- Written by Alton Lo
- Posted on April 27, 2020
- Updated on July 14, 2023
- 7750 Views
As described in the L3 EVPN VXLAN Configuration Guide, it is common practice to use Layer 3 EVPN to provide multi
- Written by Deepak Sebastian
- Posted on November 12, 2019
- Updated on May 7, 2024
- 8655 Views
This feature adds support for offloading BFD Transmit path to hardware (ASIC) for specific types of BFD sessions. This will improve accuracy of transmit timer implementations for BFD (especially with fast timers like 50 ms) and relieve pressure on the main CPU in scenarios of scale.
- Written by Rahul Vasist
- Posted on April 20, 2020
- Updated on January 29, 2024
- 8623 Views
EOS-4.24.0 adds support for hardware-accelerated sFlow on R3 systems. Without hardware acceleration, all sFlow processing is done in software, which means performance is heavily dependent on the capabilities of the host CPU. Aggressive sampling rates also decrease the amount of processing time available for other EOS applications.
- Written by Kaladhar Musunuru
- Posted on May 4, 2020
- Updated on August 16, 2024
- 3585 Views
Ethernet VPN (EVPN) is an extension of the BGP protocol introducing a new address family: L2VPN (address family number 25) / EVPN (subsequent address family number 70). It is used to exchange overlay MAC and IP address reachability information between BGP peers using type-2 routes, but additionally, EVPN supports the exchange of layer 3 IPv4 and IPv6 overlay routes through the extensions described in (type 5 EVPN routes).
- Written by Kevin Amiraux
- Posted on September 30, 2015
- Updated on August 16, 2024
- 9545 Views
Arista switches provide several mirroring features. Filtered mirroring to CPU adds a special destination to the mirroring features that allows the mirrored traffic to be sent to the switch supervisor. The traffic can then be monitored and analyzed locally without the need of a remote port analyzer. Use case of this feature is for debugging and troubleshooting purposes.
- Written by Kaladhar Musunuru
- Posted on May 4, 2020
- Updated on July 14, 2023
- 6519 Views
This feature introduces support for ACL configuration on VXLAN decapsulated packets. The configured ACL rules will
- Written by Anitha Muppalla
- Posted on May 15, 2020
- Updated on September 28, 2023
- 6822 Views
Subinterfaces divide a single ethernet or port channel interface into multiple logical L2 or L3 interfaces based on the 802.1q or 802.1ad tags of incoming traffic. Subinterfaces are commonly used in the L2/L3 boundary device, but they can also be used to isolate traffic with 802.1q tags between L3 peers by assigning subinterfaces to different VRFs or different L2 bridging domains.