- Written by Tarun Jaswanth LNU
- Posted on August 24, 2020
- Updated on May 13, 2025
- 31205 Views
802.1X is an IEEE standard protocol that prevents unauthorized devices from gaining access to the network.
- Written by Himanshu Singh
- Posted on April 25, 2025
- Updated on April 25, 2025
- 440 Views
Automatic certificate management provides support for retrieving signed x509v3 certificates from a server under the Enrollment over Secure Transport (EST) protocol, described in RFC 7030. The feature provides only EST client capabilities.
- Written by Jason Shamberger
- Posted on March 11, 2020
- Updated on May 5, 2025
- 19076 Views
EOS 4.21.3F introduces support for BGP Flowspec, as defined in RFC5575 and RFC7674. The typical use case is to filter or redirect DDoS traffic on edge routers.
- Written by Yaonan Liang
- Posted on April 30, 2025
- Updated on April 30, 2025
- 399 Views
Peer Tagging Route Filtering feature discards BGP route advertisements by the peers which the routes are received from. The feature lets users assign a peer-tag to a peer or a group of peers in inbound direction and discard routes advertisements by the peer-tag in outbound direction. One use case of the feature is to discard AS loop routes in outbound direction in data center deployments.
- Written by Bhavin Patel
- Posted on March 24, 2020
- Updated on May 14, 2025
- 12260 Views
This feature allows failover to the backup path to occur in constant time per interface going down for features such as RSVP link protection, RSVP node protection, TI-LFA link protection, and BGP PIC. Without this feature enabled, it would take time proportional to the number of paths going over the interface experiencing the link down event to failover to the backup path. With this feature enabled, the failover time would be constant regardless of the number of paths.
- Written by Dylan Cho
- Posted on April 30, 2025
- Updated on April 30, 2025
- 249 Views
This feature implements the ability to configure any tx serdes parameters via the CLI. This is useful to work around any L1 issues that customers may encounter due to suboptimal networks/links/transceivers.
- Written by Tom Emmons
- Posted on October 22, 2024
- Updated on May 6, 2025
- 3478 Views
Cluster Load Balancing is a feature designed to ensure optimal load balancing of flows used as part of GPU based cluster communication. When this feature is enabled, a TOR router monitors RoCE traffic flowing between the GPU servers and spine uplinks and ensures optimal load balancing in the network.
- Written by Radu Handolescu
- Posted on March 3, 2023
- Updated on May 2, 2025
- 8499 Views
Common Management Interface Specification (CMIS) defines, starting with revision 4.0, a standard mechanism for managing the firmware of compliant transceivers. This mechanism allows for transceivers’ firmware to be updated without having to remove the transceiver from the switch. Firmware updates may be necessary in a testing or production environment to resolve potential firmware bugs. Some transceivers may also support firmware management operations in a hitless manner (without impacting traffic).
- Written by Xuan Qi
- Posted on April 30, 2025
- Updated on April 30, 2025
- 539 Views
This feature supports an alternative L3 EVPN gateway mechanism using multi-domain L3 VRF instead. A multi-domain IP VRF allows configuring not only the local domain route distinguisher (RD) and route targets (RT), but also the remote domain route distinguisher and route targets on a DCI gateway.
- Written by Deepak Sebastian
- Posted on August 18, 2022
- Updated on May 6, 2025
- 9190 Views
Arista’s DCS-7130LBR series of switches are powerful network devices designed for ultra latency applications along with a wealth of networking features.
- Written by Fathima Thasneem
- Posted on April 25, 2022
- Updated on May 16, 2025
- 9216 Views
As Ethernet technologies made their way into the Metropolitan Area Networks ( MAN ) and the Wide Area Networks ( WAN ), from the conventional enterprise level usage, they are now widely being used by service providers to provide end-to-end connectivity to customers. Such service provider networks are typically spread across large geographical areas. Additionally, the service providers themselves may be relying on certain internet backbone providers, referred to as “operators”, to provide connectivity in case the geographical area to be covered is too huge.
- Written by Sourabh Bollapragada
- Posted on December 22, 2020
- Updated on May 19, 2025
- 10294 Views
This feature supports counting ECN-marked packets (ECN = Explicit Congestion Notification) on a per egress port per tx-queue basis. The feature can be used to gather these packet counts via CLI or SNMP. There are two cases when an ECN-marked (congestion) packet is counted on the egress port/queue:
- Written by Sriharsha J
- Posted on May 1, 2015
- Updated on May 14, 2025
- 8270 Views
This feature allows generating the syslog message for the packets matching rules in egress ACLs. This can be enabled using the log keyword when configuring an ACL rule. A copy of the packet matching such an ACL rule is sent to the control plane, where a syslog entry for the packet header is generated.
