, protection against access of uninitialised data and other memory management issues.
      • Use of highly audited libraries where necessary (e.g. common security protocols).
      • Prevention of resource leakage using safe memory operations, bounds checking, reference counting and Valgrind analysis.
      • Pipelined execution models organised around single threaded functions to avoid race conditions and deadlocks.
      • Strong input sanitization for internal and external APIs to prevent malformed data injection.
      • Memory-safe virtual machines and Containerized execution to provide process separation and abstraction from the underlying OS.
      • Principle of least privilege to limit the permissions given to processes and users, avoiding malicious escalation.
       
    • Both the design of new Arista features and maintenance of existing features are done with security as a goal.

      • Engineers are provided training on secure coding practices and how to implement them in their code. By having a series of guidelines and examples engineers can create features that are designed to be secure from the start and can recognize previously written insecure designs.

      • The usage of security critical open source libraries is limited to a few well understood libraries. This serves to limit the surface of attack as well as make analyzing the usage of said libraries in the codebase easier.

      • Awareness and review of common attack vectors and the associated mitigations is an important part of security at Arista. The PSIRT team makes sure to stay aware of common patterns in insecure code and how to detect them. Information on rising trends is integrated into the training as well as company wide announcements. By making sure to keep a dialogue open within the company on security, engineers on all teams are able to keep secure coding principles in mind when writing code.

 

Vulnerability Detection

This section describes examples of the tools, processes and testing procedures Arista undertakes to ensure awareness of emerging vulnerabilities:

  • Vulnerability Detection

    • CVE Scanner is an Arista automated process that searches for publicly disclosed vulnerabilities in the open source packages used in EOS(™), CloudVision(™) Portal, Danz Monitoring Fabric(™) and CloudVision(™) Wireless. It works by automatically downloading the database of known issues from the National Vulnerability Database and then cross-checking the version for each vulnerability against the versions of shipped code in all releases that have not yet reached end-of-life. Upon identifying a match for a vulnerability, a new bug is automatically filed and an engineer will investigate the potential problem. This automated process provides Arista with the ability to quickly uncover potential security vulnerabilities disclosed in the public domain.

    • Arista also keeps open lines of communication with its third-party vendors that provide software and hardware solutions to Arista products. In the event that a security issue is found with the 3rd party vendors product they are encouraged to reach out to Arista's PSIRT team and discuss the issue. Arista will treat these issues in the same manner as any other security issue discovered.

    • Arista PSIRT engineers conduct ongoing, detailed, security reviews of the Arista written code base to check for potential vulnerabilities and issues. Special attention is paid to areas of code believed to be at higher risk, such as those that parse user input or handle external packets.

    • Any potential security issue identified is reviewed for severity and potential impact. As part of this internal issues are scored using CVSSv3 scoring. If the usage of a publicly disclosed piece of vulnerable software differs significantly from the original reported usage, Arista may re-report the score with regards to how vulnerable Arista products are.

  • Security Assessment Testing

    • Arista performs regular internal security assessment testing on our software products. These internal tests are done for every major software release (multiple releases per year). Examples of internal security test cases are included below.
    • The findings of these tests are reviewed to find ways in which to improve or harden our software.
    • Example test cases include, but are not limited to:

      • External host fingerprinting for display of compromising information.
      • Automated vulnerability scanning for checking installed software against known CVEs.
      • Validation of automated scanning results by an Arista engineer who specializes in security.
      • Attempt Proof-of-Concept exploitation against running host, for vulnerabilities with documented ability to do so.
      • Internal host configuration review including the boot loader, kernel (hardware drivers, modules, patches, etc), ipv4 and ipv6 stack and other services running on the host.
      • Use of open-source tools such as nmap and gcov to ensure thorough coverage and understanding of the code deployed.
      • Testing to standards defined by the DoD DISA STIG configuration and best practices. Arista uses the DoD DISA standards as our baseline for secure computing since they provide a high level for initial entry and cover threats one would expect to find in a datacenter.
 

