- Written by David Cronin
- Posted on March 4, 2022
- Updated on April 16, 2024
- 12233 Views
Routing control functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by Kalash Nainwal
- Posted on December 14, 2020
- Updated on February 19, 2024
- 9530 Views
RSVP-TE, the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), is used to distribute MPLS labels for steering traffic and reserving bandwidth. The Label Edge Router (LER) feature implements the headend functionality, i.e., RSVP-TE tunnels can originate at an LER which can steer traffic into the tunnel.
- Written by Martin Stigge
- Posted on October 22, 2018
- Updated on February 26, 2024
- 8050 Views
RSVP-TE applies the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), i.e., to distribute MPLS labels for steering traffic and reserving bandwidth.
- Written by Jeevan Kamisetty
- Posted on November 4, 2020
- Updated on February 13, 2024
- 11226 Views
Network administrators require access to flow information that passes through various network elements, for the purpose of analyzing and monitoring their networks. This feature provides access to IP flow information by sampling traffic flows in ingress and/or egress directions on the interfaces on which it is configured.
- Written by Haomin
- Posted on April 12, 2024
- Updated on April 12, 2024
- 413 Views
Some configurations in NAT may have some trade-offs and even cause problems. The Show Configuration Consistency NAT CLI can check these configurations, and provide hints to change the configuration or the trade-offs to be considered.
- Written by Karan Jagjit Kumar
- Posted on June 29, 2023
- Updated on February 15, 2024
- 3717 Views
Smart System Upgrade (SSU) provides the ability to upgrade the EOS image with minimal traffic disruption. This is an existing feature on many fixed system products. This resource will outline the SSU feature in reference to CCS-720DP, CCS-722XPM, CCS-720XP-96ZC2 and DCS-7010TX.
- Written by Brian Neville
- Posted on November 8, 2023
- Updated on March 15, 2024
- 1977 Views
gNSI (gRPC Network Security Interface) defines a set of gRPC-based microservices for executing security-related operations on network devices.
- Written by Ian McCloghrie
- Posted on January 30, 2024
- Updated on January 31, 2024
- 989 Views
IPsec is a standard for enabling secure network communication between two devices using the Internet Protocol (IP) by way of an encrypted packet tunnel.Previous versions of Arista EOS have required that IPsec tunnels use the default VRF for underlay traffic.Starting with the release 4.31.0, this restriction is removed and EOS now supports IPsec tunnel interfaces using one or more non-default VRFs.
- Written by Harsh Goyal
- Posted on December 21, 2020
- Updated on February 15, 2024
- 5938 Views
IPv4 Unicast Reverse Path Forwarding (uRPF) can help limit malicious IPv4 traffic on a network. uRPF works by enabling the router to verify reachability (routing) of the source IP address (SIP) in the packet being forwarded. If the SIP is determined to not be a valid address, the packet is dropped.
- Written by Rajan Keshari
- Posted on January 30, 2024
- Updated on January 30, 2024
- 938 Views
When MPLS (Multiprotocol Label Switching) LFIB (Label Forwarding Information Base) lookup fails, typical forwarding behavior is to drop such packets. This feature allows fallback IP lookup when MPLS lookup fails and forwards traffic to an IP path by looking up the packet’s destination IP address in the route table if the network topologies have labeled paths programmed & IP based routes are also available for the same destination.
- Written by Legena P K
- Posted on August 21, 2020
- Updated on February 15, 2024
- 5239 Views
IPv6 Unicast Reverse Path Forwarding (uRPF) can help limit malicious IPv6 traffic on a network. uRPF works by
- Written by Nikhil Goyal
- Posted on January 29, 2024
- Updated on January 29, 2024
- 1365 Views
Segment Routing provides a mechanism to define end-to-end paths within a topology by encoding paths as sequences of sub-paths or instructions. These sub-paths or instructions are referred to as “segments”. OSPF Segment Routing (henceforth referred to as OSPF SR) provides means to advertise such segments through OSPF protocol.
- Written by Gokul Unnikrishnan
- Posted on March 3, 2023
- Updated on January 30, 2024
- 2893 Views
This feature allows for the configuration of password requirements when creating or modifying local user accounts. Specifically, policies can necessitate that passwords meet the following requirements:
- Written by Prakash
- Posted on January 31, 2024
- Updated on January 31, 2024
- 980 Views
This feature will enable the configuration of IPv6 static routes with IPv4 next-hops and a MPLS label value where the IPv4 next-hop is allowed to resolve only through tunnel RIB. This will allow users to install 6PE routes using static route configuration thereby connecting IPv6 islands over IPv4 MPLS cloud.
- Written by Muhammad Yousuf
- Posted on September 9, 2021
- Updated on February 27, 2024
- 6513 Views
This TOI supplements the Ingress Traffic Policy applied on ingress interfaces. Please refer to that document for a description of Traffic Policies and field-sets. This TOI explains the Traffic Policies as applied in the egress direction on interfaces
- Written by Michael
- Posted on January 31, 2024
- Updated on January 31, 2024
- 733 Views
This TOI supplements the Ingress Traffic Policy applied on ingress port interfaces. Please refer to that document for a description of Traffic Policies and field-sets. This TOI explains the Traffic Policies as applied in the ingress direction on VLAN interfaces.
- Written by Kailin Zhang
- Posted on February 19, 2024
- Updated on February 19, 2024
- 369 Views
In STP Rapid-PVST mode, when multiple VLANs are assigned to different interfaces using switchport mode access and these interfaces are interconnected, the VLANs perceive each other as part of the same VLAN, thereby forming a large single VLAN network.
- Written by Shelly Chang
- Posted on January 6, 2022
- Updated on May 3, 2024
- 6423 Views
This feature introduces hardware forwarding support of IPv4 multicast traffic over IPv4 GRE tunnel interfaces in Arista Switches. Multicast source traffic can reach the receivers which are separated by an IP cloud which is not configured for IP multicast routing by utilizing a GRE tunnel.
- Written by Victoria Austin
- Posted on June 5, 2023
- Updated on May 2, 2024
- 1381 Views
This feature is disabled by default. It can be enabled by a CLI toggle "logging transceiver communication" under the "monitor layer1" config mode. Note that “logging transceiver” will enable SMBus communication failure and digital optical monitoring syslogs. See under Resources for more information on digital optical monitoring syslogs.
- Written by Anais Taing
- Posted on June 5, 2020
- Updated on January 25, 2024
- 5315 Views
In TAP Aggregation mode, when receiving a packet whose Frame Check Sequence (FCS) is corrupted, the default behavior is to replace the bad FCS with the correct value and forward it.
- Written by Gowtham Rameshkumar
- Posted on September 15, 2023
- Updated on February 27, 2024
- 1765 Views
The Unified Forwarding Table (UFT) is memory that is shared between Layer2 and Layer3 lookup tables with capabilities for variable partitions. Rather than separate Layer2 and Layer3 lookup tables of fixed size, the UFT may be partitioned to support user-requested combinations of Layer2 and Layer3 lookup table sizes. The new UFT partitioning CLI has capabilities to reconfigure individual forwarding table scales (Layer2, Layer3 Unicast, Layer3 Multicast) according to the user’s input. The CLI provides an interface for granular control of the underlying UFT resources.
- Written by Rashid Akhtar
- Posted on February 6, 2024
- Updated on February 7, 2024
- 964 Views
Unicast reverse-path forwarding (uRPF) is a security feature that validates the source IP address of an incoming packet to ensure that the incoming packet has originated from a legitimate/valid source. If validation of the source IP address fails, then the packet is dropped, thus preventing IP spoofing from illegitimate/invalid sources.
- Written by Bharadwaj Gosukonda
- Posted on June 20, 2022
- Updated on February 15, 2024
- 4655 Views
Unicast Reverse Path Forwarding (uRPF) can help limit malicious IPv4/IPv6 traffic on a network. uRPF works by enabling the router to verify reachability (routing) of the source IP address (SIP) in the packet being forwarded. If the SIP is determined to be an invalid address, the packet is dropped.
- Written by Pratishtha Panwar
- Posted on August 31, 2023
- Updated on February 15, 2024
- 1090 Views
This feature allows Unicast Reverse Path Forwarding (uRPF) to be enabled along with Routes in Exact Match Table( REM/FlexRoute ). One prefix length can be selected to be in the Large Exact Match table (LEM) along with uRPF support.
- Written by Deepanshu Shukla
- Posted on January 31, 2024
- Updated on January 31, 2024
- 1196 Views
This article describes how to configure a TCAM ( Ternary Content Addressable Memory ) profile for ingress filtered mirroring sessions. This profile allows mirroring sessions to use less TCAM resources by individually selecting the allowable match criteria.
- Written by Isidor Kouvelas
- Posted on February 28, 2022
- Updated on February 2, 2024
- 11552 Views
Virtual Private LAN Service (VPLS) appears in (almost) all respects as an Ethernet type service to customers of a Service Provider (SP). A VPLS glues together several individual LANs across a packet switched network to appear and function as a single bridged LAN.
- Written by Alton Lo
- Posted on February 22, 2024
- Updated on February 26, 2024
- 637 Views
With a static configured import and export route-target for a given vlan-aware-bundle, all its VLAN members share the same route-target value. For example, EVPN uses the same route-target in the Type2 EVPN route advertisements for hosts residing in two different VLAN of the same bundle.
- Written by Gary McCarthy
- Posted on January 30, 2024
- Updated on January 30, 2024
- 1087 Views
VRF redirection often requires matching packets’ source addresses against one or more sets of IP prefixes. This can become difficult to manage when the prefix sets need to be consistently maintained on several devices and either change too frequently or are very large. When the prefixes for the prefix sets are learned by BGP, this feature provides an alternative to maintaining unwieldy sets of statically configured IP prefixes.
- Written by Simon Liang
- Posted on September 5, 2021
- Updated on April 23, 2024
- 6581 Views
This document describes the VRF selection policy and VRF fallback feature. A VRF selection policy contains match rules that specify certain criteria (e.g. DSCP, IP protocol) as well as a resulting action to select a VRF in which to do the FIB lookup.
- Written by Navlok Mishra
- Posted on February 8, 2017
- Updated on February 6, 2024
- 5567 Views
WRED ( Weighted Random Early Detection ) is one of the congestion management techniques.