- Written by Michael (Mike) Fink
- Posted on December 22, 2017
- Updated on December 2, 2024
- 14347 Views
Filtered Mirroring allows certain packets to be selected for mirroring, rather than all packets ingressing or egressing a particular port.
- Written by Vivek Subbarao
- Posted on January 18, 2019
- Updated on February 14, 2022
- 9158 Views
This feature adds support for a dynamic configuration model to eliminate the need for the network administrator to
- Written by Paraic Gallagher
- Posted on October 28, 2020
- Updated on October 28, 2020
- 7105 Views
This feature adds a configuration option which provides a CLI error if a reference is made to an unconfigured policy
- Written by Arup Raton Roy
- Posted on November 2, 2020
- Updated on July 21, 2023
- 11150 Views
This document presents Arista Macro-Segmentation Service - Firewall (MSS-FW) deployment in a network with multiple Virtual Routing and Forwarding (VRF) instances.
- Written by Alton Lo
- Posted on November 23, 2020
- Updated on November 23, 2020
- 9378 Views
To use IPv6 addresses for VXLAN underlay, there are two different approaches. The first approach is to make use of
- Written by Ziqian XU
- Posted on November 10, 2020
- Updated on November 10, 2020
- 7201 Views
A dynamic ACL is dynamically created on a switch based on the contents of NAS Filter Rule AVP attributes sent from a
- Written by Sridhar Nagarajan
- Posted on November 9, 2020
- Updated on November 15, 2020
- 7685 Views
This feature provides the capability to count the number of packets hitting rules associated with egress ACLs
- Written by Avishek Santhaliya
- Posted on November 9, 2020
- Updated on November 15, 2020
- 9311 Views
Security MAC ACLs can be used to permit and/or deny ethernet packets on the egress port by matching on the following
- Written by Andrew Li
- Posted on November 9, 2020
- Updated on December 23, 2021
- 8499 Views
Normally the ingress router in the following diagram has no control over an autonomous system border router’s
- Written by Jeffrey Nelson
- Posted on October 28, 2020
- Updated on August 11, 2023
- 21266 Views
This feature adds control plane support for inter subnet forwarding between EVPN networks. This support is achieved
- Written by Aaron Bamberger
- Posted on October 28, 2020
- Updated on October 28, 2020
- 9385 Views
In a traditional EVPN VXLAN centralized anycast gateway deployment, multiple L3 VTEPs serve the role of the
- Written by Sudheer Y R
- Posted on October 9, 2018
- Updated on December 5, 2023
- 19550 Views
This feature introduces the hardware forwarding support for IPv4 over IPv4, GRE-Tunnel interfaces on Arista Switches. A GRE-Tunnel interface acts as a logical interface which performs the GRE encapsulation or decapsulation.
- Written by Delin Sun
- Posted on April 6, 2021
- Updated on April 6, 2021
- 5927 Views
This feature adds support for PIM SM (Sparse Mode) for IPv6 Multicast Routing on platforms listed below.
- Written by Prakrati Vidyarthi
- Posted on August 16, 2018
- Updated on November 5, 2024
- 15567 Views
Normally, a switch traps L2 protocol frames to the CPU. However, certain use-cases may require these frames to be forwarded or dropped. And in cases where the L2 protocol frames are forwarded (eg: Pseudowire), we may require the frames to be trapped to the CPU or dropped. The L2 Protocol Forwarding feature provides a mechanism to control the behavior of L2 protocol frames received on a port or subinterface.
- Written by Athichart Tangpong
- Posted on October 22, 2018
- Updated on October 1, 2024
- 13886 Views
A L2 sub-interface is a logical bridging endpoint associated with traffic on an interface distinguished by 802.1Q tags, where each <interface, 802.1q tag> tuple is treated as a first class bridging interface.
- Written by Zackary Ayoun
- Posted on May 23, 2022
- Updated on July 19, 2023
- 10539 Views
LANZ is the EOS Latency and congestion ANalyZer. On DCS-7280, DCS-7020, DCS-7500 and DCS-7800 series, it allows monitoring congestion and transmit latencies on both front panel and CPU ports.
- Written by Kewei Shi
- Posted on November 4, 2020
- Updated on June 23, 2022
- 9293 Views
Logical ports are hardware resources that are required to activate interfaces.
- Written by Robert Oliveira
- Posted on November 10, 2020
- Updated on November 10, 2020
- 5962 Views
The multicast keyword extends the accounting group to send Accounting Request packets to all servers in a group at the
- Written by Ioana Costea
- Posted on November 9, 2020
- Updated on February 9, 2022
- 6724 Views
Previously, the maximum valid port channel ID was equal to the maximum number of port channels configurable on the
- Written by Chengle(Gary) Zhang
- Posted on December 23, 2019
- Updated on May 22, 2024
- 10925 Views
When the MLAG peer link goes down, the secondary peer assumes the primary peer is down/dead, and takes over the primary
- Written by Sandeep Betha
- Posted on December 18, 2019
- Updated on December 16, 2021
- 8203 Views
MLDv2 Snooping optimizes the transmission of multicast packets in Layer 2 by using Layer 3 information contained in
- Written by Phillip Jie
- Posted on November 10, 2020
- Updated on October 30, 2024
- 8090 Views
MRU (maximum receive unit) enforcement provides the ability to drop frames that exceed a configured threshold on the ingress interface.