- Written by Vamsi Anne
- Posted on December 29, 2021
- Updated on May 16, 2025
- 12629 Views
As Ethernet technologies made their way into the Metropolitan Area Networks (MAN) and the Wide Area Networks (WAN), from the conventional enterprise level usage, they are now widely being used by service providers to provide end-to-end connectivity to customers. Such service provider networks are typically spread across large geographical areas. Additionally, the service providers themselves may be relying on certain internet backbone providers, referred to as “operators”, to provide connectivity in case the geographical area to be covered is too huge. This mode of operation makes the task of Operations, Administration and Maintenance (OAM) of such networks to be far more challenging, and the ability of service providers to respond to such network faults swiftly directly impacts their competitiveness.
- Written by Christopher Yamashita
- Posted on January 3, 2025
- Updated on May 19, 2025
- 1429 Views
As Ethernet technologies made their way into the Metropolitan Area Networks (MAN) and the Wide Area Networks (WAN) from the conventional enterprise level usage, they are now widely being used by service providers to provide end-to-end connectivity to customers. Such service provider networks are typically spread across large geographical areas. Additionally, the service providers themselves may be relying on certain internet backbone providers, referred to as “operators”, to provide connectivity in case the geographical area to be covered is too huge. This mode of operation makes the task of Operations, Administration and Maintenance (OAM) of such networks far more challenging, and the ability of service providers to respond to frame loss in such networks directly impacts their competitiveness.
- Written by Shourya Agrawal
- Posted on April 25, 2025
- Updated on April 25, 2025
- 324 Views
This feature adds support for using the management port on AWE-7220RP-5TH-2S alternately as Ethernet8 port.
- Written by Ayush
- Posted on January 31, 2024
- Updated on May 15, 2025
- 5584 Views
In network deployments, where border leaf or Superspine act as PEG and it is in the transit path to other multicast VTEPs, the multicast stream will not pass since the border leaf will decapsulate the packet even if it doesn't have a receiver. This transit node is called the Bud Node. The device should be able to send decapsulated packets to any local receivers as well as send the encapsulated packets to other VTEPs.
- Written by Gokhan Tanisik
- Posted on April 25, 2025
- Updated on April 25, 2025
- 449 Views
This feature adds the ability for an L3 default gateway TEP in a Centralized Gateway topology to advertise its SVI virtual IP addresses to VARP MAC bindings and primary addresses to System MAC bindings using EVPN type-2 routes for EVPN VXLAN overlays. Two new commands, redistribute router-mac virtual-ip[next-hop vtep primary] and redistribute router-mac system ip are introduced to enable the redistributions. This would help the L2 TEP on the network to learn the default gateway IP without flooding an ARP request for the gateway IP. This feature is only intended for Centralized Gateway Topologies.
- Written by Marc Pawlowsky
- Posted on March 7, 2025
- Updated on May 15, 2025
- 827 Views
The agent DmaQueueMonitor provides visibility into packets coming up to the CPU via CPU queues. Packets are continuously sampled on monitored queues and kept available for reporting when a CPU congestion event occurs. When a queue that leads to CPU processing is congested a PCAP file may be created from the sampled packets that were captured from before and after the congestion event. The PCAP file is written to the file system for off-line examination.
- Written by James Shephard
- Posted on August 25, 2019
- Updated on May 19, 2025
- 12912 Views
Forwarding destination prediction enables visibility into how a packet is forwarded through the switch, allowing you to determine which interfaces a packet would egress out of. Typical use cases include, but are not limited to, determining egress members for Port-Channels and ECMPs.
- Written by Freedom Garcia
- Posted on December 24, 2024
- Updated on May 16, 2025
- 1589 Views
This feature, when enabled, allows NAT to function on traffic traversing between VRFs, over inter-VRF static routes or routes leaked to VRFs other than where they were configured.
- Written by Neel Neogi
- Posted on December 30, 2020
- Updated on May 15, 2025
- 15168 Views
The document describes the support for dedicated and group ingress policing on interfaces without using QoS policy-maps to match on the traffic and apply policing.
- Written by Kumaran Narayanan
- Posted on April 25, 2025
- Updated on May 2, 2025
- 455 Views
This feature enables IPv6 access control list (ACLs) on cloudEOS and Caravan devices, providing access control on incoming traffic (ingress direction). ACLs use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets.
