- Written by Nikhil Goyal
- Posted on August 20, 2020
- Updated on August 20, 2020
- 4107 Views
This feature adds the support for learning multiple equal cost routes for a destination in the RIP protocol. This
- Written by Sean Waclawik
- Posted on November 14, 2019
- Updated on February 5, 2022
- 4911 Views
Configurable port qualifier sizing allows for dynamic resizing of the hardware TCAM feature qualifier for IPKGV
- Written by Legena P K
- Posted on August 21, 2020
- Updated on February 15, 2024
- 5115 Views
IPv6 Unicast Reverse Path Forwarding (uRPF) can help limit malicious IPv6 traffic on a network. uRPF works by
- Written by Nikhil Kallat
- Posted on August 24, 2020
- Updated on August 24, 2020
- 3997 Views
This feature adds the support for MD5 authentication in RIP. MD5 authentication adds the additional layer of
- Written by Kaustav Majumdar
- Posted on August 20, 2020
- Updated on August 20, 2020
- 4685 Views
Media Access Control Security (MACsec) is an industry standard encryption mechanism that protects all traffic
- Written by Charlotte Fedderly
- Posted on August 25, 2020
- Updated on February 21, 2024
- 6809 Views
This feature adds support for a selected set of configured interfaces to collect egress flow samples. Egress sFlow can be configured on ethernet and port-channel interfaces.
- Written by Sandeep Kopuri
- Posted on October 7, 2019
- Updated on August 31, 2023
- 8096 Views
Topology Independent Fast Reroute, or TI-LFA, uses IS-IS SR to build loop-free alternate paths along the post-convergence path. These loop-free alternates provide fast convergence.
- Written by Prateek Mali
- Posted on August 19, 2020
- Updated on February 28, 2024
- 15540 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Vipul Shah
- Posted on August 27, 2019
- Updated on November 23, 2023
- 5363 Views
BGP routing information often contains more than one path to the same destination network. The BGP best-path selection algorithm determines which of these paths should be considered as the best path to that network.
- Written by Neel Neogi
- Posted on December 19, 2019
- Updated on December 21, 2021
- 6164 Views
Two rate three color marker (TrTCM) meters an incoming packet stream and marks the packets based on two rates, PIR
- Written by Lavanya Conjeevaram
- Posted on September 11, 2017
- Updated on September 7, 2021
- 6608 Views
Unidirectional links is a feature that configures an Ethernet interface transmit and receive paths to be
- Written by Gary McCarthy
- Posted on June 29, 2020
- Updated on July 12, 2023
- 5653 Views
Prior to EOS 4.24.1F, per-destination steering into an SR Policy was only supported for IP unicast BGP routes in the default VRF. Support for additional AFI/SAFIs were added as follows: EOS 4.24.2F: L2 EVPN — EOS 4.27.2F: BGP Labeled Unicast
- Written by Supriya Singh
- Posted on September 16, 2020
- Updated on April 4, 2024
- 1983 Views
This document describes the support of VxLAN Bridging and Routing on the R3 series of DCS 7280, 7500 and 7800 Arista
- Written by Bin Wang
- Posted on August 20, 2020
- Updated on February 5, 2022
- 4019 Views
The VxLAN VTEP counters feature allows the device to count VxLAN packets received and sent by the device on a per VTEP
- Written by Ravi Krishnamurthy
- Posted on August 23, 2019
- Updated on August 27, 2020
- 6280 Views
The “vxlan bridging vtep to vtep” feature allows VXLAN encapsulated packets ingressed at an Arista switch from a
- Written by Yagna Siriki
- Posted on August 24, 2020
- Updated on August 24, 2020
- 4833 Views
Some devices connected to Dot1x port in trunk phone mode won’t start authentication until it is awakened with a