- Written by Tula Kraiser
- Posted on 1月 3, 2021
- Updated on 6月 24, 2022
- 12098 Views
The primary challenge with using a switching ASIC as a load balancer has been how to deal with changes in the network topology without disrupting existing TCP connections.
- Written by Michael (Mike) Fink
- Posted on 12月 22, 2017
- Updated on 3月 19, 2025
- 20065 Views
The following table describes the advanced mirroring features that are currently supported with links to their respective TOIs.
- Written by Sandeep Betha
- Posted on 1月 22, 2021
- Updated on 3月 7, 2025
- 17324 Views
This feature adds support for user-configured BGP Nexthop Resolution RIB profiles for various BGP-based services e.g. IP unicast, L3 VPN, EVPN, etc. The feature allows an administrator to customize the next hop resolution semantics of BGP routes with an ordered list, or profile, of resolution RIB domains (i.e., either tunnel or IP domain). This allows EOS to direct specific services over the specified RIB domains, overriding the default behavior.
- Written by Manoj Agiwal
- Posted on 9月 30, 2015
- Updated on 7月 12, 2024
- 23835 Views
BGP Non Stop Forwarding (NSF) aims to minimize the traffic loss when the the following scenarios occur:
- Written by Jason Shamberger
- Posted on 4月 20, 2020
- Updated on 3月 10, 2025
- 16423 Views
RPKI provides a mechanism to validate the originating AS of an advertised prefix. Using the result of the validation to apply inbound policy in a route map.
- Written by Sourabh Bollapragada
- Posted on 12月 22, 2020
- Updated on 3月 23, 2026
- 13783 Views
This feature supports counting ECN-marked packets (ECN = Explicit Congestion Notification) on a per egress port per tx-queue basis. The feature can be used to gather these packet counts via CLI or SNMP.
- Written by AKSHAYA Sridharan
- Posted on 12月 17, 2020
- Updated on 10月 22, 2025
- 13138 Views
Egress traffic-policing can be applied on L3 Ethernet subinterfaces for outbound traffic.
- Written by Rahul Vasist
- Posted on 4月 20, 2020
- Updated on 1月 29, 2024
- 15041 Views
EOS-4.24.0 adds support for hardware-accelerated sFlow on R3 systems. Without hardware acceleration, all sFlow processing is done in software, which means performance is heavily dependent on the capabilities of the host CPU. Aggressive sampling rates also decrease the amount of processing time available for other EOS applications.
- Written by Neel Neogi
- Posted on 12月 30, 2020
- Updated on 5月 15, 2025
- 19486 Views
The document describes the support for dedicated and group ingress policing on interfaces without using QoS policy-maps to match on the traffic and apply policing.
- Written by Pratik Mangalore
- Posted on 12月 14, 2020
- Updated on 4月 20, 2026
- 20740 Views
IP Locking is an EOS feature configured on an Ethernet Layer 2 port or on a VLAN. When enabled, it ensures that a configured port or all member ports of a configured VLAN will only permit IP and ARP packets with IP source addresses that have been authorized. IP Locking prevents another host on a different IP Locking enabled interface from claiming ownership of an IP address through either IP or ARP spoofing. Additionally, IP Locking prevents hosts from masquerading as a DHCP server by blocking DHCP (server-to-client) packets.
- Written by Manuel Mendez
- Posted on 9月 30, 2019
- Updated on 4月 21, 2026
- 13441 Views
Subinterfaces divide a single ethernet or port channel interface into multiple logical L3 interfaces based on the 802.1q tag (VLAN ID) of incoming traffic. Subinterfaces are commonly used in the L2/L3 boundary device, but they can also be used to isolate traffic with 802.1q tags between L3 peers by assigning each subinterface to a different VRF. L3 subinterface shaping + VRF is also supported.
- Written by Nathan Wolfe
- Posted on 2月 15, 2018
- Updated on 7月 15, 2025
- 18293 Views
Introduced in EOS-4.20.1F, “selectable hashing fields” feature controls whether a certain header’s field is used in the hash calculation for LAG and ECMP.