- Written by Brett Hatch
- Posted on April 30, 2025
- Updated on April 30, 2025
- 257 Views
This feature provides an IPv6 address provisioning mechanism which is driven by tenant authentication results and offers inter-tenant traffic isolation. The generated IPv6 connected route subnets can also be summarized into aggregate routes dynamically for advertising out to BGP peers.
- Written by Shelly Chang
- Posted on October 24, 2024
- Updated on May 13, 2025
- 2072 Views
This solution allows delivery of both IPv4 and IPv6 multicast traffic in an IP-VRF using an IPv6 multicast in the underlay network. The protocol used to build multicast trees in the underlay network is IPv6 PIM-SSM.
- Written by Sarah Chen
- Posted on January 12, 2022
- Updated on May 5, 2025
- 12643 Views
IS-IS flexible algorithm (FlexAlgo) provides a lightweight, simplified mechanism for performing basic traffic engineering functions within a single IS-IS area. FlexAlgo requires the cooperation of all nodes within the IS-IS area but does not require an external controller. Paths are computed by each node within the area, resulting in an MPLS switched forwarding path to nodes that are advertising a node Segment Identifier (SID) for the algorithm. The results of the path computation are placed in the colored tunnel RIB or system tunnel RIB, which simplifies route resolution.
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on May 14, 2025
- 17258 Views
Segment Routing provides mechanism to define end-to-end paths within a topology by encoding paths as sequences of sub-paths or instructions. These sub-paths or instructions are referred to as “segments”. IS-IS Segment Routing (henceforth referred to as IS-IS SR) provides means to advertise such segments through IS-IS protocol.
- Written by Zeyad Tamimi
- Posted on March 3, 2023
- Updated on May 14, 2025
- 10893 Views
At a high level, L1 profiles are a set of configurations which allow EOS users to change the numbering scheme and default L1 configurations of all front panel interfaces across their network switch. On Arista network switches, front panel transceiver cages are exposed as ports which are numbered sequentially: 1, 2, 3, 4, etc. These identifiers are usually marked on the front panel to allow for easier identification.
- Written by Ajay Chhatwal
- Posted on May 15, 2020
- Updated on May 16, 2025
- 9868 Views
L2 protocol packets - LLDP, LACP and STP are trapped to the CPU by default. This feature allows for disabling the per protocol trap on a given set of interfaces.
- Written by Shriprama Rao
- Posted on November 20, 2023
- Updated on May 15, 2025
- 6741 Views
This feature allows encapsulating (and decapsulating) L2 traffic from a given interface or subinterface over a GRE tunnel. An MPLS label is added to identify the ingress interface (similar to MPLS pseudowires) and the GRE tunnel or nexthop-group is used to transport the packets to a remote endpoint.
- Written by Shyam Kota
- Posted on June 5, 2020
- Updated on May 14, 2025
- 9112 Views
This feature implements RFC 3478. It allows devices to preserve the MPLS LDP LFIB entries in the forwarding plane if the TCP connection is lost or LDP agent restarts.
- Written by Pedro Coutinho
- Posted on December 22, 2020
- Updated on April 30, 2025
- 13341 Views
The LDP pseudowire feature provides support for emulating Ethernet connections over a Multiprotocol Label Switching (MPLS) network using the extension of the MPLS Label Distribution Protocol (LDP)
- Written by Girish Dasari
- Posted on April 30, 2025
- Updated on April 30, 2025
- 270 Views
At a transit router when multiple LSP are available for a given destination from different protocols EOS does stitching based on hard coded preferences. LFIB stitching preferences give a provision to stitch together different LSPs based on configurable preferences. For each protocol(destination) preference can be configured for a given source protocol.
- Written by Sidak Aneja
- Posted on April 30, 2025
- Updated on April 30, 2025
- 243 Views
This TOI introduces a new global CLI configuration command to transition CMIS compliant transceivers to the low-power mode when all interfaces associated with the transceiver are shut down. Conversely, the transceivers will transition into high power mode when any interface associated with the transceiver is enabled.
- Written by Yashvir Singh
- Posted on March 2, 2021
- Updated on May 9, 2025
- 11030 Views
This feature allows classification of packets on QoS policy-maps based on the Class of Service (CoS), VLAN, Drop Eligible Indicator (DEI) in the 802.1q header of the packet. CoS (Class of Service) corresponds to the Priority code point (PCP) bits in the 802.1q header.
- Written by David Mirabito
- Posted on December 30, 2021
- Updated on May 21, 2025
- 20673 Views
MetaWatch is an FPGA-based feature available for Arista 7130 Series platforms. It provides precise timestamping of packets, aggregation and deep buffering for Ethernet links. Timestamp information and other metadata such as device and port identifiers are appended to the end of the packet as a trailer.
