- Written by Christopher Brown
- Posted on December 22, 2017
- Updated on December 22, 2017
- 1688 Views
The IPv6 Neighbor Discovery protocol performs Neighbor Unreachability Detection (NUD) in order to determine if two
- Written by Anoop Dawani
- Posted on September 30, 2015
- Updated on February 5, 2022
- 1560 Views
Nexthop groups in EOS currently only support IPv4 entries and only IPv4 routes can point to nexthop groups. This
- Written by Satya Viswanathan
- Posted on December 9, 2015
- Updated on February 5, 2022
- 1723 Views
Policy-Based Routing (PBR) provides the flexibility of routing according to custom-defined policies
- Written by Jahnavi Singhal
- Posted on June 29, 2016
- Updated on February 5, 2022
- 1584 Views
With this, IPv6 routes can be configured pointing to a static Nexthop group of 2 types:. Type
- Written by Jayden Navarro
- Posted on November 22, 2017
- Updated on February 7, 2022
- 1623 Views
IPv6 Router Advertisement Consistency Logging, when enabled, allows for notification through syslogging of
- Written by Rachee Singh
- Posted on April 10, 2015
- Updated on May 1, 2015
- 1560 Views
This feature adds IPv6 VRF support to Open Shortest Path First(OSPF) Protocol version 3. It allows for OSPFv3
- Written by Roland Phung
- Posted on April 23, 2015
- Updated on May 1, 2015
- 1609 Views
EOS 4.15.0F is introducing support of IPv6 management capabilities inside a VRF. This means existing management
- Written by Ganesh Sundaresan
- Posted on May 1, 2015
- Updated on May 1, 2015
- 1551 Views
This feature adds the support for IPv6 unicast in a VRF context in EOS. This entails static routing and dynamic
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 1549 Views
IS IS adjacency uptime describes the uptime or downtime of neighbors since the last state change.
- Written by Anoop Dawani
- Posted on September 30, 2015
- Updated on February 6, 2022
- 1598 Views
Bidirectional Forwarding Detection(BFD) is a low overhead protocol designed to provide rapid detection of
- Written by Kamala R
- Posted on September 30, 2015
- Updated on September 30, 2015
- 1595 Views
Two forms of authentication are supported by the IS IS routing protocol:. Clear text authentication.
- Written by Nikhil Goyal
- Posted on November 22, 2017
- Updated on December 23, 2021
- 1822 Views
IS IS Graceful Restart adds support for Restart Signaling for IS IS, IETF RFC 5306. When IS IS is used
- Written by Nandan Saha
- Posted on September 30, 2015
- Updated on September 30, 2015
- 1576 Views
By default if there's a hostname configured on the switch, it is used as the IS IS hostname. It is also possible to
- Written by Arpit Bansal
- Posted on September 30, 2015
- Updated on September 30, 2015
- 1667 Views
An IS IS router can be configured as Level 1 2 which can form adjacencies and exchange routing information with both
- Written by Arunprakash Sekar
- Posted on September 30, 2015
- Updated on September 30, 2015
- 1679 Views
IS IS Multi Topology support enables an IS IS router to compute a separate topology for IPv4 and IPv6 links in the
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 1873 Views
This feature enables an Arista switch to run the IS IS routing protocol over a tunnel interface to another IS IS
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on January 11, 2023
- 4148 Views
IS IS SR feature provides knobs to configure various types of segments which are distributed as part of IS IS LSPs (Link
- Written by Arpit Bansal
- Posted on September 30, 2015
- Updated on April 22, 2020
- 1653 Views
Level 1 2 routers set attached bit in their Level 1 LSPs to indicate their reachability to the rest of the network. A
- Written by Bharath Somayaji
- Posted on September 30, 2015
- Updated on September 30, 2015
- 1587 Views
SPF Timers can be used in IS IS to throttle the frequency of shortest path first (SPF) computations. In networks with a
- Written by Ashish Yadav
- Posted on February 8, 2017
- Updated on February 9, 2017
- 1583 Views
The default behavior of a level 1 router running IS IS is to install a default route to a level 1 2 router present in a
- Written by Aditya Gujral
- Posted on September 30, 2015
- Updated on September 30, 2015
- 1577 Views
This feature adds Intermediate System to Intermediate System (IS IS) support for IP version 6 (IPv6) address family
- Written by Weichen Zhao
- Posted on August 25, 2016
- Updated on August 25, 2016
- 1618 Views
This feature provides a way to export non ISIS routes into level 1, level 2 or both by using route map's set clause. The
- Written by Aditya Gujral
- Posted on September 30, 2015
- Updated on February 7, 2022
- 1597 Views
This feature extends the IS IS set overload bit command to support wait for BGP option. In scenarios
- Written by Mihyar Baroudi
- Posted on December 8, 2015
- Updated on December 21, 2015
- 1602 Views
In our current implementation, on a switch with default startup config or no config, all ports come up in access
- Written by Isidor Kouvelas
- Posted on December 22, 2017
- Updated on December 9, 2020
- 2652 Views
This feature is available when configuring BGP in the multi agent routing protocol model. Ethernet
- Written by Lavanya Conjeevaram
- Posted on June 29, 2016
- Updated on April 25, 2018
- 1910 Views
L3 interface ingress counters can be used to count routable traffic coming into the box on sub interfaces and vlan
- Written by Jayden Navarro
- Posted on February 8, 2017
- Updated on February 15, 2017
- 1653 Views
LACP on Loopback Interfaces allows for Active Port Channels on one or more interfaces whose link endpoints terminate