Vulnerability Avoidance/Mitigation

While many vulnerabilities are mitigated by implementing best practices, Arista also provides rapid response via advice and hotfixes as detailed below:

  • Publication of Best Practises

    • Review of product software architecture and design documentation, with a focus on external attack vectors, to identify design flaws from a security perspective.
    • Regular review of best practices for securing and hardening Arista products to ensure the security of the network. Best practices maintained in the Arista's Hardening Guides, which are living documents stored here: Hardening and Security
  • Vulnerability Mitigation on Running Systems

    • In the event of a vulnerability that affects Arista products, Arista is oftentimes able to provide a hotfix to mitigate the issue. This is an extension that can be installed on a running system and will fix the problem with a minimum of downtime. While not all fixes are available as a hotfix, here is an example of how this hotfix scenario could look:

      • The SSH Server is found to be vulnerable to a publicly disclosed CVE.
      • Arista creates a hotfix to resolve the problem.
      • The hotfix is installed on a switch, the SSH server goes down for approximately 1 second while it is restarted. No other services on the switch are affected.
      • The fix is in place and can persist across reboots of the switch until a newer image with the fix integrated can be loaded.
 

Vulnerability Communication

New vulnerabilities are made available as soon as possible via well known mechanisms:

  • If the issue impacts Arista products, an appropriate solution or set of solutions to the problem will be provided. The solutions can include a recommended configuration change, software patch, new software image, or other procedures that are appropriate to mitigate or fix the vulnerability.

  • Details of the security vulnerability and associated solutions are then documented publicly via a security advisory on the Arista website which can be accessed pro-actively as an RSS feed

    Advisories Notices

  • Customers deploying CloudVision benefit from automated alerting via the Compliance Dashboard. CloudVision is able to warn customers of both bugs and security vulnerabilities to help ensure the environment is kept secure.

  • Arista Networks follows best practices when it comes to making CVEs findable as well. All security issues have CVEs assigned by MITRE so that issues can be efficiently tracked across security scanners, advisories, and all other forms of security issue management procedures.

 

Summary

Arista goes to great lengths to ensure the ongoing security of its products and rapid mitigation of emerging threats, following industry best practices and leveraging close relationships with suppliers.

The effectiveness of these robust processes is demonstrated by extremely limited exposure to common security issues as well as rapid and usually impact-free solutions for remediation.

Arista customers following our recommended hardening steps can be confident that they have deployed the industry's leading secure networking solutions.

Arista Networks' CloudVision Wi-Fi™ (CVW) Software Release Policy and Life Cycle guidelines help customers and partners facilitate CVW migration and plan multi-year infrastructure deployment.

CVW Release Numbering Policy

CVW releases are numbers as per the following format - “xx.yy.zz”
For feature releases, the last number is always zero - “xx.yy.0”
For maintenance releases, all three numbers are non-zero - “xx.yy.zz”

e.g. Releases 8.8.0 and 9.0.0 are feature releases; while releases 8.8.2 and 9.0.1 are maintenance releases.

CVW Release Delivery

CVW is available as a cloud service and for on-premises deployments; either as a hardware or a virtual appliance.

In case of cloud deployments, Arista upgrades the cloud for each feature and maintenance release, and customers can decide to upgrade the access points (APs) either automatically or manually.

For on-premises deployments, upgrade images are made available to customers via the support portal.

For both cloud and on-premises deployments, upgrade images for the APs are made available on the cloud repository simultaneously with server side upgrades. Both the server and AP images carry the same release numbers.

CVW On-Premises Release Lifecycle Guidelines

Note: The release lifecycle guidelines below apply only to on-premises deployments because cloud deployments will be upgraded as releases become generally available.

Arista continues to maintain and provide support for releases that are either two feature releases or 18 months older than the current release, whichever is the smaller time interval.

Examples of Release Lifecycle

If a customer requests support for a release that is more than two feature releases or 18 months older than the current release, the customer will be required to upgrade the deployment (appliance and APs in case of on-premises deployments and only APs in case of cloud deployment) to a release not older than two feature releases before the current release.

With each release, the CVW release notes will mention the release that is no longer supported and the minimum release number to which a customer will need to upgrade for continued support.

If you need assistance with CVW migration options, please contact Arista TAC or contact us at This email address is being protected from spambots. You need JavaScript enabled to view it.

 

Arista Networks Product Life Cycle Policy for:

DANZ Monitoring Fabric (DMF), Converged Cloud Fabric (CCF) and Multi Cloud Director (MCD)

[Life Cycle Policy updated on March 22, 2024]
 
Note: DANZ Monitoring Fabric (DMF) is a rebranding of Big Monitoring Fabric (BMF)
Converged Cloud Fabric (CCF) is a rebranding of Big Cloud Fabric (BCF)
 

This document covers both software and hardware appliance life cycle policy for DMF, CCF and MCD, as applicable.