- Written by Phillip Jie
- Posted on 11月 10, 2020
- Updated on 10月 30, 2024
- 12525 Views
MRU (maximum receive unit) enforcement provides the ability to drop frames that exceed a configured threshold on the ingress interface.
- Written by Bharathram Pattabhiraman
- Posted on 2月 11, 2021
- Updated on 4月 20, 2026
- 36068 Views
E-Tree is an L2 EVPN service (defined in RFC8317) in which each attachment circuit (AC) is assigned the role of Root or Leaf. Root ACs can communicate with leaf ACs and other root ACs. Leaf ACs can only communicate with root ACs. Leaf AC to leaf AC traffic is blocked. In this implementation, ACs are configured at the VLAN level, and the forwarding rules are enforced using a combination of local configuration of leaf VLANs (for local hosts), and asymmetric route targets (for remote hosts).
- Written by Tanushree Bansal
- Posted on 2月 23, 2022
- Updated on 6月 2, 2022
- 11630 Views
This feature provides isolation and allows segregating/dividing the link state database based on interface.
- Written by Petr Budnik
- Posted on 12月 16, 2020
- Updated on 6月 23, 2022
- 12558 Views
ITU-T G8275.1 is a PTP profile defined by ITU-T for telecommunication applications. It defines a set of functions from the IEEE 1588 to achieve phase/time synchronization with full timing support from the network (meaning, all of the network devices support PTP).
- Written by Kalash Nainwal
- Posted on 12月 14, 2020
- Updated on 4月 20, 2026
- 18520 Views
RSVP-TE, the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), is used to distribute MPLS labels for steering traffic and reserving bandwidth. The Label Edge Router (LER) feature implements the headend functionality, i.e., RSVP-TE tunnels can originate at an LER which can steer traffic into the tunnel.
- Written by Anitha Muppalla
- Posted on 5月 15, 2020
- Updated on 9月 28, 2023
- 12152 Views
Subinterfaces divide a single ethernet or port channel interface into multiple logical L2 or L3 interfaces based on the 802.1q or 802.1ad tags of incoming traffic. Subinterfaces are commonly used in the L2/L3 boundary device, but they can also be used to isolate traffic with 802.1q tags between L3 peers by assigning subinterfaces to different VRFs or different L2 bridging domains.
- Written by Harsh Goyal
- Posted on 12月 21, 2020
- Updated on 4月 17, 2026
- 12805 Views
IPv4 Unicast Reverse Path Forwarding (uRPF) can help limit malicious IPv4 traffic on a network. uRPF works by enabling the router to verify reachability (routing) of the source IP address (SIP) in the packet being forwarded. If the SIP is determined to not be a valid address, the packet is dropped.
- Written by Nik Zaborovskii
- Posted on 12月 8, 2020
- Updated on 5月 19, 2025
- 15560 Views
Multicast NAT is a feature that performs NAT translations on multicast traffic. It can be configured under SVIs,
- Written by Christopher Brown
- Posted on 12月 16, 2020
- Updated on 3月 7, 2025
- 10913 Views
ARP and IPv6 Neighbor Discovery use a neighbor cache to store neighbor address resolutions. The capacity of the neighbor cache is determined by the resources and capabilities of the device platform. The neighbor cache capacity feature adds a means to specify a per-interface capacity for the neighbor cache. A neighboring device, through misconfiguration or maliciousness, can unfairly use a large number of address resolutions. This feature can help to mitigate this over-utilization.
- Written by Sulyab Thottungal Valapu
- Posted on 12月 7, 2020
- Updated on 9月 4, 2023
- 10798 Views
This document describes the OSPFv2 feature that allows the setting of “Down” (DN) bit in type-5 and type-7 LSAs. The DN Bit is a loop prevention mechanism implemented when OSPF is used as CE - PE IGP protocol. Its usage in OSPF is explained by RFC4576. By default, OSPF honors the DN-bit in type-3, type-5 or type-7 LSAs in non-default VRFs.