- Written by Jayden Navarro
- Posted on February 8, 2017
- Updated on February 9, 2017
- 1972 Views
LACP State Transition Event Monitoring on Arista switches allows for quick and filterable viewing of LACP state
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on February 2, 2016
- 2245 Views
LAGs are allocated hardware resources on transition from one member (software LAG) to two members (hardware LAG) and
- Written by Greg Poloczek
- Posted on September 11, 2017
- Updated on September 11, 2017
- 2030 Views
Arista switches use the hashing algorithm to load balance traffic among LAG (Link Aggregation Group) members
- Written by Stefan Rebaud
- Posted on March 31, 2017
- Updated on January 11, 2022
- 1791 Views
This document describes the current status of LANZ on DCS 7500R, DCS 7280R and DCS 7020R, for both polling and
- Written by Pinky Agrawal
- Posted on November 22, 2017
- Updated on December 22, 2017
- 1570 Views
LANZ on 7160S 32CQ, 7160 48YC6 and 7160 48TC6 adds support for monitoring congestion on front panel ports with Start,
- Written by Andrei Dvornic
- Posted on April 2, 2015
- Updated on January 17, 2023
- 2896 Views
Loop protection is a loop detection and prevention method which is independent of Spanning Tree Protocol (STP) and is not disabled when the switch is in switchport backup mode or port is in discarding state. The LoopProtect agent has a method to detect loops and take action based on the configuration by the user. In order to find loops in the system, a loop detection frame is sent out periodically on each interface that loop protection is enabled on. The frame carries broadcast destination MAC address, bridge MAC source address, OUI Extended EtherType 0x88b7 as well as information to specify the origins of the packet. When the switch receives a loop detection frame that originated from the same switch, then a loop is found. The switch errdisables the receiving interface to break the loop, until a timeout period has passed or it is manually reset.
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on November 17, 2016
- 2145 Views
The Label Distribution Protocol (LDP) is a protocol in the Multiprotocol Label Switching (MPLS) context that allows
- Written by Xin Guang (Tony) Du
- Posted on August 25, 2016
- Updated on November 23, 2020
- 3944 Views
The LDP pseudowire feature provides support for emulating Ethernet connections over a Multiprotocol Label
- Written by Peter Lam
- Posted on September 30, 2015
- Updated on April 10, 2018
- 2526 Views
Leaf Smart System Upgrade (SSU) provides the ability to upgrade the EOS image with minimal traffic disruption.
- Written by Sahil Midha
- Posted on December 22, 2017
- Updated on February 6, 2022
- 2523 Views
Link Fault Signalling (LFS) is a mechanism by which remote link faults are asserted over a link experiencing
- Written by Vikas Hegde
- Posted on June 29, 2016
- Updated on February 8, 2022
- 2024 Views
Support for Media Access Control Security (MACsec) with static keys was added in EOS 4.15.4. This feature brings
- Written by Sriram Rajagopalan
- Posted on September 30, 2015
- Updated on February 5, 2022
- 2969 Views
Maintenance mode is a framework to allow for the easy removal of elements of a switch or the entire switch from
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on February 6, 2022
- 1652 Views
Maintenance mode with sub interfaces is an extension to the maintenance mode feature released in EOS 4 15 2F. With this
- Written by Preyas Hathi
- Posted on June 2, 2022
- Updated on June 2, 2022
- 1038 Views
A server cluster or a cluster is a group of Wireless Manager (WM) servers. A cluster comprises a parent WM server and one or more child WM servers. A cluster is created to manage multiple servers using a single server.
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on February 8, 2022
- 1563 Views
MapReduce Tracer is an existing feature that monitors MapReduce nodes that are directly connected to Arista
- Written by Digvijay Gahlot
- Posted on December 22, 2017
- Updated on December 22, 2017
- 1771 Views
Classification of MPLS packets based on traffic class bits in MPLS header for QoS Policy Maps. DCS
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 1790 Views
Currently, the 'maximum routes' knob allows one to set an upper bound on the number of routes that can be received from a
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on March 4, 2022
- 3939 Views
Media Access Control Security (MACSec) is an industry standard encryption mechanism to protect all traffic flowing
- Written by Kevin Amiraux
- Posted on September 30, 2015
- Updated on September 30, 2015
- 2251 Views
Arista switches provide several mirroring features. Filtered mirroring to CPU adds a special destination to the
- Written by Mihyar Baroudi
- Posted on December 9, 2015
- Updated on May 29, 2019
- 3580 Views
This article covers two distinct but related features: Filtered Mirroring and Mirroring to GRE Tunnel. Filtered
- Written by Shamit Kapadia
- Posted on September 30, 2015
- Updated on September 30, 2015
- 3886 Views
In an MLAG setup, routing on a switch (MLAG peer) is possible using its own bridge/system MAC, VARP MAC or VRRP MAC.
- Written by Som Neema
- Posted on September 30, 2015
- Updated on September 30, 2015
- 2751 Views
MLAG currently checks for basic MLAG configuration to be consistent (e.g. domain id) before formation with the peer.
- Written by Tarun Soin
- Posted on February 15, 2018
- Updated on July 11, 2019
- 4094 Views
When MLAG peer link goes down, the secondary peer assumes the primary peer is down/dead, and takes over the primary