- Written by Trevor Mendez
- Posted on December 20, 2021
- Updated on February 5, 2022
- 8096 Views
ACL based traffic management often requires matching packets’ destination addresses against one or more sets of
- Written by Peter Friend
- Posted on March 3, 2023
- Updated on March 16, 2023
- 4776 Views
Creating Traffic Policies that regulate control plane traffic from BGP peers by writing the list of BGP peer addresses statically in a field-set is error prone and difficult to update. Selecting only internal or external peers requires additional care. This feature automatically populates a field-set with IPv4 or IPv6 prefixes corresponding to iBGP or eBGP peers.
- Written by Denny Hung
- Posted on March 3, 2023
- Updated on March 13, 2023
- 4996 Views
This feature adds support to interface traffic policies for routing matched unicast IPv4 or IPv6 traffic which ingresses on L3 interfaces according to the routing table of a secondary VRF.
- Written by Venkata Vyshnav Lagisetty
- Posted on March 1, 2024
- Updated on March 1, 2024
- 2107 Views
The feature adds support for redirecting traffic matching on traffic policy rules applied to an egress interface to a specified next-hop or next-hop group. This feature requires the packet to be recirculated a second time through the packet forwarding pipeline to get its configured single or multiple next-hops to be resolved. This is achieved by configuring traffic-policy with redirect interface action applied on egress interface in conjunction with ingress redirect next-hop action applied on the recirculation interface. Redirect interface action is used to forward the egressing packet through an interface on which traffic loop-back ( a.k.a recirculation ) is enabled.
- Written by Bidong Chen
- Posted on September 7, 2021
- Updated on March 12, 2024
- 8499 Views
This feature extends the capabilities of Tap Aggregation traffic steering to allow for using traffic policies.
- Written by Prateek Mali
- Posted on August 19, 2020
- Updated on September 25, 2024
- 19846 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Aoxi Yao
- Posted on May 3, 2022
- Updated on September 18, 2023
- 7153 Views
This feature introduces the support for Traffic Policy on VLANs. Traffic Policy allows the user to configure rules to match on certain packets through the packet processing pipeline. The user can also place actions to match packets.