- Written by Jayden Navarro
- Posted on February 8, 2017
- Updated on February 9, 2017
- 4636 Views
Incoming LACPDU Rate Limit on Arista switches allows for errdisabling of ports experiencing a sustained rate of
- Written by Prachi Modi
- Posted on February 20, 2023
- Updated on February 20, 2023
- 2816 Views
With the 14.0 release, CV-CUE introduces an Infrastructure Dashboard that provides an overview of the health of all managed access points (APs).You can view the Infrastructure Dashboard by navigating to
- Written by Sudheer Y R
- Posted on May 1, 2015
- Updated on May 1, 2015
- 4915 Views
On DCS 7048, DCS 7280E, DCS 7500 and DCS 7500E, prior to EOS 4.14.5, multicast traffic using ingress replication would
- Written by Lavanya Conjeevaram
- Posted on June 29, 2016
- Updated on July 6, 2016
- 4708 Views
The feature enables support for displaying per traffic class counters on ingress interfaces. The feature is
- Written by Weichen Zhao
- Posted on August 25, 2016
- Updated on August 25, 2016
- 4633 Views
The Inner IP hashing for MPLSoGRE feature enabled hashing of inner IP source/destination address. With this
- Written by Mihyar Baroudi
- Posted on December 8, 2015
- Updated on February 5, 2022
- 4687 Views
The DCS 7280E and DCS 7500E platforms are virtual output queue (VOQ) based architectures where there is a VOQ for all
- Written by Dhruba Jyoti Pokhrel
- Posted on July 7, 2023
- Updated on July 7, 2023
- 2435 Views
One of the reasons why Wi-Fi clients encounter RF issues is non-Wi-Fi interference. All Wi-Fi 6 and above APs can perform interference classification. CloudVision Cognitive Unified Edge (CV-CUE) classifies interference into four categories — Wi-Fi, Microwave Oven (MWO), Frequency Hopping Spread Spectrum (FHSS), and Continuous Wave (CW).
- Written by Xuguang (Shawn) Yang
- Posted on May 1, 2015
- Updated on February 5, 2022
- 4698 Views
With this feature, Arista 7050 and 7050X series of switches can now decapsulate IP in IP tunneled packets.
- Written by Kartic Bhargav
- Posted on April 23, 2018
- Updated on May 15, 2018
- 5318 Views
Similar to L4 ports, ACL rules can be configured to filter ingress packets based on their IP length (present in the IPv4
- Written by Sarah Chen
- Posted on September 30, 2015
- Updated on September 30, 2015
- 5287 Views
IP Source Guard (IPSG) is a security feature that can help prevent IP spoofing attacks. It filters inbound IP packets
- Written by Kiranmayi Kasarapu
- Posted on September 30, 2015
- Updated on September 30, 2015
- 4453 Views
With this feature, IP packets matching a static Nexthop Group route can be encapsulated within an IP in IP tunnel and
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 6223 Views
This feature enables dataplane forwarding of IPv4 traffic on interfaces that are not IPv4 address enabled, but only
- Written by Dhanashree Nagre
- Posted on April 21, 2015
- Updated on February 7, 2022
- 5528 Views
IPv4 routes of certain prefix lengths can be optimized for enhanced route scale on 7500E, 7280E, 7500R and 7280R
- Written by Roland Phung
- Posted on May 1, 2015
- Updated on May 1, 2015
- 4668 Views
As of EOS 4.15.0F, VRRP is supported in a VRF context. Virtual IP addresses can be reused in different VRF contexts,
- Written by Manogna Namburi
- Posted on May 1, 2015
- Updated on July 24, 2023
- 4381 Views
IPv6 access lists can be used to filter IPv6 network traffic. Starting EOS 4.15.0F release, we have added support
- Written by Siddharth Verma
- Posted on May 1, 2015
- Updated on May 1, 2015
- 4383 Views
IPv6 egress ACLs applied to routed interfaces across the same chip on the DCS 7500E and the DCS 7280E series can be
- Written by Greg Poloczek
- Posted on April 10, 2015
- Updated on May 1, 2015
- 4544 Views
Arista switches use the hashing algorithm to load balance traffic among LAG (Link Aggregation Group) members