DMF, CCF and MCD Software Life Cycle

Arista Networks DANZ Monitoring Fabric (DMF), Converged Cloud Fabric (CCF) and Multi Cloud Director (MCD) Software Release Policy and Life Cycle guidelines help customers and partners facilitate DMF, CCF and MCD migration and plan multi-year infrastructure deployment. Arista will support each major DMF, CCF and MCD software release for up to 36 months from the date of initial posting for a particular train.

To assist customers in selecting the right DMF / CCF / MCD software release for their environments, Arista follows a standard naming convention for DMF / CCF / MCD releases. The naming convention identifies if a particular release is integrating new feature functionality, or has reached software maintenance mode.

Version numbering scheme:
<major version>.<minor version>.<patch version>

The Product Lifecycle policy guidelines apply to all major and minor releases only. Patch releases will follow the end-of-life policy milestones of the corresponding minor release.

 
Maintenance Phase
  • DMF, CCF and MCD software releases in this phase will only receive incremental fixes. No new functionality will be added.
  • TAC support available
Support Only Phase
  • DMF, CCF and MCD software releases in this phase will receive ongoing TAC support only.
  • Software upgrade required for bug fixes
End of Software Support
  • Upon completion of the Support Only Phase, the release is designated as ‘End of Software Support’ after which no further Arista software support including maintenance for that release would be provided.
 

DANZ Monitoring Fabric Software Lifecycle

The following table depicts the Arista DMF release support matrix, including the timelines for each major Arista DMF software train (based on the 36 month lifecycle policy) and the current state of TAC support for each train.

Releases Initial Release Date End of Support Date
(+36 months from initial release)
DMF 8.5.x 05-Jan-2024 01-Feb-2027
DMF 8.4.x 17-Aug-2023 01-Sep-2026
DMF 8.3.x 23-Nov-2022 31-Dec-2025
DMF 8.2.x 21-Apr-2022 30-Jun-2025
DMF 8.1.x 11-Jun-2021 01-Jul-2024
DMF 8.0.x 22-Dec-2020 01-Jan-2024
BMF 7.3.x 22-Jun-2020 01-Dec-2024
BMF 7.2.x 26-Nov-2019 01-Dec-2024
BMF 7.1.x and earlier releases have reached End of Support.

Note: Future dates are for general planning purposes and are subject to change

 

Converged Cloud Fabric Software Lifecycle

The following table depicts the Arista CCF release support matrix, including the timelines for each major Arista CCF software train (based on the 36 month lifecycle policy) and the current state of TAC support for each train.

Releases Initial Release Date End of Support Date
(+36 months from initial release)
CCF 6.2.x 30-Apr-2023 31-Dec-2028
CCF 6.1.x 12-Apr-2022 30-Jun-2025
CCF 6.0.x 03-May-2021 01-Jun-2024
BCF 5.3.x 01-May-2020 01-Dec-2024
BCF 5.2.x and earlier releases have reached End of Support.

Note: Future dates are for general planning purposes and are subject to change

 

Multi Cloud Director (MCD) Software Lifecycle

The following table depicts the Arista MCD release support matrix, including the timelines for each major Arista MCD software train (based on the 36 month lifecycle policy) and the current state of TAC support for each train.

Releases Initial Release Date End of Support Date
(+36 months from initial release)
MCD 2.4.x 29-Sep-2023 01-Oct-2026
MCD 2.3.x 29-Jun-2022 01-Jul-2025
MCD 2.2.x 07-Oct-2021 01-Nov-2024
MCD 2.1.x 28-May-2021 01-Jun-2024
MCD 2.0.x 15-Jan-2021 01-Feb-2024
MCD 1.5.x and earlier releases have reached End of Support.

Note: Future dates are for general planning purposes and are subject to change

 

DMF and CCF Hardware Appliance Life Cycle

As technology evolves, there comes a time when it is better for our customers to transition to newer platforms. Arista's End-of-Sale and End-of-Life policy is designed to help customers identify such life-cycle transitions and plan their infrastructure deployments with a multi-year outlook.

