- Written by Xuguang (Shawn) Yang
- Posted on May 1, 2015
- Updated on February 5, 2022
- 3305 Views
With this feature, Arista 7050 and 7050X series of switches can now decapsulate IP in IP tunneled packets.
- Written by Kartic Bhargav
- Posted on April 23, 2018
- Updated on May 15, 2018
- 3702 Views
Similar to L4 ports, ACL rules can be configured to filter ingress packets based on their IP length (present in the IPv4
- Written by Sarah Chen
- Posted on September 30, 2015
- Updated on September 30, 2015
- 3844 Views
IP Source Guard (IPSG) is a security feature that can help prevent IP spoofing attacks. It filters inbound IP packets
- Written by Kiranmayi Kasarapu
- Posted on September 30, 2015
- Updated on September 30, 2015
- 3124 Views
With this feature, IP packets matching a static Nexthop Group route can be encapsulated within an IP in IP tunnel and
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 4342 Views
This feature enables dataplane forwarding of IPv4 traffic on interfaces that are not IPv4 address enabled, but only
- Written by Dhanashree Nagre
- Posted on April 21, 2015
- Updated on February 7, 2022
- 4080 Views
IPv4 routes of certain prefix lengths can be optimized for enhanced route scale on 7500E, 7280E, 7500R and 7280R
- Written by Roland Phung
- Posted on May 1, 2015
- Updated on May 1, 2015
- 3264 Views
As of EOS 4.15.0F, VRRP is supported in a VRF context. Virtual IP addresses can be reused in different VRF contexts,
- Written by Manogna Namburi
- Posted on May 1, 2015
- Updated on July 24, 2023
- 3065 Views
IPv6 access lists can be used to filter IPv6 network traffic. Starting EOS 4.15.0F release, we have added support
- Written by Siddharth Verma
- Posted on May 1, 2015
- Updated on May 1, 2015
- 3098 Views
IPv6 egress ACLs applied to routed interfaces across the same chip on the DCS 7500E and the DCS 7280E series can be
- Written by Greg Poloczek
- Posted on April 10, 2015
- Updated on May 1, 2015
- 3165 Views
Arista switches use the hashing algorithm to load balance traffic among LAG (Link Aggregation Group) members
- Written by Christopher Brown
- Posted on December 22, 2017
- Updated on December 22, 2017
- 3241 Views
The IPv6 Neighbor Discovery protocol performs Neighbor Unreachability Detection (NUD) in order to determine if two
- Written by Anoop Dawani
- Posted on September 30, 2015
- Updated on February 5, 2022
- 3064 Views
Nexthop groups in EOS currently only support IPv4 entries and only IPv4 routes can point to nexthop groups. This
- Written by Satya Viswanathan
- Posted on December 9, 2015
- Updated on February 5, 2022
- 3270 Views
Policy-Based Routing (PBR) provides the flexibility of routing according to custom-defined policies
- Written by Jahnavi Singhal
- Posted on June 29, 2016
- Updated on February 5, 2022
- 3100 Views
With this, IPv6 routes can be configured pointing to a static Nexthop group of 2 types:. Type
- Written by Jayden Navarro
- Posted on November 22, 2017
- Updated on February 7, 2022
- 3149 Views
IPv6 Router Advertisement Consistency Logging, when enabled, allows for notification through syslogging of
- Written by Rachee Singh
- Posted on April 10, 2015
- Updated on May 1, 2015
- 3085 Views
This feature adds IPv6 VRF support to Open Shortest Path First(OSPF) Protocol version 3. It allows for OSPFv3
- Written by Roland Phung
- Posted on April 23, 2015
- Updated on May 1, 2015
- 3134 Views
EOS 4.15.0F is introducing support of IPv6 management capabilities inside a VRF. This means existing management
- Written by Ganesh Sundaresan
- Posted on May 1, 2015
- Updated on May 1, 2015
- 3048 Views
This feature adds the support for IPv6 unicast in a VRF context in EOS. This entails static routing and dynamic
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 3072 Views
IS IS adjacency uptime describes the uptime or downtime of neighbors since the last state change.
- Written by Anoop Dawani
- Posted on September 30, 2015
- Updated on February 6, 2022
- 3097 Views
Bidirectional Forwarding Detection(BFD) is a low overhead protocol designed to provide rapid detection of
- Written by Kamala R
- Posted on September 30, 2015
- Updated on July 20, 2023
- 3436 Views
The difference between the two forms of authentication is in the level of security provided. In case of clear text authentication, the password is specified as text in the authentication TLV, making it possible for an attacker to break the authentication by sniffing and capturing IS-IS PDUs on the network.
