- Written by Weichen Zhao
- Posted on June 29, 2023
- Updated on November 9, 2023
- 4350 Views
Prior to this feature, we supported a maximum of two levels of Forward Equivalence Class (FEC) hierarchies for vxlan routing tunnels in hardware.
- Written by Prateek Mali
- Posted on August 19, 2020
- Updated on September 25, 2024
- 19846 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Matthew Carrington-Fair
- Posted on March 3, 2023
- Updated on May 21, 2024
- 4276 Views
This feature allows IP FIB (Forwarding Information Base) export through the OpenConfig AFT YANG models.
- Written by Abhiram Kalluru
- Posted on September 11, 2023
- Updated on November 7, 2023
- 3164 Views
This feature allows FDB export through the OpenConfig AFT YANG models. The streaming behavior of mac addresses are Entries associated with SVI or L3 port have an associated VRF name. The VRF name is used to specify which network instance the FDB entry belongs to.
- Written by Lucas Frere
- Posted on November 17, 2023
- Updated on November 20, 2023
- 3201 Views
Slice reservation can be used to solve TCAM resources limitations due to suboptimal group order in the TCAM because of the FCFS (First come first serve) nature of the TCAM. The user will be able to reserve a certain amount of entries in the TCAM for a specific feature.
- Written by Vipul Shah
- Posted on August 27, 2019
- Updated on November 23, 2023
- 6912 Views
BGP routing information often contains more than one path to the same destination network. The BGP best-path selection algorithm determines which of these paths should be considered as the best path to that network.
- Written by Pankaj Srivastava
- Posted on September 11, 2023
- Updated on November 30, 2023
- 3029 Views
The document describes the support for policing on one or more VNIs configured on a Vxlan interface. This feature allows dedicated policing of flows on a VNI in both directions which corresponds to incoming traffic from a remote VTEP and outgoing traffic towards a remote VTEP. Policers in the hardware are created with policer profiles attached to VNIs. Policer profiles can be shared across multiple VNIs but policers are dedicated.