All End-of-Sale and End-of-Life announcements will be made on Arista's website. Milestones in the life cycle of our products is as follows:

  • An End-of-Sale announcement will be posted on our website 6 months prior to the last day to order the product
  • All customers who have a valid software license and a valid service contract will receive 24x7 support from Arista TAC for up to 5 years from the end-of-sale date or till the manufacturer’s end-of-life date of the hardware, whichever is sooner.
  • Software bug fixes will be available for up to 3 years from the end-of-sale date. Fixes for critical security vulnerabilities will be available through the end of life. Customers may be required to upgrade to a newer software release to get the bug fixes.
  • Hardware repair or replacement will be available for 5 years from the end-of-sale date or till the manufacturer's end-of-life date of the hardware, whichever is sooner.
  • Customers can renew service contracts up to 1 year prior to the end-of-life date.
 

End-of-Sale & End-of-Life Milestones at a Glance

Milestone 6 Months Prior End of Sale 1 Year * 2 Year * 3 Year * 4 Year * 5 Year *
End-of-Sale announcement X            
Last day to Order the product (End-of-Sale)   X          
Add or attach new service contracts     X        
Last day to receive software bug fixes         X    
Renew existing service contracts           X  
Last day to receive 24x7 TAC support (with valid service contract)             X
Last day for hardware support (hardware replacement or repair, with valid service contract) *             X
End of Life of the product *             X

Note: * HW repair or replacement will be available for 5 years from the end-of-sale date or till the manufacturer’s end-of-life date for the hardware, whichever is sooner.

 

Hardware Appliance Life Cycle

(Controller Appliance, Service Node, Recorder Node, Analytics Node)
DMF Controller Hardware Appliance First Supported Release End-of-Sale End-of-Life Last Supported Release
DCA-DM-CDL 28-Feb-2018 (BMF 6.3.0)      
DCA-DM-CB 14-Sep-2015 (BMF 5.0.0) 10-Aug-2018 09-Aug-2023 DMF 8.2.x
BMF (BTAP) CTLR HW / HWA 08-Aug-2013 (BMF 2.0.0) 14-Sep-2015 01-Apr-2018 BMF 6.2.x
DMF Service Node Hardware Appliance First Supported Release End-of-Sale End-of-Life Last Supported Release
DCA-DM-SC2 01-Sep-2023 (DMF 8.0.0)      
DCA-DM-SEL 22-Jun-2020 (BMF 7.3.0)      
DCA-DM-SDL 02-Apr-2019 (BMF 7.1.0)      
DCA-DM-SC 11-Nov-2018 (BMF 7.0.0) 01-Sep-2023 31-Aug-2028  
DCA-DM-SBL 07-Mar-2017 (BMF 6.0.0) 06-Feb-2019 05-Feb-2024 DMF 8.2.x
DCA-DM-SA 19-Dec-2015 (BMF 5.5.0) 06-Feb-2019 05-Feb-2024 DMF 8.2.x
DMF Recorder Node Hardware Appliance First Supported Release End-of-Sale End-of-Life Last Supported Release
DCA-DM-RA3 20-Dec-2019 (BMF 7.2.2)      
DCA-DM-RA2 26-Nov-2019 (BMF 7.2.1) 19-Dec-2019 18-Dec-2024 DMF 8.2.x
DCA-DM-RA 30-Mar-2018 (BMF 6.3.2) 25-Nov-2019 24-Nov-2024 DMF 8.2.x
DMF Analytics Node Hardware Appliance First Supported Release End-of-Sale End-of-Life Last Supported Release
DCA-DM-AA3 01-Aug-2021 (DMF 7.3.1)      
DCA-DM-AA2 26-Nov-2019 (BMF 7.2.1) 01-Aug-2021 31-Jul-2026 DMF 8.4.x
DCA-DM-AA 30-Mar-2018 (BMF 6.3.2) 25-Nov-2019 24-Nov-2024 DMF 8.2.x
CCF Controller Hardware Appliance First Supported Release End-of-Sale End-of-Life Last Supported Release
DCA-CC-CELN 31-Oct-2018 (BCF-4.7.3) 31-Mar-2022 30-Mar-2027 CCF-6.2.x
DCA-CC-CDL 25-May-2018 (BCF 4.7.0)     CCF-6.2.x
DCA-CC-CCL 09-Jul-2017 (BCF 4.2.0) 06-Feb-2019 05-Feb-2024 BCF-5.3.x
DCA-CC-CB 16-Aug-2015 (BCF-3.0.0) 10-Aug-2018 09-Aug-2023 BCF-5.3.x
DCA-CC-CBL 16-Aug-2015 (BCF-3.0.0) 10-Aug-2018 09-Aug-2023 BCF-5.3.x
BCF CTLR HW 30-Sep-2014 (BCF-2.0.0) 16-Aug-2015 01-Dec-2017  -