- Written by Christopher Brown
- Posted on December 22, 2017
- Updated on December 22, 2017
- 4555 Views
The IPv6 Neighbor Discovery protocol performs Neighbor Unreachability Detection (NUD) in order to determine if two
- Written by Anoop Dawani
- Posted on September 30, 2015
- Updated on February 5, 2022
- 4451 Views
Nexthop groups in EOS currently only support IPv4 entries and only IPv4 routes can point to nexthop groups. This
- Written by Satya Viswanathan
- Posted on December 9, 2015
- Updated on February 5, 2022
- 4653 Views
Policy-Based Routing (PBR) provides the flexibility of routing according to custom-defined policies
- Written by Jahnavi Singhal
- Posted on June 29, 2016
- Updated on February 5, 2022
- 4584 Views
With this, IPv6 routes can be configured pointing to a static Nexthop group of 2 types:. Type
- Written by Jayden Navarro
- Posted on November 22, 2017
- Updated on February 7, 2022
- 4543 Views
IPv6 Router Advertisement Consistency Logging, when enabled, allows for notification through syslogging of
- Written by Rachee Singh
- Posted on April 10, 2015
- Updated on May 1, 2015
- 4454 Views
This feature adds IPv6 VRF support to Open Shortest Path First(OSPF) Protocol version 3. It allows for OSPFv3
- Written by Roland Phung
- Posted on April 23, 2015
- Updated on May 1, 2015
- 4497 Views
EOS 4.15.0F is introducing support of IPv6 management capabilities inside a VRF. This means existing management
- Written by Ganesh Sundaresan
- Posted on May 1, 2015
- Updated on May 1, 2015
- 4345 Views
This feature adds the support for IPv6 unicast in a VRF context in EOS. This entails static routing and dynamic
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 4526 Views
IS IS adjacency uptime describes the uptime or downtime of neighbors since the last state change.
- Written by Anoop Dawani
- Posted on September 30, 2015
- Updated on February 6, 2022
- 4434 Views
Bidirectional Forwarding Detection(BFD) is a low overhead protocol designed to provide rapid detection of
- Written by Kamala R
- Posted on September 30, 2015
- Updated on July 20, 2023
- 5022 Views
The difference between the two forms of authentication is in the level of security provided. In case of clear text authentication, the password is specified as text in the authentication TLV, making it possible for an attacker to break the authentication by sniffing and capturing IS-IS PDUs on the network.
- Written by Nikhil Goyal
- Posted on November 22, 2017
- Updated on December 23, 2021
- 5024 Views
IS IS Graceful Restart adds support for Restart Signaling for IS IS, IETF RFC 5306. When IS IS is used
- Written by Nandan Saha
- Posted on September 30, 2015
- Updated on September 30, 2015
- 4493 Views
By default if there's a hostname configured on the switch, it is used as the IS IS hostname. It is also possible to
- Written by Arpit Bansal
- Posted on September 30, 2015
- Updated on September 30, 2015
- 4550 Views
An IS IS router can be configured as Level 1 2 which can form adjacencies and exchange routing information with both
- Written by Arunprakash Sekar
- Posted on September 30, 2015
- Updated on September 30, 2015
- 4645 Views
IS IS Multi Topology support enables an IS IS router to compute a separate topology for IPv4 and IPv6 links in the
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 4892 Views
This feature enables an Arista switch to run the IS IS routing protocol over a tunnel interface to another IS IS
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on May 7, 2024
- 11049 Views
Segment Routing provides mechanism to define end-to-end paths within a topology by encoding paths as sequences of sub-paths or instructions. These sub-paths or instructions are referred to as “segments”. IS-IS Segment Routing (henceforth referred to as IS-IS SR) provides means to advertise such segments through IS-IS protocol.
