- Written by Tula Kraiser
- Posted on January 3, 2021
- Updated on June 24, 2022
- 7716 Views
The primary challenge with using a switching ASIC as a load balancer has been how to deal with changes in the network topology without disrupting existing TCP connections.
- Written by Tarun Jaswanth LNU
- Posted on August 24, 2020
- Updated on October 17, 2024
- 26280 Views
802.1X is an IEEE standard protocol that prevents unauthorized devices from gaining access to the network.
- Written by Michael (Mike) Fink
- Posted on December 22, 2017
- Updated on December 2, 2024
- 14216 Views
Filtered Mirroring allows certain packets to be selected for mirroring, rather than all packets ingressing or egressing a particular port.
- Written by Sandeep Betha
- Posted on January 22, 2021
- Updated on February 6, 2022
- 11506 Views
This feature adds support for user configured BGP Nexthop Resolution RIB profiles for various BGP based services
- Written by Jason Shamberger
- Posted on April 20, 2020
- Updated on February 19, 2024
- 10917 Views
RPKI provides a mechanism to validate the originating AS of an advertised prefix.
- Written by Athish Rao
- Posted on April 8, 2021
- Updated on April 8, 2021
- 6719 Views
Currently, there is a global knob for configuring the preference of all SR TE policies, that affects the comparison
- Written by Digvijay Gahlot
- Posted on December 24, 2021
- Updated on December 24, 2021
- 7768 Views
Configurable Voq Tail Drop Thresholds provides flexibility to change default voq tail drop based on speed of the
- Written by Richard Zhang
- Posted on December 22, 2020
- Updated on December 22, 2020
- 8582 Views
EOS DHCP relay agent forwards all the DHCP requests from the clients using the primary IP address of the interface as
- Written by Leandro Penz
- Posted on December 22, 2020
- Updated on December 22, 2020
- 6497 Views
Dot1x Web authentication feature authenticates a supplicant via a web page, generally referred to as a captive
- Written by Sourabh Bollapragada
- Posted on December 22, 2020
- Updated on January 29, 2024
- 8420 Views
This feature supports counting ECN-marked packets (ECN = Explicit Congestion Notification) on a per egress port per tx-queue basis. The feature can be used to gather these packet counts via CLI or SNMP. There are two cases when an ECN-marked (congestion) packet is counted on the egress port/queue:
- Written by Sridhar Nagarajan
- Posted on December 14, 2020
- Updated on December 14, 2020
- 7557 Views
This feature provides the capability to count the number of packets hitting rules associated with egress ACLs
- Written by Vamsi Anne
- Posted on December 16, 2020
- Updated on December 16, 2020
- 8986 Views
Egress Sflow sampling feature allows to sample unicast packets based on the egress interface. The
- Written by AKSHAYA Sridharan
- Posted on December 17, 2020
- Updated on June 30, 2022
- 8177 Views
Egress traffic-policing can be applied on L3 Ethernet subinterfaces for outbound traffic.
- Written by Rahul Kumar Singh
- Posted on December 14, 2020
- Updated on December 14, 2020
- 6608 Views
From 4.25.1F, Dot1x Modes to MBA Hosts is supported.With this feature enabled MBA hosts will be considered for Dot1x
- Written by Jeff Wen
- Posted on January 21, 2019
- Updated on November 30, 2023
- 10091 Views
In the traditional data center design, inter-subnet forwarding is provided by a centralized router, where traffic traverses across the network to a centralized routing node and back again to its final destination. In a large multi-tenant data center environment this operational model can lead to inefficient use of bandwidth and sub-optimal forwarding.
- Written by Alton Lo
- Posted on June 14, 2019
- Updated on October 7, 2019
- 9254 Views
Starting with EOS release 4.22.0F, the EVPN VXLAN L3 Gateway using EVPN IRB supports routing traffic from IPV6 host to
- Written by Shyam Kota
- Posted on June 13, 2019
- Updated on October 19, 2021
- 8937 Views
Fair Adaptive Dynamic Thresholds (FADT) provides efficient allocation of shared packet buffer resources amongst
- Written by Rahul Vasist
- Posted on April 20, 2020
- Updated on January 29, 2024
- 9436 Views
EOS-4.24.0 adds support for hardware-accelerated sFlow on R3 systems. Without hardware acceleration, all sFlow processing is done in software, which means performance is heavily dependent on the capabilities of the host CPU. Aggressive sampling rates also decrease the amount of processing time available for other EOS applications.