 

Arista Switch Hardware Lifecycle

For Arista Switch HW End-of-Life, please visit: https://www.arista.com/en/support/product-documentation/five-year-end-of-life-policy  

Arista Switch HW First Supported Release End-of-Sale End-of-Life Last Supported Release
DCS-7020SR-24C2 17-Aug-2023 (DMF 8.4.0)      
DCS-7020SR-32C2 17-Aug-2023 (DMF 8.4.0)      
DCS-7020SRG-24C2 05-Jan-2024 (DMF-8.5.0)      
DCS-7020TR-48 05-Jan-2024 (DMF-8.5.0)      
DCS-7020TRA-48 05-Jan-2024 (DMF-8.5.0)      
DCS-7050CX3-32S 22-Dec-2020 (DMF 8.0.0)
03-May-2021 (CCF 6.0.0)
     
DCS-7050SX3-48YC12 23-Nov-2022 (DMF 8.3.0)      
DCS-7050SX3-48YC8 22-Dec-2020 (DMF 8.0.0)
03-May-2021 (CCF 6.0.0)
     
DCS-7050SX3-96YC8 17-Aug-2023 (DMF 8.4.0)      
DCS-7050TX3-48C8 05-Jan-2024 (DMF-8.5.0)
12-Apr-2022 (CCF-6.1.0)
     
DCS-7260CX3-64 21-Apr-2022 (DMF 8.2.0)
12-Apr-2022 (CCF 6.1.0)
     
DCS-7260CX3-64E 30-Jul-2022 (DMF 8.2.1)
18-Nov-2022 (CCF 6.1.1)
     
