- Written by Vincent (Chia Hsuan)
- Posted on September 24, 2024
- Updated on May 19, 2025
- 2993 Views
A traffic storm is a flood of packets entering a network, resulting in excessive traffic and degraded performance. Storm control prevents network disruptions by limiting traffic beyond specified thresholds on individual physical LAN interfaces. Storm control monitors inbound traffic levels over one-second intervals and compares the traffic level with a specified benchmark. The storm-control command configures and enables storm control on the configuration mode physical interface.
- Written by Alok Kumar
- Posted on February 7, 2024
- Updated on May 7, 2025
- 6593 Views
Dot1q (802.1Q) is a tunneling protocol that encapsulates traffic from multiple customer (c-tag) VLANs in an additional single outer service provider (s-tag) VLAN for transit across a larger network structure that includes traffic from all customers. Tunneling eliminates the service provider requirement that every VLAN be configured from multiple customers, avoiding overlapping address space issues.
- Written by Ashit Tandon
- Posted on May 5, 2025
- Updated on May 5, 2025
- 214 Views
The packet path, prerequisites, and restrictions listed in this document apply to this feature as well Dynamic Twice NAT is a variant of the dynamic NAT feature where both the source and destination IP can be modified while forwarding a packet. One of the IP addresses will be dynamically assigned, while the other will be statically assigned.
- Written by Prashant Kumar
- Posted on April 30, 2025
- Updated on April 30, 2025
- 263 Views
In the realm of network service level agreements (SLAs), a customer often commits to a certain level of service for their clients. This may necessitate limiting bandwidth at the Layer 3 sub-interface level. Currently, egress service policies can achieve bandwidth control, but ingress control lacks a similar mechanism.
- Written by Brian Schuette
- Posted on April 30, 2025
- Updated on April 30, 2025
- 302 Views
Linear pluggable optics (LPO) represent a significant advancement in transceiver technology. These modules are designed to reduce costs, power consumption, and latency compared to traditional Digital Signal Processing (DSP) based transceivers.
- Written by Eudean Sun
- Posted on April 30, 2025
- Updated on April 30, 2025
- 359 Views
The Linux audit system provides the ability to record security events on the switch. Audit rules must be configured and enabled at the CLI. Audit rules can be configured in different groups to assist with organization and maintenance.
- Written by Hongda Huang
- Posted on April 25, 2025
- Updated on April 25, 2025
- 362 Views
The Lowest Load feature uses load as a key metric for selecting the best path. When this metric is prioritized, routers will choose the path with the lowest load as the best option.
- Written by Nik Zaborovskii
- Posted on December 8, 2020
- Updated on May 19, 2025
- 12136 Views
Multicast NAT is a feature that performs NAT translations on multicast traffic. It can be configured under SVIs,
- Written by Basil Saji
- Posted on November 9, 2020
- Updated on May 15, 2025
- 13192 Views
Private VLAN is a feature that segregates a regular VLAN broadcast domain while maintaining all ports in the same IP subnet. There are three types of VLAN within a private VLAN
- Written by Dongping Zhu
- Posted on March 3, 2023
- Updated on May 6, 2025
- 7736 Views
Leaf Smart System Upgrade (SSU) provides the ability to upgrade the EOS image with minimal traffic disruption. To perform the SSU, Spanning Tree Protocol (STP) should either be configured as MSTP or Rapid-PVST mode or should be disabled. Meanwhile, all ports should be configured with admin edge ports (i.e., all ports are supposed to connect to host only) and the BPDU guard should be enabled for all edge ports.
- Written by Prateek Mali
- Posted on August 19, 2020
- Updated on May 13, 2025
- 25642 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Rajesh Thakur
- Posted on June 28, 2024
- Updated on May 14, 2025
- 3090 Views
This feature is only applicable to shaped port-channel subinterfaces. Traffic destined to a shaped port-channel subinterface would be load-balanced across all members of the port-channel. Shaping configured on the port-channel subinterface will be directly used across all the members of port-channel. Load-balancing criterion for flows destined to a shaped port-channel subinterface is the same as parent port-channel load-balancing criterion. Each shaped port-channel subinterface consumes as many SPPID (System physical port identifier) as the number of members added to the port-channel along with one extra port-channel resource (LAG ID) to combine all these SPPID. Anchor based approach is default behavior and we explicitly need to enable and reload the system for this feature to work.