- Written by Sourav Basu
- Posted on December 9, 2020
- Updated on July 12, 2023
- 17317 Views
In VXLAN networks, broadcast DHCP requests are head-end-replicated to all VXLAN tunnel endpoints (VTEP). If a DHCP relay helper address is configured on more than one VTEP, each such VTEP relays the DHCP request to the configured DHCP server. This could potentially overwhelm the DHCP server as it would receive multiple copies of broadcast packets originated from a host connected to one of the VTEPs.
- Written by Arpit Bansal
- Posted on December 21, 2020
- Updated on January 17, 2022
- 8385 Views
IGP shortcuts enable traffic to get forwarded along traffic engineered paths computed by RSVP using a modified SPF
- Written by Neel Neogi
- Posted on December 30, 2020
- Updated on June 8, 2023
- 12431 Views
The document describes the support for dedicated and group ingress policing on interfaces without using QoS policy-maps to match on the traffic and apply policing.
- Written by Pratik Mangalore
- Posted on December 14, 2020
- Updated on November 13, 2024
- 12486 Views
IP Locking is an EOS feature configured on an Ethernet Layer 2 port. When enabled, it ensures that a port will only permit IP and ARP packets with IP source addresses that have been authorized. As of EOS-4.25.0F release update, IP Locking can run in two modes - IPv4 Locking (which will be referred to as IP Locking) and IPv6 Locking, which can be configured using the commands mentioned in the below sections. IP Locking prevents another host on a different interface from claiming ownership of an IP address through either IP or ARP spoofing.
- Written by Tony Li
- Posted on December 22, 2020
- Updated on December 22, 2020
- 7760 Views
IS IS area proxy allows the creation of more scalable networks. IS IS already has hierarchical mechanisms for
- Written by Athichart Tangpong
- Posted on October 22, 2018
- Updated on October 1, 2024
- 13775 Views
A L2 sub-interface is a logical bridging endpoint associated with traffic on an interface distinguished by 802.1Q tags, where each <interface, 802.1q tag> tuple is treated as a first class bridging interface.
- Written by Vijay Mahadevan
- Posted on April 18, 2018
- Updated on December 8, 2020
- 12145 Views
The L2EVPN MPLS feature is available when configuring BGP in the multi agent routing protocol model. Ethernet VPN
- Written by Isidor Kouvelas
- Posted on December 22, 2017
- Updated on December 9, 2020
- 8245 Views
This feature is available when configuring BGP in the multi agent routing protocol model. Ethernet
- Written by Manuel Mendez
- Posted on September 30, 2019
- Updated on December 16, 2020
- 8387 Views
Subinterfaces divide a single ethernet or port channel interface into multiple logical L3 interfaces based on the
- Written by Nathan Wolfe
- Posted on February 15, 2018
- Updated on November 7, 2024
- 12042 Views
Introduced in EOS-4.20.1F, “selectable hashing fields” feature controls whether a certain header’s field is used in the hash calculation for LAG and ECMP.
- Written by Bharathram Pattabhiraman
- Posted on February 11, 2021
- Updated on June 15, 2022
- 15646 Views
This solution allows the delivery of customer BUM (Broadcast, Unknown unicast and Multicast) traffic in a VLAN using
- Written by Jeff Hornsberger
- Posted on December 16, 2020
- Updated on April 19, 2022
- 8367 Views
LSPs formed by LDP normally follow IGP routing. The LDP speaker selects the downstream LSR for a particular prefix as
- Written by Pedro Coutinho
- Posted on December 22, 2020
- Updated on October 10, 2022
- 11279 Views
The LDP pseudowire feature provides support for emulating Ethernet connections over a Multiprotocol Label
- Written by Bin Wang
- Posted on December 22, 2020
- Updated on December 22, 2020
- 7589 Views
For various peering applications, there is a need to support the assignment of a MAC address on routed interfaces.
- Written by Arup Raton Roy
- Posted on December 22, 2020
- Updated on January 6, 2021
- 8339 Views
This document presents how Arista Macro Segmentation Service (MSS) can be deployed in a brownfield environment with
- Written by Megha Sinha
- Posted on October 9, 2018
- Updated on December 9, 2020
- 8384 Views
If MACsec is enabled on an interface, it tries to establish MACsec Key Agreement (MKA) session(s) with its peer.