DCS-7280CR-48 05-Jan-2024 (DMF-8.5.0)      
DCS-7280CR2-60 06-Apr-2023 (DMF 8.3.1)      
DCS-7280CR2A-30 06-Apr-2023 (DMF 8.3.1)      
DCS-7280CR2A-60 05-Jan-2024 (DMF 8.5.0)      
DCS-7280CR2K-30 06-Apr-2023 (DMF 8.3.1)      
DCS-7280CR2M-30 05-Jan-2024 (DMF 8.5.0)      
DCS-7280CR3-32D4 23-Nov-2022 (DMF 8.3.0)      
DCS-7280CR3-32D4-M 23-Nov-2022 (DMF 8.3.0)      
DCS-7280CR3-32P4 21-Apr-2022 (DMF 8.2.0)      
DCS-7280CR3-32P4-M 23-Nov-2022 (DMF 8.3.0)      
DCS-7280CR3-36S 06-Apr-2023 (DMF 8.3.1)      
DCS-7280CR3-96 23-Nov-2022 (DMF 8.3.0)      
DCS-7280CR3K-32D4 23-Nov-2022 (DMF 8.3.0)      
DCS-7280CR3K-32D4A 06-Apr-2023 (DMF 8.3.1)      
DCS-7280CR3K-32P4 06-Apr-2023 (DMF 8.3.1)      
DCS-7280CR3K-32P4A 06-Apr-2023 (DMF 8.3.1)      
DCS-7280CR3K-36A 05-Jan-2024 (DMF 8.5.0)      
DCS-7280CR3K-36S 06-Apr-2023 (DMF 8.3.1)      
DCS-7280CR3K-96 06-Apr-2023 (DMF 8.3.1)      
DCS-7280CR3MK-32D4 17-Aug-2023 (DMF 8.4.0)      
DCS-7280CR3MK-32D4S 23-Nov-2022 (DMF 8.3.0)      
DCS-7280CR3MK-32P4 17-Aug-2023 (DMF 8.4.0)      
DCS-7280CR3MK-32P4S 17-Aug-2023 (DMF 8.4.0)      
DCS-7280DR3-24 06-Apr-2023 (DMF 8.3.1)      
DCS-7280DR3-24-M 06-Apr-2023 (DMF 8.3.1)      
DCS-7280DR3A-36 05-Jan-2024 (DMF-8.5.0)      
DCS-7280DR3A-54 17-Aug-2023 (DMF 8.4.0)      
DCS-7280DR3AK-36 05-Jan-2024 (DMF-8.5.0)      
DCS-7280DR3AK-36S 05-Jan-2024 (DMF-8.5.0)      
DCS-7280DR3AK-54 17-Aug-2023 (DMF 8.4.0)      
DCS-7280DR3AM-36 05-Jan-2024 (DMF-8.5.0)      
DCS-7280DR3AM-54 17-Aug-2023 (DMF 8.4.0)      
DCS-7280DR3K-24 06-Apr-2023 (DMF 8.3.1)      
DCS-7280PR3-24 23-Nov-2022 (DMF 8.3.0)      
DCS-7280PR3-24-M 23-Nov-2022 (DMF 8.3.0)      
DCS-7280PR3K-24 23-Nov-2022 (DMF 8.3.0)      
DCS-7280QR-C36 06-Apr-2023 (DMF 8.3.1)      
DCS-7280QR-C36-M 06-Apr-2023 (DMF 8.3.1)      
DCS-7280QR-C72 06-Apr-2023 (DMF 8.3.1)      
DCS-7280QR-C72-M 17-Aug-2023 (DMF 8.4.0)      
DCS-7280QRA-C36S 17-Aug-2023 (DMF 8.4.0)      
DCS-7280QRA-C36S-M 17-Aug-2023 (DMF 8.4.0)      
DCS-7280SR-48C6 21-Apr-2022 (DMF 8.2.0)      
DCS-7280SR-48C6-M 23-Nov-2022 (DMF 8.3.0)      
DCS-7280SR2-48YC6 21-Apr-2022 (DMF 8.2.0) 30-Dec-2022 30-Dec-2027  
DCS-7280SR2-48YC6-M 23-Nov-2022 (DMF 8.3.0) 30-Dec-2022 30-Dec-2027  
DCS-7280SR2A-48YC6 06-Apr-2023 (DMF 8.3.1)      
DCS-7280SR2A-48YC6-M 06-Apr-2023 (DMF 8.3.1)      
DCS-7280SR2K-48C6-M 17-Aug-2023 (DMF 8.4.0)      
DCS-7280SR3-40YC6 17-Aug-2023 (DMF 8.4.0)      
DCS-7280SR3-48YC8 23-Nov-2022 (DMF 8.3.0)      
DCS-7280SR3E-40YC6 17-Aug-2023 (DMF 8.4.0)      
DCS-7280SR3K-48YC8 06-Apr-2023 (DMF 8.3.1)      
DCS-7280SR3K-48YC8A 05-Jan-2024 (DMF-8.5.0)      
DCS-7280SR3M-48YC8 23-Nov-2022 (DMF 8.3.0)      
DCS-7280SRA-48C6 06-Apr-2023 (DMF 8.3.1)      
DCS-7280SRA-48C6-M 06-Apr-2023 (DMF 8.3.1)      
DCS-7280SRAM-48C6 06-Apr-2023 (DMF 8.3.1)      
DCS-7280SRM-40CX2 05-Jan-2024 (DMF-8.5.0)      
DCS-7280TR3-40C6 05-Jan-2024 (DMF-8.5.0)      
DCS-7280TR-48C6 05-Jan-2024 (DMF-8.5.0)      
DCS-7280TR-48C6-M 05-Jan-2024 (DMF-8.5.0)      
DCS-7280TRA-48C6 05-Jan-2024 (DMF-8.5.0)      
DCS-7280TRA-48C6-M 05-Jan-2024 (DMF-8.5.0)      

Dell EMC Switch Hardware Lifecycle

Note: Arista and Dell have jointly decided to terminate their partnership on DMF/CCF. Arista will only support Dell switch deployments with DMF/CCF for up to the End of Life of the respective switch hardware or 31-Dec-2028, whichever is sooner. Please refer to Arista Dell Partnership Termination Field Notice for details.
For assistance with new / expansion / migration opportunities, please contact your Arista sales representative or contact us at This email address is being protected from spambots. You need JavaScript enabled to view it.