- Written by Kevin Amiraux
- Posted on September 30, 2015
- Updated on May 16, 2025
- 16628 Views
Arista switches provide several mirroring features. Filtered mirroring to CPU adds a special destination to the mirroring features that allows the mirrored traffic to be sent to the switch supervisor. The traffic can then be monitored and analyzed locally without the need of a remote port analyzer. Use case of this feature is for debugging and troubleshooting purposes.
- Written by Prakhar Rastogi
- Posted on April 23, 2018
- Updated on May 5, 2025
- 9813 Views
MLAG Smart System Upgrade (SSU) provides the ability to upgrade the EOS image of an MLAG switch with minimal traffic disruption.
- Written by Freedom Garcia
- Posted on November 5, 2021
- Updated on May 19, 2025
- 9368 Views
Non default VRF support is now available for Static unicast NAT. Twice NAT. Dynamic NAT. VRF support
- Written by Manjanagouda Patil
- Posted on April 30, 2025
- Updated on April 30, 2025
- 254 Views
Nexthop Group backup-activation events are produced by forwarding agents. Nexthop Groups supports configuring the backup paths through EOS RPC APIs and CLI. Whenever the route or prefix starts pointing to configured backup paths, a backup-activation event will be logged into the event-monitor DB with nexthop-group name, accurate timestamp and other attributes. The event monitoring feature also supports filtering the events based on the nexthop-group name, version etc.
- Written by Prashant Kumar
- Posted on April 30, 2025
- Updated on April 30, 2025
- 251 Views
Policy-map counters can be configured to display per-interface counters for all class-maps attached to all successfully programmed policy-maps. The feature is not enabled by default and has to be configured through the command line interface. When enabled, the output of the show command will display both per-interface and aggregate counters.
- Written by Mukund PB
- Posted on June 20, 2022
- Updated on May 8, 2025
- 8748 Views
Priority Flow Control (PFC) Watchdog feature monitors interfaces for priority-flow-control Pause storm. If such a storm is detected on no-drop enabled priorities, it takes actions such as:
- Written by Ioana Costea
- Posted on April 25, 2025
- Updated on April 25, 2025
- 322 Views
Introduced in the 4.34.0F release, the maximum links feature allows users to specify the number of active members in both LACP and static port-channels. If active members become inactive due to configuration changes or link failure, previously restricted members can become active. This ensures the port-channel remains operational, preventing disruptions even if all initial active members fail.
- Written by Tom Meng
- Posted on November 11, 2019
- Updated on May 7, 2025
- 8484 Views
Power management is a way to limit the total available power to be used for Power over Ethernet (PoE) ports. Without power management, the total amount of power that the power supply units (PSU) are able to provide is used. Power management can be used to create power redundancies. For example, if a system has 2 1050W PSUs, the feature can set the total available power to be 800W for PoE. With this configuration, 1 PSU is sufficient to power the system and the unused PSU acts as a backup source, thus giving the system a 1+1 redundancy.
- Written by Prakhar Rastogi
- Posted on February 26, 2024
- Updated on May 5, 2025
- 5930 Views
RADIUS proxy feature enables proxying RADIUS requests from a RADIUS client and forwarding it to a remote RADIUS server. Similarly, RADIUS proxy receives the reply from the remote RADIUS server and forwards it to the client.
- Written by David Cronin
- Posted on March 4, 2022
- Updated on May 19, 2025
- 20996 Views
Routing control functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by Kalash Nainwal
- Posted on December 14, 2020
- Updated on May 5, 2025
- 14588 Views
RSVP-TE, the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), is used to distribute MPLS labels for steering traffic and reserving bandwidth. The Label Edge Router (LER) feature implements the headend functionality, i.e., RSVP-TE tunnels can originate at an LER which can steer traffic into the tunnel.
- Written by Martin Stigge
- Posted on March 3, 2025
- Updated on May 14, 2025
- 841 Views
RSVP-TE P2MP LER adds ingress and egress support for Point-to-Multipoint (P2MP) LSPs to be used in Multicast Virtual Private Network (MVPN) as an extension to the LSR support which adds transit support.
- Written by Ruoyi Wang
- Posted on April 30, 2025
- Updated on April 30, 2025
- 283 Views
The sFlow EVPN MPLS extension adds support for providing information related to the bridging domain in sFlow packet samples, for traffic forwarded through L2 EVPN MPLS.
- Written by Przemyslaw Jacak
- Posted on April 30, 2025
- Updated on April 30, 2025
- 325 Views
This feature allows users to configure SNMP’s context to provide a value from a default context when no such value is provided in the context queried.
This feature aims to solve two problems: