- Written by Paul Fallon
- Posted on August 28, 2020
- Updated on April 24, 2025
- 9957 Views
For a pair of QSFP100 ports grouped together on a gearbox, it is possible to enable a 10G or 25G link on the first primary port while maintaining the usage of the secondary port at any speed. For two QSFP100 ports on a gearbox, the primary port allows for breakout speeds 4x10G and 4x25G, while the secondary does not. The configuration of the primary port determines whether the secondary port can be used since in a full breakout mode such as 4x10G the secondary port is forced inactive.
- Written by Bohan Yang
- Posted on March 31, 2017
- Updated on January 11, 2022
- 10462 Views
In EOS 4.18.1, support for 25G/50G is added on 7500R, 7280R, 7500R2 and 7280R2 series. This feature provides forced
- Written by Eamon Doyle
- Posted on February 8, 2017
- Updated on February 9, 2017
- 8351 Views
The BGP extended communities support within EOS has been enhanced to include support for 4 octet AS Extended BGP
- Written by Lavanya Conjeevaram
- Posted on September 11, 2017
- Updated on February 6, 2022
- 8537 Views
Starting EOS release 4.15.2F, the ability to re number front panel ports of 7050QX 32S is supported.
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on February 16, 2017
- 8412 Views
The 7500E 6CFPX LC linecard with ACO CFP2 optics provides connectivity over DWDM systems and links. 7500E 6CFPX LC
- Written by Dhruba Jyoti Pokhrel
- Posted on December 13, 2024
- Updated on December 19, 2024
- 1794 Views
The 802.11be standards build on 802.11ax by providing ultra-high throughput, improved resource utilization, and interference mitigation. The 320 MHz support increases the throughput and performance in the 6GHz band. The improved resource utilization is attributed to the introduction of Multiple Resource Units (MRU) in Orthogonal Frequency Division Multiple Access (OFDMA) transmission and Multi-Link Operation (MLO).
- Written by Graeme Rennie
- Posted on March 31, 2017
- Updated on April 18, 2022
- 10345 Views
This article describes a feature for Tap Aggregation mode, which strips IEEE 802.1BR E-Tag and Cisco VN-Tag headers from all tagged packets received on tap interface before delivering them out of tool interfaces.
- Written by Tarun Jaswanth LNU
- Posted on August 24, 2020
- Updated on May 13, 2025
- 32160 Views
802.1X is an IEEE standard protocol that prevents unauthorized devices from gaining access to the network.
- Written by Yitao (Eric) Wu
- Posted on April 14, 2015
- Updated on May 13, 2015
- 8386 Views
802.1X port security controls who can send traffic through and receive traffic from the individual switch ports. A
- Written by Can Sun
- Posted on June 19, 2025
- Updated on June 19, 2025
- 52 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on June 19, 2025
- 51 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on June 19, 2025
- 46 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on June 19, 2025
- 47 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on June 19, 2025
- 45 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on June 19, 2025
- 51 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on June 19, 2025
- 62 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on June 19, 2025
- 57 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on June 19, 2025
- 52 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Julie Powell
- Posted on July 25, 2024
- Updated on July 25, 2024
- 3052 Views
You can now enable CloudVision to combine the authentication and authorization requests that it sends to a RADIUS server into a single request. When RADIUS is configured as the AAA provider, CloudVision will send separate authentication and authorization requests by default. This can cause issues with One-Time Password (OTP) users, as issued passwords are only valid for one request. Note: Non-OTP RADIUS systems will be unaffected by the change. To combine authentication and authorization requests, navigate to Settings > Access Control and enable the Combine Login Auth Requests checkbox.
- Written by Joseph Walsh
- Posted on October 30, 2024
- Updated on October 30, 2024
- 2214 Views
This studio enables you to quickly configure access interfaces towards endpoint devices in your campus network. This configuration relates to the devices in Access Pods deployed using the Campus Fabric (L2/L3/EVPN) Studio.