For Dell EMC Switch HW End-of-Life, please visit: https://www.dell.com/en-us/work/shop/networkingwarranty/cp/networkingwarranty  

Dell Switch HW First Supported Release End-of-Sale End-of-Life Last Supported Release
Dell S3048-ON 12-Sep-2018 (BCF-4.7.1) 30-Apr-2024 29-Apr-2029 CCF-6.2.x
Dell S4048-ON 03-May-2015 (BMF 4.5.0)
01-May-2015 (BCF 2.6.0)
30-Jan-2022 29-Jan-2027 DMF-8.5.x
CCF-6.2.x
Dell S4048T-ON  17-May-2017 (BMF 6.0.0)
22-Dec-2016 (BCF 4.0.0)
30-Oct-2021 29-Oct-2026 DMF-8.5.x
CCF-6.2.x
Dell S4112F-ON 11-Nov-2018 (BMF 7.0.0)
03-May-2019 (BCF 5.1.0)
   

CCF-6.2.x
Dell S4112T-ON 03-May-2019 (BCF 5.1.0)     CCF-6.2.x
Dell S4148F-ON  26-Nov-2019 (BMF 7.2.1)
15-Feb-2018 (BCF 4.6.0)
   

CCF-6.2.x
Dell S4148T-ON 15-Feb-2018 (BCF 4.6.0)     CCF-6.2.x
Dell S4810-ON
EOL - No Longer Supported
15-Aug-2014 (BMF 4.0.0) 30-Apr-2016 30-Apr-2021  
Dell S5048-ON  29-Jun-2018 (BMF 6.3.4)
25-May-2018 (BCF 4.7.0)
30-Jun-2020 30-Jun-2025 DMF 8.2.x
CCF 6.1.x
Dell S5232F-ON 26-Nov-2019 (BMF 7.2.1)
14-Feb-2019 (BCF 5.0.0)
   

CCF-6.2.x
Dell S5248-ON 02-Apr-2019 (BMF 7.1.0)
14-Feb-2019 (BCF 5.0.0)
   

CCF-6.2.x
Dell S6000-ON 
EOL - No Longer Supported
28-Oct-2014 (BMF 4.1.0)
30-Jun-2016 (BCF 3.6.0)
30-Jul-2017 30-Jul-2022 BMF 7.3.x

BCF 5.3.x
Dell S6010-ON  10-Nov-2016 (BMF 5.8.1)
22-Dec-2016 (BCF 4.0.0)
30-Oct-2020 30-Oct-2025 DMF 8.3.x
CCF-6.2.x
Dell S6100-ON  10-Nov-2016 (BMF 5.8.1)
22-Dec-2016 (BCF 4.0.0)
30-Sep-2019 30-Sep-2024 BMF 7.3.x
BCF 5.3.x
Dell Z9100-ON 30-Apr-2016 (BMF 5.6.0)
09-Jul-2017 (BCF 4.2.0)
30-Dec-2020 30-Dec-2025 DMF 8.3.x
CCF-6.2.x
Dell Z9264-ON 26-Nov-2019 (BMF 7.2.1)
31-Oct-2018 (BCF 4.7.3)
31-Jan-2024  

CCF-6.2.x
Dell EMC Switch Firmware Upgrade Resource Manual
Firmware Upgrade Manual for Dell Switches: .

Edge-Core Switch Hardware Lifecycle

Note: Arista will only support Edge-Core switch deployments with DMF/CCF that were purchased on 31-Dec-2020 or earlier, for up to the End of Life of the respective switch hardware or 01-Dec-2024, whichever is sooner. For assistance with expansion / migration opportunities, please contact your Arista sales representative or contact us at This email address is being protected from spambots. You need JavaScript enabled to view it.

For Edge-Core Switch HW End-of-Life, please visit:  https://www.edge-core.com/productsEOL.php  

Edge-Core Switch HW First Supported Release End-of-Sale End-of-Life Last Supported Release
AS4600-54T
EOL - No Longer Supported
30-Apr-2014 (BMF 3.1.0)   30-Jun-2016  
AS5610-52X
EOL - No Longer Supported
30-Apr-2014 (BMF 3.1.0)   01-Jul-2017  
AS5712-54X
EOL - No Longer Supported
19-Dec-2015 (BMF 5.5.0)
20-Dec-2015 (BCF 3.5.0)
  01-Apr-2020  
AS5812-54T 10-Nov-2016 (BMF 5.8.1)
22-Dec-2016 (BCF 4.0.0)
  15-Jul-2022 BMF 7.3.x

BCF 5.3.x
AS5812-54X 10-Nov-2016 (BMF 5.8.1)
22-Dec-2016 (BCF 4.0.0)
  15-Jul-2022 BMF 7.3.x

BCF 5.3.x
AS6712-32X
EOL - No Longer Supported
19-Dec-2015 (BMF 5.5.0)
20-Dec-2015 (BCF 3.5.0)
  01-Apr-2020  
AS6812-32X 10-Nov-2016 (BMF 5.8.1)
22-Dec-2016 (BCF 4.0.0)
  28-Feb-2022 BMF 7.3.x

