- Written by Paul Fallon
- Posted on August 28, 2020
- Updated on April 24, 2025
- 12847 Views
For a pair of QSFP100 ports grouped together on a gearbox, it is possible to enable a 10G or 25G link on the first primary port while maintaining the usage of the secondary port at any speed. For two QSFP100 ports on a gearbox, the primary port allows for breakout speeds 4x10G and 4x25G, while the secondary does not. The configuration of the primary port determines whether the secondary port can be used since in a full breakout mode such as 4x10G the secondary port is forced inactive.
- Written by Bohan Yang
- Posted on March 31, 2017
- Updated on January 11, 2022
- 13096 Views
In EOS 4.18.1, support for 25G/50G is added on 7500R, 7280R, 7500R2 and 7280R2 series. This feature provides forced
- Written by Eamon Doyle
- Posted on February 8, 2017
- Updated on February 9, 2017
- 10771 Views
The BGP extended communities support within EOS has been enhanced to include support for 4 octet AS Extended BGP
- Written by Radu Handolescu
- Posted on October 14, 2021
- Updated on January 14, 2026
- 14076 Views
The 400GBASE ZRP (also known as ZR+) is a transceiver that follows the OpenZR+ MSA (Multi Source Agreement)
- Written by Lavanya Conjeevaram
- Posted on September 11, 2017
- Updated on February 6, 2022
- 10945 Views
Starting EOS release 4.15.2F, the ability to re number front panel ports of 7050QX 32S is supported.
- Written by Jason Lai
- Posted on October 10, 2025
- Updated on October 10, 2025
- 3566 Views
This document provides information on how to configure static NAT with selective VXLAN encapsulation using policy-based routing (PBR) and debug related issues on Arista 7170 switches.
- Written by Salah Sheikh
- Posted on November 4, 2025
- Updated on November 4, 2025
- 6645 Views
Newly supported Features, Ingress IPv4/IPv6 and MAC ACL on FPP ( routed/switched ), Port-Channel, L3 subInterfaces ,Ingress IPv4/IPv6 and MAC ACL counters , Ingress IPv4/IPv6 and MAC ACL deny logging
- Written by Venkatesh Janakiraman
- Posted on December 19, 2019
- Updated on January 8, 2026
- 12018 Views
This TOI supplements the Ingress Traffic Policy applied on ingress port interfaces. Please refer to that document for a description of Traffic Policies and field-sets. This TOI explains the Traffic Policies as applied in the ingress direction on VLAN interfaces. For Traffic Policies on the egress direction of VLAN interfaces, see the Egress Traffic Policy TOI.
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on February 16, 2017
- 10814 Views
The 7500E 6CFPX LC linecard with ACO CFP2 optics provides connectivity over DWDM systems and links. 7500E 6CFPX LC
- Written by Dhruba Jyoti Pokhrel
- Posted on December 13, 2024
- Updated on December 19, 2024
- 4244 Views
The 802.11be standards build on 802.11ax by providing ultra-high throughput, improved resource utilization, and interference mitigation. The 320 MHz support increases the throughput and performance in the 6GHz band. The improved resource utilization is attributed to the introduction of Multiple Resource Units (MRU) in Orthogonal Frequency Division Multiple Access (OFDMA) transmission and Multi-Link Operation (MLO).
- Written by Graeme Rennie
- Posted on March 31, 2017
- Updated on April 18, 2022
- 12930 Views
This article describes a feature for Tap Aggregation mode, which strips IEEE 802.1BR E-Tag and Cisco VN-Tag headers from all tagged packets received on tap interface before delivering them out of tool interfaces.
- Written by Manish Singhvi
- Posted on September 11, 2025
- Updated on September 16, 2025
- 2317 Views
802.1X dynamic interface configuration allows for dynamic interface configuration on the 802.1X authenticator based on device profiling performed by a Network Access Controller (NAC). Traditionally, 802.1X authenticators require static interface configuration. This enhancement extends dynamic capabilities beyond existing features like dynamic VLAN assignment and ACL programming, enabling any type of interface configuration to be applied dynamically via the CLI.
- Written by Tarun Jaswanth LNU
- Posted on August 24, 2020
- Updated on April 2, 2026
- 38875 Views
802.1X is an IEEE standard protocol that prevents unauthorized devices from gaining access to the network. We support dot1x protocol standard 802.1X-2004 (version=2)
- Written by Rahul Sharma
- Posted on January 12, 2026
- Updated on January 12, 2026
- 926 Views
This feature allows a user to adjust the MTU of radius requests for 802.1x supplicants. Currently this feature only adjusts the MTU size of radius requests for supplicants undergoing EAP TLS authentication. This can be useful in scenarios where hops between the switch and RADIUS doesn’t support IP MTU discovery and the switch ends up sending Access Requests based on the interface MTU size which get dropped at such hops. With this feature, a user has the flexibility to experiment and choose a MTU setting that works for such a topology forcing the Dot1x agent to send the Access Requests with the configured MTU.
