- Written by Vipul Shah
- Posted on 3月 13, 2020
- Updated on 5月 4, 2022
- 3426 Views
The goal of IAR operation is to minimize the CPU processing and churn in hardware by identifying a set of nexthop adjacencies such that updating those adjacencies in-place is sufficient to correctly forward the traffic quickly for all the affected routes.
- Written by Manoj Agiwal
- Posted on 9月 30, 2015
- Updated on 3月 28, 2022
- 4186 Views
BGP Non Stop Forwarding (NSF) aims to minimize the traffic loss when the the following scenarios occur:
- Written by Madhu Sudan
- Posted on 6月 21, 2020
- Updated on 1月 9, 2023
- 3525 Views
Several customers have expressed interest in using IPv6 addresses for VXLAN underlay in their Data Centers (DC). Prior to 4.24.1F, EOS only supported IPv4 addresses for VXLAN underlay, i.e., VTEPs were reachable via IPv4 addresses only.
- Written by Zhen Xue
- Posted on 6月 29, 2020
- Updated on 6月 1, 2023
- 3518 Views
Bidirectional Forwarding Detection (BFD) is a protocol that provides low-overhead, short-duration detection of failures of arbitrary paths between two systems.
- Written by Prateek Mali
- Posted on 8月 19, 2020
- Updated on 3月 15, 2023
- 7227 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Anais Taing
- Posted on 6月 5, 2020
- Updated on 4月 18, 2022
- 2356 Views
In TAP Aggregation mode, when receiving a packet whose Frame Check Sequence (FCS) is corrupted, the default behavior is to replace the bad FCS with the correct value and forward it.
- Written by Shyam Kota
- Posted on 6月 14, 2019
- Updated on 6月 1, 2023
- 5521 Views
This article describes a set of CLI commands to create TCAM profiles. The profile is composed of a set of TCAM features, with each feature having customized lookup key, actions and packet types to hit.