- Written by Alok Kumar
- Posted on November 29, 2023
- Updated on July 7, 2025
- 6080 Views
This feature provides a CLI command showing the list of mac addresses that could not be learned due to hash collision in the hardware table. A hash collision occurs when two or more distinct pieces of data map to the same entry ( or slot ) in the hardware table. It can happen when the hash function used to calculate the index for a given mac address results in the already occupied index, resulting in the failure of inserting the later mac address to the hardware table.
- Written by Basil Saji
- Posted on November 9, 2020
- Updated on July 21, 2025
- 14232 Views
Private VLAN is a feature that segregates a regular VLAN broadcast domain while maintaining all ports in the same IP subnet. There are three types of VLAN within a private VLAN
- Written by Jingyao Li
- Posted on July 10, 2025
- Updated on July 10, 2025
- 221 Views
This feature adds the support for tracking the number of syslog messages sent to the server and the number of syslog messages received on the server, along with other log forwarding action statistics, continuously within the existing syslog logging mechanism.
- Written by Bruno
- Posted on July 17, 2025
- Updated on July 17, 2025
- 158 Views
This feature terminates GTP packets arriving on a tap port of a TapAgg switch by stripping the GTP header. The decapsulated (inner) packets then proceed through the normal TapAgg path. This functionality allows a GTPv1 tunnel to transmit tapped traffic to the TapAgg switch over an L3 network, significantly extending the available use cases for TapAgg.
- Written by Sandeep Kopuri
- Posted on October 7, 2019
- Updated on July 24, 2025
- 15196 Views
Topology Independent Fast Reroute, or TI-LFA, uses IS-IS SR to build loop-free alternate paths along the post-convergence path. These loop-free alternates provide fast convergence.
- Written by Michael Wang
- Posted on July 2, 2024
- Updated on July 10, 2025
- 3520 Views
This feature introduces the ability to define matching rules to configure transceiver tuning on a switch. This is useful when a particular collection of transceivers are known to require tuning values which differ from EOS defaults.
- Written by John Weismiller
- Posted on July 23, 2025
- Updated on July 24, 2025
- 61 Views
The "forwarding action trap" feature allows you to divert all incoming network traffic for an interface directly to the switch’s CPU for inspection and analysis. This feature is useful for advanced network testing, gaining deeper visibility into specific traffic flows, and potentially emulating existing network behaviors. Be aware that directing a high volume of network traffic to the CPU via this feature can overwhelm it.
- Written by Kallol Mandal
- Posted on April 25, 2022
- Updated on July 25, 2025
- 11016 Views
Overlay IPv6 routing over VXLAN tunnel using an anycast gateway (direct routing) has been previously supported using the “ipv6 virtual-router” configuration for both the data-plane and EVPN (or CVX) control-plane learning environments.
- Written by Matthew Carrington-Fair
- Posted on March 3, 2023
- Updated on July 23, 2025
- 6914 Views
This feature allows the export of IP FIB (Forwarding Information Base) through the OpenConfig AFT YANG models.
- Written by Nikhil Satish Pai
- Posted on July 15, 2025
- Updated on July 15, 2025
- 182 Views
This feature allows configuring a static IS-IS neighbor to have a full adjacency on an interface, without needing an IS-IS peer at the other end.. The adjacency state will depend on the BGP session with a single hop eBGP peer presen t on the same interface: when the BGP session is established, the IS-IS adjacency will be up; in any other state, it will be down. This allows advertising an interface's traffic engineering information—like bandwidth and admin groups—within IS-IS without needing an IS-IS neighbor adjacency on the remote end.
- Written by Vipul Shah
- Posted on August 27, 2019
- Updated on July 17, 2025
- 8909 Views
BGP routing information often contains more than one path to the same destination network. The BGP best-path selection algorithm determines which of these paths should be considered as the best path to that network.
- Written by Rajeev Menon
- Posted on March 18, 2025
- Updated on July 17, 2025
- 1052 Views
The feature introduces a CLI command for transceiver reinitialization, simulating a physical removal and reinsertion of the transceiver. This is a great feature for remote troubleshooting, when physical access is not possible or convenient. To configure, issue the CLI command "transceiver reinitialize slot" in exec mode. The command takes effect immediately, toggles the reset pin and initiates a transceiver initialization sequence.
- Written by Rajeev Menon
- Posted on September 30, 2019
- Updated on July 9, 2025
- 9146 Views
This feature provides the capability to configure transceiver SERDES electrical tuning parameters. The ability to
- Written by Vipul
- Posted on July 10, 2025
- Updated on July 10, 2025
- 237 Views
This feature makes IGMP Snooping aware of VXLAN endpoints. Without this feature, multicast data traffic is flooded to all the VXLAN endpoints in case of a VXLAN VLAN. This increases the underlay network utilization. It is desirable to forward multicast traffic to only those VXLAN endpoints that are attached to receivers. To identify interested VXLAN endpoints, this feature snoops IGMP reports that are coming from the remote VXLAN endpoints. Note: EVPN control plane is not required when using this feature.
- Written by Rohit Maurya
- Posted on August 28, 2019
- Updated on July 22, 2025
- 8944 Views
The VXLAN VTEP and VNI counters feature allows the device to count VXLAN packets received and sent by the device on a per VTEP and per VNI basis. Specifically, it enables the device to count bytes and packets that are encapsulated and decapsulated as they are passing through.
- Written by Keerthana Parthasarathy
- Posted on March 4, 2025
- Updated on July 21, 2025
- 1780 Views
The primary purpose of the ZTX Node in Monitor Mode is to provide visibility into app-to-app traffic in the network, and to develop non-intrusive MSS policies that are aligned with applications requirements. Deploying group-based MSS policies is essential to secure Data Center and Campus environments, the ZTX Monitor Node provides the visibility needed to build such policies. The below diagram depicts how ZTX Node fits into a network to provide visibility.