- Written by Roger Levesque
- Posted on October 28, 2020
- Updated on October 28, 2020
- 7654 Views
When a static route is configured with a nexthop group, by default the static route is eligible for FIB insertion
- Written by Ajay Kini
- Posted on November 2, 2020
- Updated on July 3, 2023
- 8221 Views
In a symmetric network topology, for the same ECMP (Equal Cost Multi Path) route programmed at different devices in a switch layer, the various devices can program ECMP next hops in the FEC (Forwarding Equivalence Class) for that route in varying orders.
- Written by Chris Roche
- Posted on November 2, 2020
- Updated on November 2, 2020
- 6378 Views
BFD sessions are only established for OSPFv2 and OSPFv3 adjacencies that are in the FULL state. In a LAN environment
- Written by Tanushree Bansal
- Posted on February 23, 2022
- Updated on June 2, 2022
- 7201 Views
This feature provides isolation and allows segregating/dividing the link state database based on interface.
- Written by Shyam Kota
- Posted on November 9, 2020
- Updated on November 15, 2020
- 7292 Views
QinQ L3 subinterfaces divide a single ethernet or port channel interface into multiple logical L3 interfaces based
- Written by Joel Katticaran
- Posted on October 29, 2020
- Updated on February 7, 2022
- 6377 Views
This feature adds support to match against nexthop address for VPNV4/V6 routes. This support allows
- Written by Martin Stigge
- Posted on September 16, 2020
- Updated on January 11, 2022
- 9334 Views
RSVP TE, the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), is used to distribute MPLS labels
- Written by Jeevan Kamisetty
- Posted on November 4, 2020
- Updated on October 4, 2024
- 14690 Views
Network administrators require access to flow information that passes through various network elements, for the purpose of analyzing and monitoring their networks. This feature provides access to IP flow information by sampling traffic flows in ingress and/or egress directions on the interfaces on which it is configured. The samples are then used to create flow records, which are exported to the configured collectors in the IPFIX format. Egress Flow tracking is supported from EOS-4.29.0F on the DCS-7170B-64C series and supported on 7280, 7500 and 7800 series platforms from EOS-4.31.1".
- Written by Pete Carson
- Posted on November 9, 2020
- Updated on July 21, 2023
- 7636 Views
The NTP service in EOS may be configured to act as an NTP server for other devices as clients. Previously, all clients
- Written by Roee Bar
- Posted on October 29, 2020
- Updated on October 29, 2020
- 6996 Views
The feature allows modification of the egress TTL of packets routed via PBR, and to modify the TTL of naked IP/IPv6
- Written by Navjot Singh Sandhu
- Posted on April 6, 2021
- Updated on December 17, 2021
- 6392 Views
This feature enables ACL functionality on subinterfaces. Release. Update. 4.17.0F . Support for
- Written by Vishrant Vasavada
- Posted on October 28, 2020
- Updated on February 3, 2022
- 7404 Views
This feature extends link bandwidth extended community deletion mechanism, which previously always required
- Written by Jeff Wen
- Posted on April 6, 2021
- Updated on April 6, 2021
- 9268 Views
A Management VRF instance allows network operators to separate their management traffic from the rest of the
- Written by Saravanan Sellappa
- Posted on October 28, 2020
- Updated on November 11, 2020
- 6294 Views
This feature supports IPv6 link local nexthops belonging to a Nexthop Groups (NHG). Only nexthop
- Written by Sulyab Thottungal Valapu
- Posted on October 29, 2020
- Updated on October 17, 2024
- 7105 Views
This document describes the OSPFv2 and OSPFv3 feature that allows enabling or disabling the inclusion of LSAs having “Down” (DN) bit set in SPF calculations. The DN Bit is a loop prevention mechanism implemented when OSPF is used as CE - PE IGP protocol.
- Written by Basil Saji
- Posted on November 9, 2020
- Updated on October 11, 2024
- 11026 Views
Private VLAN is a feature that segregates a regular VLAN broadcast domain while maintaining all ports in the same IP subnet. There are three types of VLAN within a private VLAN
- Written by James Doherty
- Posted on October 28, 2020
- Updated on October 28, 2020
- 6564 Views
4.25.0F adds support to use large community lists in the ‘set large community’ route map set clause.
- Written by Prateek Mali
- Posted on August 19, 2020
- Updated on November 14, 2024
- 21428 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Abbas Abou Daya
- Posted on October 29, 2020
- Updated on October 29, 2020
- 6826 Views
WRED stands for Weighted Random Early Detection for congestion avoidance. A queue can differentiate certain
- Written by Travis Hammond
- Posted on April 24, 2020
- Updated on January 17, 2022
- 6930 Views
TAP Aggregation support for the DCS 7280R3 and DCS 7500R3 series is documented below, including the release in which a
- Written by Vipul Shah
- Posted on August 27, 2019
- Updated on November 23, 2023
- 7364 Views
BGP routing information often contains more than one path to the same destination network. The BGP best-path selection algorithm determines which of these paths should be considered as the best path to that network.
- Written by Ethan Rahn
- Posted on November 9, 2020
- Updated on July 21, 2023
- 7226 Views
This document details how to use the Zero Touch Provisioning (ZTP) USB configuration feature. Arista’s Zero Touch