- Written by Arpit Bansal
- Posted on September 30, 2015
- Updated on April 22, 2020
- 4939 Views
Level 1 2 routers set attached bit in their Level 1 LSPs to indicate their reachability to the rest of the network. A
- Written by Bharath Somayaji
- Posted on September 30, 2015
- Updated on March 7, 2024
- 4754 Views
SPF Timers can be used in IS-IS to throttle the frequency of shortest-path-first (SPF) computations. In networks with a lot of churn, using these timers will help in containing the effect of network disruptions arising out of frequent SPF runs.
- Written by Ashish Yadav
- Posted on February 8, 2017
- Updated on February 9, 2017
- 4407 Views
The default behavior of a level 1 router running IS IS is to install a default route to a level 1 2 router present in a
- Written by Aditya Gujral
- Posted on September 30, 2015
- Updated on September 30, 2015
- 4460 Views
This feature adds Intermediate System to Intermediate System (IS IS) support for IP version 6 (IPv6) address family
- Written by Weichen Zhao
- Posted on August 25, 2016
- Updated on August 25, 2016
- 4649 Views
This feature provides a way to export non ISIS routes into level 1, level 2 or both by using route map's set clause. The
- Written by Aditya Gujral
- Posted on September 30, 2015
- Updated on February 7, 2022
- 4499 Views
This feature extends the IS IS set overload bit command to support wait for BGP option. In scenarios
- Written by Mihyar Baroudi
- Posted on December 8, 2015
- Updated on December 21, 2015
- 4636 Views
In our current implementation, on a switch with default startup config or no config, all ports come up in access
- Written by Isidor Kouvelas
- Posted on December 22, 2017
- Updated on December 9, 2020
- 6198 Views
This feature is available when configuring BGP in the multi agent routing protocol model. Ethernet
- Written by Lavanya Conjeevaram
- Posted on June 29, 2016
- Updated on April 25, 2018
- 5422 Views
L3 interface ingress counters can be used to count routable traffic coming into the box on sub interfaces and vlan
- Written by Jayden Navarro
- Posted on February 8, 2017
- Updated on February 15, 2017
- 4626 Views
LACP on Loopback Interfaces allows for Active Port Channels on one or more interfaces whose link endpoints terminate
- Written by Jayden Navarro
- Posted on February 8, 2017
- Updated on February 9, 2017
- 5332 Views
LACP State Transition Event Monitoring on Arista switches allows for quick and filterable viewing of LACP state
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on February 2, 2016
- 5452 Views
LAGs are allocated hardware resources on transition from one member (software LAG) to two members (hardware LAG) and
- Written by Greg Poloczek
- Posted on September 11, 2017
- Updated on September 11, 2017
- 5488 Views
Arista switches use the hashing algorithm to load balance traffic among LAG (Link Aggregation Group) members
- Written by Stefan Rebaud
- Posted on March 31, 2017
- Updated on January 11, 2022
- 5270 Views
This document describes the current status of LANZ on DCS 7500R, DCS 7280R and DCS 7020R, for both polling and
- Written by Pinky Agrawal
- Posted on November 22, 2017
- Updated on December 22, 2017
- 4375 Views
LANZ on 7160S 32CQ, 7160 48YC6 and 7160 48TC6 adds support for monitoring congestion on front panel ports with Start,
- Written by Andrei Dvornic
- Posted on April 2, 2015
- Updated on February 8, 2024
- 8594 Views
Loop protection is a loop detection and prevention method which is independent of Spanning Tree Protocol (STP) and is not disabled when the switch is in switchport backup mode or port is in discarding state. The LoopProtect agent has a method to detect loops and take action based on the configuration by the user. In order to find loops in the system, a loop detection frame is sent out periodically on each interface that loop protection is enabled on. The frame carries broadcast destination MAC address, bridge MAC source address, OUI Extended EtherType 0x88b7 as well as information to specify the origins of the packet.