- Written by Joseph Walsh
- Posted on July 25, 2024
- Updated on July 25, 2024
- 3020 Views
This studio enables you to quickly configure access interfaces towards endpoint devices in your campus network. This configuration relates to the devices in Access Pods deployed using the Campus Fabric (L2/L3/EVPN) Studio. The studio consists of port profiles and campus networks. You can create port profiles, which contain configuration for attributes like speed and MTU, which you can then assign to device interfaces in a campus fabric. Editing the profile will then affect all interfaces that the profile has been assigned to. You can also configure individual interfaces.
- Written by Preyas Hathi
- Posted on June 2, 2022
- Updated on June 2, 2022
- 7708 Views
With the 12.0 release, CloudVision Cognitive Unified Edge (CV-CUE) introduces Access Points (AP) Explorer. AP Explorer helps you view the distribution of APs by various attributes such as Model, Software Version, Status, and so on.
- Written by Gurpreet Singh
- Posted on September 30, 2015
- Updated on June 15, 2018
- 8575 Views
This feature enables user to modify QoS parameters for SVI traffic (L3 VLAN) based on ACL classification. The QoS
- Written by Mohit Saxena
- Posted on May 1, 2015
- Updated on June 15, 2018
- 9434 Views
Ingress policing provides the ability to monitor the data rates for a particular class of traffic and perform action
- Written by Julie Powell
- Posted on July 25, 2024
- Updated on July 25, 2024
- 2949 Views
A new role permission, Action Execution, has been introduced to control the execution of custom actions when they are run in isolation, such as via Studio Autofill actions and standalone executions in the Action editor. A custom action is a user-created action that has either been installed via a package or has been created using python script and arguments.
- Written by Shashank Hegde
- Posted on September 30, 2015
- Updated on September 30, 2015
- 8202 Views
The active active neutron controller support in CVX enables the deployment of highly available neutron service with
- Written by Gaurav Verma
- Posted on April 15, 2015
- Updated on February 6, 2022
- 8900 Views
Starting EOS 4.15.0F, users can configure NAT at IP address level with dynamically assigned one to one mapping
- Written by Michael (Mike) Fink
- Posted on December 22, 2017
- Updated on March 19, 2025
- 16564 Views
The following table describes the advanced mirroring features that are currently supported with links to their respective TOIs.
- Written by John Schimmel
- Posted on April 24, 2025
- Updated on June 3, 2025
- 2938 Views
The DANZ Monitoring Fabric (DMF) Aggregate Arista GRE TAP action receives GRE-encapsulated packet samples from EOS switches, and generates an IPFIX report containing the flow 5-tuple, metadata, and timestamps from switches that the packet passed through. Use the IPFIX report to determine the flows in a data fabric, monitor server session initialization delays, estimate the bandwidth of flows, and learn the path of packets through the fabric.
- Written by Bruno Perriot
- Posted on September 12, 2024
- Updated on September 12, 2024
- 2807 Views
The AGM for ECMP feature allows monitoring the number of packets and bytes going through each members of the configured ECMP groups on the system, with a high time resolution. Once enabled, the feature will collect data for the specified duration, write it to the specified files on the system’s storage, then stop.
- Written by John Schimmel
- Posted on May 2, 2025
- Updated on May 2, 2025
- 521 Views
The DANZ Monitoring Fabric (DMF) Aggregate sFlow takes sFlow packet samples and generates an IPFIX report containing the flow 5-tuple, metadata, and timestamps from switches that the packet passed through.
- Written by Prasoon Saurav
- Posted on February 8, 2017
- Updated on February 9, 2017
- 8442 Views
Aggregate storm control with traffic class option provides the capability to rate limit BUM(Broadcast, Unknown
- Written by Anoop Dawani
- Posted on September 30, 2015
- Updated on September 30, 2015
- 8154 Views
This article describes changes to the platform command 'show platform fm6000 agileports'. Earlier this command was
- Written by Deepak Sebastian
- Posted on August 31, 2023
- Updated on April 1, 2025
- 7383 Views
Agile ports allow users to connect 40G interfaces on 7130 products utilizing multiple SFP ports per 40G capable interface. This enables 40G capable applications, such as MetaConnect and MetaWatch, to operate at that speed.