- Written by Yitao (Eric) Wu
- Posted on April 14, 2015
- Updated on May 13, 2015
- 10911 Views
802.1X port security controls who can send traffic through and receive traffic from the individual switch ports. A
- Written by Manish Singhvi
- Posted on October 10, 2025
- Updated on October 10, 2025
- 1715 Views
802.1X supplicant feature supports different Extensible Authentication Protocol( EAP ) methods for 802.1X authentication. This document specifically talks about support for supplicants doing EAP Password ( EAP-PWD ) based authentication. Defined in RFC5931, EAP-PWD is an EAP method that uses a shared password for authentication. Furthermore, this feature allows EOS devices to interoperate with systems that rely on EAP-PWD for deriving MACsec CAK/CKN from the EAP Master Session Key (MSK) and EAP Session ID as per 802.1X-2020.
- Written by Ethan Rahn
- Posted on November 13, 2019
- Updated on December 12, 2025
- 12125 Views
This feature adds support in AAA using the LDAP protocol. LDAP can be used for authentication and
- Written by Can Sun
- Posted on June 19, 2025
- Updated on August 5, 2025
- 2662 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on August 5, 2025
- 2539 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on August 5, 2025
- 2548 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on August 5, 2025
- 2556 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on August 5, 2025
- 2544 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on August 5, 2025
- 2617 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on July 18, 2025
- 2502 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on August 5, 2025
- 2551 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on June 19, 2025
- Updated on August 5, 2025
- 2573 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Paul McDade
- Posted on September 18, 2025
- Updated on September 18, 2025
- 1723 Views
When configuring the MAC address of a switch, CLI commands and REST endpoints will accept a MAC address formatted as three groups of four hexadecimal digits separated by periods (e.g. 1122.3344.5566) in addition to the already accepted form of six hexadecimal digit pairs separated by colons (e.g. 11:22:33:44:55:66).
- Written by Julie Powell
- Posted on July 25, 2024
- Updated on July 25, 2024
- 5536 Views
You can now enable CloudVision to combine the authentication and authorization requests that it sends to a RADIUS server into a single request. When RADIUS is configured as the AAA provider, CloudVision will send separate authentication and authorization requests by default. This can cause issues with One-Time Password (OTP) users, as issued passwords are only valid for one request. Note: Non-OTP RADIUS systems will be unaffected by the change. To combine authentication and authorization requests, navigate to Settings > Access Control and enable the Combine Login Auth Requests checkbox.
- Written by Joseph Walsh
- Posted on July 25, 2024
- Updated on July 25, 2024
- 5442 Views
This studio enables you to quickly configure access interfaces towards endpoint devices in your campus network. This configuration relates to the devices in Access Pods deployed using the Campus Fabric (L2/L3/EVPN) Studio. The studio consists of port profiles and campus networks. You can create port profiles, which contain configuration for attributes like speed and MTU, which you can then assign to device interfaces in a campus fabric. Editing the profile will then affect all interfaces that the profile has been assigned to. You can also configure individual interfaces.
- Written by Joseph Walsh
- Posted on October 30, 2024
- Updated on October 30, 2024
- 4676 Views
This studio enables you to quickly configure access interfaces towards endpoint devices in your campus network. This configuration relates to the devices in Access Pods deployed using the Campus Fabric (L2/L3/EVPN) Studio.
- Written by Preyas Hathi
- Posted on June 2, 2022
- Updated on June 2, 2022
- 10069 Views
With the 12.0 release, CloudVision Cognitive Unified Edge (CV-CUE) introduces Access Points (AP) Explorer. AP Explorer helps you view the distribution of APs by various attributes such as Model, Software Version, Status, and so on.
- Written by Noah Tinker
- Posted on March 13, 2026
- Updated on March 16, 2026
- 336 Views
Security policies occasionally prevent the download of PCAP files from packet queries. The integrated Wireshark web interface enables PCAP analysis within the DMF environment and requires authentication for access. This integration provides full Wireshark functionality while keeping the PCAP file on the Controller to maintain adherence to security requirements.
- Written by Gurpreet Singh
- Posted on September 30, 2015
- Updated on June 15, 2018
- 11008 Views
This feature enables user to modify QoS parameters for SVI traffic (L3 VLAN) based on ACL classification. The QoS
- Written by Nicolas Robert
- Posted on July 2, 2025
- Updated on July 2, 2025
- 2753 Views
The feature allows filtering on source and destination IP addresses within the VXLAN inner payload, on ingress port ACL. The feature can be configured using the inner keyword within the VXLAN ACL configuration. Because of some limitations, the feature should be utilized for debugging purposes.
