- Written by Manoj Agiwal
- Posted on September 30, 2015
- Updated on March 28, 2022
- 7275 Views
BGP Non Stop Forwarding (NSF) aims to minimize the traffic loss when the the following scenarios occur:
- Written by Jonathan Kehler
- Posted on January 22, 2019
- Updated on October 19, 2021
- 2984 Views
This feature introduces the ability to match on 1) any BGP aggregate contributor or 2) a specific BGP aggregate’s
- Written by Vivek Ilangovan
- Posted on January 18, 2019
- Updated on July 20, 2023
- 2892 Views
This feature implements RFC 5310 that allows IS-IS PDUs to be authenticated using following secure hash algorithms (SHA): SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512. The feature is supported in both default and non-default vrf. Unlike the existing authentication scheme based on MD5 and ClearText, with this feature two IS-IS nodes can be configured with different SHA algorithm and secret-key and can still exchange IS-IS PDUs.
- Written by Arnab Das
- Posted on January 22, 2019
- Updated on January 27, 2023
- 2813 Views
EOS version 4.21.3F provides additional clear commands extending what is already available in EOS as described by the below TOI
- Written by Ravi Teja Guthikonda
- Posted on January 21, 2019
- Updated on July 12, 2023
- 1702 Views
Time stamping is an important tool for network engineering and performance analysis. EOS-4.21.3F adds support for payload timestamping of all GRE encapsulated mirrored packets at line rate (initially only supported on the 7500R/7280R/7500R2/7280R2 series). A timestamp is taken on ingress and inserted into the GRE encapsulated mirrored packet payload at egress.
- Written by Shyam Kota
- Posted on January 22, 2019
- Updated on January 22, 2019
- 2842 Views
RIB Route Control is a collection of mechanisms for controlling how IP routing table entries get used. Next hop
- Written by Michael Chin
- Posted on January 18, 2019
- Updated on September 15, 2023
- 4426 Views
The ‘show interfaces interactions’ command aims to provide users a resource that explains various relationships between ethernet interfaces. It describes interactions in which a configuration on an interface causes another set of interfaces to become inactive or have reduced capabilities.Examples include a primary interface consuming subordinate interfaces to service a four-lane speed or platform restrictions that require four interfaces of a port to operate at the same speed.