BCF 5.3.x
AS7312-54XS 11-Nov-2018 (BMF 7.0.0)     BMF 7.3.x
AS7326-56X 22-Jun-2020 (BMF 7.3.0)
22-Nov-2019 (BCF 5.2.0)
    BMF 7.3.x
BCF 5.3.x
AS7712-32X 30-Apr-2016 (BMF 5.6.0)
09-Jul-2017 (BCF 4.2.0)
  15-Jul-2022 BMF 7.3.x

BCF 5.3.x
AS7726-32X 22-Jun-2020 (BMF 7.3.0)
22-Nov-2019 (BCF 5.2.0)
    BMF 7.3.x

BCF 5.3.x
AS7816-64X 26-Nov-2019 (BMF 7.2.1)
22-Nov-2019 (BCF 5.2.0)
    BMF 7.3.x

BCF 5.3.x

 

DMF / BMF Support on HPE Hardware

Support for DMF/BMF on non-EOL HPE Hardware (Controllers, Service Nodes, Switches) will end once DMF/BMF 7.3 release reaches End of Support. For support on HPE HW related issues, please reach out to your HPE sales representative.

If you need assistance with DMF/CCF solutions, please contact your Arista sales representative or contact us at: This email address is being protected from spambots. You need JavaScript enabled to view it.

 

Revision Date Policy Changes
1.4 Feb 17, 2023 Corrected the 7280R platform support table in the Arista Switch HW cycle section.
1.3 Nov 9, 2021 While the Last Supported Release for DCA-DM-SA, DCA-DM-SBL and DCA-DM-CB has been extended beyond BMF 7.3.x, the respective appliance EOL dates remain unchanged.
1.2 Mar 24, 2021 Added switch and appliance hardware End of Life information
1.1 Dec 11, 2020 Changed naming convention to not use 'F' / 'M' suffix
1.0 May 10, 2020 Initial release

Subcategories

Field Notices

 

This page aggregates the Arista hardware and software product field notices. For further information on Arista’s hardware and software support policies, please see product documentation.

Security Advisories

 

Arista Networks is committed to maintaining the highest standards of security across our product portfolio. Leveraging extensive testing and monitoring of vulnerabilities to isolate and neutralize threats early, Arista's Product Security Incident Response Team (PSIRT) provides global coverage for public reporting of possible security vulnerabilities across the product portfolio.

The PSIRT team monitors industry-wide vulnerability reporting as well as providing a single point of contact for customers and interested third parties to investigate and identify potential threats. The PSIRT team also works to communicate these issues back to the user community in a timely manner.

Arista's approach to vulnerability management and links to best practice guidelines can be found here.

For technical assistance with workarounds and hotfix installations recommended in security advisories, please contact the Arista Support team at This email address is being protected from spambots. You need JavaScript enabled to view it..

Report security vulnerabilities found in Arista products to the PSIRT team via This email address is being protected from spambots. You need JavaScript enabled to view it.. It is recommended to use Arista's PGP key for secure and private communication directly with the PSIRT team.

Arista PSIRT is happy to work with researchers on discovered vulnerabilities in Arista products, the assignment of CVEs, and timelines for responsible disclosure. If a researcher discovers a new vulnerability they will be acknowledged in the advisory related to the vulnerability. Arista PSIRT is interested in receiving reports on issues affecting features in both Arista code as well as Open Source Software used in Arista products. Security issues found in Open Source Software which do not affect Arista products are out of the scope of Arista and should be referred to the appropriate CNA found here.

 

PSIRT Advisories

The following advisories and referenced materials are provided on an "as is" basis for use at your own risk. Arista Networks reserves the right to change or update the advisories without notice at any time.

End of Sale

 

This page aggregates hardware end of sale notices. Arista offers a five year end of sales lifecycle for most products. Selected products and legacy systems have a three year lifecycle. For further information on Arista’s hardware support policies see the Three Year End of Life Policy or Five Year End of Life Policy. Detailed product policy information may be found here.

The Product Lifecycle Tool can be used to find detailed information about Arista products.

End of Software Support

 

This page aggregates end of software support notices. Detailed information on the lifecycle of each software component may be found here.

The Product Lifecycle Tool can be used to find detailed information about Arista products.