- Written by Mohit Saxena
- Posted on May 1, 2015
- Updated on June 15, 2018
- 12092 Views
Ingress policing provides the ability to monitor the data rates for a particular class of traffic and perform action
- Written by Chirag Dasannacharya
- Posted on April 17, 2026
- Updated on April 17, 2026
- 137 Views
Beginning with EOS version 4.36.0F, the CCS-710XP series offers the ability to increase ingress Access Control List (ACL) scale if counters are declared unnecessary. This will be the default behavior on CCS-710XP platforms running releases from 4.36.0F onwards. This document details steps to enable or disable counters as required, along with resources for related issues.
- Written by Julie Powell
- Posted on July 25, 2024
- Updated on July 25, 2024
- 5346 Views
A new role permission, Action Execution, has been introduced to control the execution of custom actions when they are run in isolation, such as via Studio Autofill actions and standalone executions in the Action editor. A custom action is a user-created action that has either been installed via a package or has been created using python script and arguments.
- Written by Varun
- Posted on March 16, 2026
- Updated on March 16, 2026
- 376 Views
This feature adds the support for a standby server to the existing syslog logging mechanism for UDP syslog servers. The user can specify a logging group and specify remote syslog servers. The first host configured will be the “active” server, which means syslogs will be forwarded to that host whenever it is reachable via ICMP. The second host will be the “standby” server, which will receive syslogs if the active server goes down. This provides more robustness for setups with multiple potential syslog servers.
- Written by Shashank Hegde
- Posted on September 30, 2015
- Updated on September 30, 2015
- 10606 Views
The active active neutron controller support in CVX enables the deployment of highly available neutron service with
- Written by Chris Pearson
- Posted on August 22, 2025
- Updated on August 22, 2025
- 2025 Views
This feature gives AVT/DPS tunnels the ability to transport IPv6 overlay traffic. Formerly, such tunnels could only transport IPv4 overlay traffic.
- Written by Gaurav Verma
- Posted on April 15, 2015
- Updated on February 6, 2022
- 11382 Views
Starting EOS 4.15.0F, users can configure NAT at IP address level with dynamically assigned one to one mapping
- Written by VIKAS NARAYANAPPA
- Posted on March 12, 2026
- Updated on March 12, 2026
- 400 Views
Adjacency sharing is a feature which deduplicates FEC to avoid installing identical FECs in hardware. Often this applies to Equal Cost Multi Path (ECMP) FECs, which are generally a much more scarce resource. Hierarchical FECs are not supported with adjacency sharing.
- Written by Michael (Mike) Fink
- Posted on December 22, 2017
- Updated on March 19, 2025
- 20071 Views
The following table describes the advanced mirroring features that are currently supported with links to their respective TOIs.
- Written by Prachi Modi
- Posted on March 20, 2026
- Updated on March 20, 2026
- 352 Views
With the 21.2 release, CV-CUE introduces Advanced Alert Parameters to fine-tune alert sensitivity.
In diverse Wi-Fi environments, static global alert thresholds might generate false positives. For example, a high density of clients re-associating during a radio frequency change might be flagged as a DoS attack.
- Written by Noah Tinker
- Posted on March 13, 2026
- Updated on March 13, 2026
- 318 Views
The AES-256 Support for SNMPv3 feature implements 256-bit encryption for SNMPv3 interactions on the DMF Controller and managed devices. Configuring the AES-256 privacy protocol option enhances the User-based Security Model (USM) by enforcing 256-bit encryption standards.
- Written by John Schimmel
- Posted on April 24, 2025
- Updated on June 3, 2025
- 5435 Views
The DANZ Monitoring Fabric (DMF) Aggregate Arista GRE TAP action receives GRE-encapsulated packet samples from EOS switches, and generates an IPFIX report containing the flow 5-tuple, metadata, and timestamps from switches that the packet passed through. Use the IPFIX report to determine the flows in a data fabric, monitor server session initialization delays, estimate the bandwidth of flows, and learn the path of packets through the fabric.
- Written by Bruno Perriot
- Posted on September 12, 2024
- Updated on January 21, 2026
- 5608 Views
The AGM for ECMP feature allows monitoring the number of packets and bytes going through each member of the configured ECMP group on the system, with a high time resolution.
- Written by John Schimmel
- Posted on May 2, 2025
- Updated on May 2, 2025
- 2885 Views
The DANZ Monitoring Fabric (DMF) Aggregate sFlow takes sFlow packet samples and generates an IPFIX report containing the flow 5-tuple, metadata, and timestamps from switches that the packet passed through.
- Written by Prasoon Saurav
- Posted on February 8, 2017
- Updated on February 9, 2017
- 10885 Views
Aggregate storm control with traffic class option provides the capability to rate limit BUM(Broadcast, Unknown
- Written by Anoop Dawani
- Posted on September 30, 2015
- Updated on September 30, 2015
- 10525 Views
This article describes changes to the platform command 'show platform fm6000 agileports'. Earlier this command was