- Written by Phillip Jie
- Posted on November 10, 2020
- Updated on October 30, 2024
- 7997 Views
MRU (maximum receive unit) enforcement provides the ability to drop frames that exceed a configured threshold on the ingress interface.
- Written by Swati Patel
- Posted on February 11, 2021
- Updated on October 22, 2024
- 12744 Views
[L2 EVPN] and [Multicast EVPN IRB] solutions allow for the delivery of customer BUM (Broadcast, Unknown unicast
- Written by Bharathram Pattabhiraman
- Posted on February 11, 2021
- Updated on September 21, 2023
- 25198 Views
This solution allows delivery of multicast traffic in an IP VRF using multicast in the underlay network. It builds on
- Written by Aparna Karanjkar
- Posted on June 17, 2019
- Updated on May 3, 2024
- 9875 Views
EOS supports reading and streaming various OpenConfig configuration and state models over gNMI (gRPC Network Management Interface), RESTCONF, and NETCONF transports. A subset of the configuration models may also be modified over these transports
- Written by Hind Kishore Geel
- Posted on December 22, 2020
- Updated on February 5, 2022
- 8454 Views
This feature introduces the support for OSPF routes over GRE tunnels under default as well as non default VRFs. The
- Written by Tanushree Bansal
- Posted on February 23, 2022
- Updated on June 2, 2022
- 7103 Views
This feature provides isolation and allows segregating/dividing the link state database based on interface.
- Written by Rahul Kumar Singh
- Posted on November 7, 2019
- Updated on December 27, 2021
- 7991 Views
In campus network deployments, classification of the devices connected to a switch port is required. Based on the
- Written by Petr Budnik
- Posted on December 16, 2020
- Updated on June 23, 2022
- 8126 Views
ITU-T G8275.1 is a PTP profile defined by ITU-T for telecommunication applications. It defines a set of functions from the IEEE 1588 to achieve phase/time synchronization with full timing support from the network (meaning, all of the network devices support PTP).
- Written by Shifeng Jin
- Posted on December 7, 2020
- Updated on December 9, 2020
- 8013 Views
Since the introduction of PTP Monitoring feature[1], PTP is capable of recording recent metrics for offset from
- Written by Sulyab Thottungal Valapu
- Posted on December 7, 2020
- Updated on December 9, 2020
- 7684 Views
This document describes the feature that allows the redistribution of VRF leaked BGP routes into OSPFv2 and OSPFv3.
- Written by Ram Prasad
- Posted on October 22, 2018
- Updated on October 19, 2021
- 10382 Views
This feature allows a Service Provider (SP) or an Enterprise to provide the service of interconnecting
- Written by Paulo Panhoto
- Posted on December 15, 2020
- Updated on August 19, 2021
- 7836 Views
This is an extension to BGP MPLS VPNs that allows us to use iBGP as the PE CE protocol. This feature also provides a way to
- Written by Nikhil Satish Pai
- Posted on December 7, 2020
- Updated on December 9, 2020
- 7115 Views
This feature adds support for the match ospf instance <instanceID> clause under the route map config.
- Written by Eamon Doyle
- Posted on December 15, 2020
- Updated on March 15, 2024
- 9883 Views
In a Service Provider (SP) network, a Provider Edge (PE) device learns virtual private network (VPN) paths from remote PEs and uses the Route Target (RT) extended communities carried by those paths to determine which customer Virtual Routing and Forwarding (VRF) the paths should be imported into (from where they can be subsequently advertised to Customer Edge (CE) devices).
- Written by Kalash Nainwal
- Posted on December 14, 2020
- Updated on July 31, 2024
- 12384 Views
RSVP-TE, the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), is used to distribute MPLS labels for steering traffic and reserving bandwidth. The Label Edge Router (LER) feature implements the headend functionality, i.e., RSVP-TE tunnels can originate at an LER which can steer traffic into the tunnel.
- Written by Gaofeng Yue
- Posted on June 3, 2020
- Updated on December 9, 2021
- 7283 Views
This feature introduces a metric for static routes so that the user can configure both administrative distance and