- Written by Lavanya Conjeevaram
- Posted on June 29, 2016
- Updated on June 29, 2016
- 8571 Views
The 40G only ports on Trident 2 switches may now be configured as 1 lane of 10G, 1G, or 100M*. This
- Written by Prachi Modi
- Posted on July 7, 2023
- Updated on July 7, 2023
- 5988 Views
With the 15.0 release, CloudVision Cognitive Unified Edge (CV-CUE) introduces API Sandbox that allows you to try out API flows.
- Written by Pradeep Goyal
- Posted on December 22, 2017
- Updated on May 11, 2018
- 11457 Views
This features enables ARPs learnt on an SVI interface to be converted into Host routes which can further be
- Written by Sandeep Betha
- Posted on May 1, 2015
- Updated on May 1, 2015
- 8405 Views
The "set as path prepend" clause in the config route map mode is enhanced to accept the "auto" keyword. The "auto"
- Written by Trevor Mendez
- Posted on March 31, 2017
- Updated on March 31, 2017
- 13947 Views
This feature is provided on all platforms. The BGP listen range command has been modified to optionally allow
- Written by Todor Nikolov
- Posted on February 27, 2018
- Updated on February 5, 2022
- 1156 Views
Support for asset tagging aids hardware identification by the use of user supplied strings. Fixed
- Written by Subhash S
- Posted on July 2, 2024
- Updated on December 23, 2024
- 3515 Views
This feature adds support for associating a WAN interface with multiple Dynamic Path Selection (DPS) path groups to allow paths originating from the same interface to have different priorities.
- Written by Sonu Giri
- Posted on April 12, 2015
- Updated on January 7, 2025
- 8583 Views
AVB technology allows transporting time sensitive professional grade audio and video streams over a switched ethernet network while providing deterministic latency and bandwidth guarantees. Supporting protocols include:
- Written by Dhruba Jyoti Pokhrel
- Posted on February 2, 2023
- Updated on February 2, 2023
- 6659 Views
With the 13.0.1 release, you can authenticate wired hosts connected to the LAN ports of access points (W-118 and W-318) using 802.1X or MAC-based authentication. You can configure the authentication parameters for each downlink port on the access point (AP) using a LAN Port profile in CV-CUE. The communication happens either through a bridged network or transferred using L2 Tunnels.
- Written by Julie Powell
- Posted on October 25, 2024
- Updated on October 25, 2024
- 2121 Views
Use the Authentication Studio to configure RADIUS servers for user authentication and 802.1X authentication and accounting. The 802.1X authentication protocol is a port-based network access control that provides an extra layer of security for both wired and wireless networks.
- Written by Himanshu Singh
- Posted on April 25, 2025
- Updated on April 25, 2025
- 856 Views
Automatic certificate management provides support for retrieving signed x509v3 certificates from a server under the Enrollment over Secure Transport (EST) protocol, described in RFC 7030. The feature provides only EST client capabilities.
- Written by Anoop Dawani
- Posted on September 30, 2015
- Updated on February 6, 2022
- 9349 Views
This feature detects whether a given EOS image is MLAG ISSU compatible with the currently running version on a switch.
- Written by Preyas Hathi
- Posted on June 2, 2022
- Updated on June 2, 2022
- 7601 Views
CloudVision Cognitive Unified Edge (CV-CUE) dynamically computes and updates a baseline for normal performance and connectivity of the network. The baseline adjusts as the network behavior changes, eliminating the false positive and false negative alerts associated with thresholds.
- Written by Julie Powell
- Posted on July 29, 2024
- Updated on July 29, 2024
- 2867 Views
Use bearer tokens to provide custom applications or third-party applications, like Ansible, login access to CloudVision. Doing so will allow the application to make configuration changes to EOS devices. Bearer token login can be used with identity providers that issue bearer tokens and have an introspection endpoint. Okta and PingIdentity have been tested for use with CloudVision.
- Written by Travis Brown
- Posted on June 29, 2016
- Updated on February 4, 2022
- 10259 Views
As of EOS 4.17.0F, BFD support has been enhanced with support for configuring BFD within VRFs, improved scalability
- Written by Ankush Sharma
- Posted on December 22, 2017
- Updated on December 22, 2017
- 11426 Views
BFD for static routes enables monitoring of directly connected next hop reachability using a BFD session. This is