- Written by Prasanna Parthasarathy
- Posted on December 23, 2021
- Updated on May 13, 2025
- 17196 Views
SwitchApp is an FPGA-based feature available on Arista’s 713x-Series platforms. It performs ultra low latency Ethernet packet switching. Its packet switching feature set, port count, and port to port latency are a function of the selected SwitchApp profile. Detailed latency measurements are available in the userguide on the Arista Support site.
- Written by Vikas Saini
- Posted on April 30, 2025
- Updated on April 30, 2025
- 216 Views
Before release 4.34.0F traffic in Port Mode PW was always classified based on COS-To-TC global map irrespective of trust mode. This feature allows users to classify traffic in accordance with trust mode, default CoS and default DSCP of the interface.
- Written by Vincent He
- Posted on April 30, 2025
- Updated on April 30, 2025
- 224 Views
This feature introduces a slot level CLI command for SFP transceivers. When configured, EOS will only manage the transceiver via the low speed hardware pins. The command is intended to be used in situations where SMBUS communication to access transceiver EEPROM is not reliable, which would normally lead to EOS disabling the port. Enabling this feature ignores any EEPROM dependent functionality and only turns on the laser, which may allow the link to come up when the default factory settings for both ends of the link are compatible.
- Written by Rajeev Menon
- Posted on March 18, 2025
- Updated on April 30, 2025
- 480 Views
The feature introduces a CLI command for transceiver reinitialization, simulating a physical removal and reinsertion of the transceiver. This is a great feature for remote troubleshooting, when physical access is not possible or convenient. To configure, issue the CLI command "transceiver reinitialize slot" in exec mode. The command takes effect immediately, toggles the reset pin and initiates a transceiver initialization sequence.
- Written by Abhishek Kumar
- Posted on April 30, 2025
- Updated on April 30, 2025
- 225 Views
When the system exhausts ECMP resources, the Transient ECMP feature enables route programming through a single available next-hop from the original ECMP route. Once the system can program the full ECMP route, the transient ECMP route is removed after successfully installing the ECMP route.
- Written by Lavanya Conjeevaram
- Posted on September 11, 2017
- Updated on May 6, 2025
- 10929 Views
Unidirectional links is a feature that configures an Ethernet interface transmit and receive paths to be independent. Specifically, the transmit path can be up or down independent of the receive path being up or down.
- Written by Gowtham Rameshkumar
- Posted on September 15, 2023
- Updated on May 16, 2025
- 5265 Views
The Unified Forwarding Table (UFT) is a group of memories that is shared between Layer2 and Layer3 lookup tables with capabilities for variable partitions. Rather than separate Layer2 and Layer3 lookup tables of fixed size, the UFT may be partitioned to support user-requested combinations of Layer2 and Layer3 lookup tables of varying sizes. The new UFT partitioning CLI has capabilities to reconfigure individual forwarding table scales (Layer2, Layer3 Unicast, Layer3 Multicast) according to the user’s input. The CLI provides an interface for granular control of the underlying UFT resources.
- Written by Jialong Chen
- Posted on April 25, 2025
- Updated on April 25, 2025
- 366 Views
This feature allows the VRRP MAC to be advertised via EVPN MAC-only routes when VRRP is configured on the VTEP.
- Written by Swaroop George
- Posted on April 15, 2021
- Updated on May 2, 2025
- 9579 Views
This feature allows selecting Differentiated Services Code Point (DSCP) and Traffic Class (TC) values for packets at VTEPs along VXLAN encapsulation and decapsulation directions respectively. DSCP is a field in IP Header and TC is a tag associated with a packet within the switch, both influence the Quality of Service the packet receives. This feature can be enabled via configuration as explained later in this document.
- Written by Saurabh Kumar
- Posted on April 25, 2025
- Updated on April 25, 2025
- 360 Views
Pathfinder deployments have restrictions on what devices can form a DPS tunnel between them. All the devices are categorized as either Site or Zone transit or Region transit.