- Written by Nikhil Goyal
- Posted on November 22, 2017
- Updated on December 23, 2021
- 3511 Views
IS IS Graceful Restart adds support for Restart Signaling for IS IS, IETF RFC 5306. When IS IS is used
- Written by Nandan Saha
- Posted on September 30, 2015
- Updated on September 30, 2015
- 3092 Views
By default if there's a hostname configured on the switch, it is used as the IS IS hostname. It is also possible to
- Written by Arpit Bansal
- Posted on September 30, 2015
- Updated on September 30, 2015
- 3199 Views
An IS IS router can be configured as Level 1 2 which can form adjacencies and exchange routing information with both
- Written by Arunprakash Sekar
- Posted on September 30, 2015
- Updated on September 30, 2015
- 3193 Views
IS IS Multi Topology support enables an IS IS router to compute a separate topology for IPv4 and IPv6 links in the
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 3419 Views
This feature enables an Arista switch to run the IS IS routing protocol over a tunnel interface to another IS IS
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on October 25, 2023
- 8071 Views
IS IS SR feature provides knobs to configure various types of segments which are distributed as part of IS IS LSPs (Link
- Written by Arpit Bansal
- Posted on September 30, 2015
- Updated on April 22, 2020
- 3290 Views
Level 1 2 routers set attached bit in their Level 1 LSPs to indicate their reachability to the rest of the network. A
- Written by Bharath Somayaji
- Posted on September 30, 2015
- Updated on September 30, 2015
- 3109 Views
SPF Timers can be used in IS IS to throttle the frequency of shortest path first (SPF) computations. In networks with a
- Written by Ashish Yadav
- Posted on February 8, 2017
- Updated on February 9, 2017
- 3122 Views
The default behavior of a level 1 router running IS IS is to install a default route to a level 1 2 router present in a
- Written by Aditya Gujral
- Posted on September 30, 2015
- Updated on September 30, 2015
- 3079 Views
This feature adds Intermediate System to Intermediate System (IS IS) support for IP version 6 (IPv6) address family
- Written by Weichen Zhao
- Posted on August 25, 2016
- Updated on August 25, 2016
- 3140 Views
This feature provides a way to export non ISIS routes into level 1, level 2 or both by using route map's set clause. The
- Written by Aditya Gujral
- Posted on September 30, 2015
- Updated on February 7, 2022
- 3104 Views
This feature extends the IS IS set overload bit command to support wait for BGP option. In scenarios
- Written by Mihyar Baroudi
- Posted on December 8, 2015
- Updated on December 21, 2015
- 3119 Views
In our current implementation, on a switch with default startup config or no config, all ports come up in access
- Written by Isidor Kouvelas
- Posted on December 22, 2017
- Updated on December 9, 2020
- 4603 Views
This feature is available when configuring BGP in the multi agent routing protocol model. Ethernet
- Written by Lavanya Conjeevaram
- Posted on June 29, 2016
- Updated on April 25, 2018
- 3755 Views
L3 interface ingress counters can be used to count routable traffic coming into the box on sub interfaces and vlan
- Written by Jayden Navarro
- Posted on February 8, 2017
- Updated on February 15, 2017
- 3182 Views
LACP on Loopback Interfaces allows for Active Port Channels on one or more interfaces whose link endpoints terminate
- Written by Jayden Navarro
- Posted on February 8, 2017
- Updated on February 9, 2017
- 3778 Views
LACP State Transition Event Monitoring on Arista switches allows for quick and filterable viewing of LACP state
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on February 2, 2016
- 3880 Views
LAGs are allocated hardware resources on transition from one member (software LAG) to two members (hardware LAG) and
- Written by Greg Poloczek
- Posted on September 11, 2017
- Updated on September 11, 2017
- 3865 Views
Arista switches use the hashing algorithm to load balance traffic among LAG (Link Aggregation Group) members
- Written by Stefan Rebaud
- Posted on March 31, 2017
- Updated on January 11, 2022
- 3666 Views
This document describes the current status of LANZ on DCS 7500R, DCS 7280R and DCS 7020R, for both polling and
- Written by Pinky Agrawal
- Posted on November 22, 2017
- Updated on December 22, 2017
- 3112 Views
LANZ on 7160S 32CQ, 7160 48YC6 and 7160 48TC6 adds support for monitoring congestion on front panel ports with Start,
- Written by Andrei Dvornic
- Posted on April 2, 2015
- Updated on March 6, 2023
- 6130 Views
Loop protection is a loop detection and prevention method which is independent of Spanning Tree Protocol (STP) and is not disabled when the switch is in switchport backup mode or port is in discarding state. The LoopProtect agent has a method to detect loops and take action based on the configuration by the user. In order to find loops in the system, a loop detection frame is sent out periodically on each interface that loop protection is enabled on. The frame carries broadcast destination MAC address, bridge MAC source address, OUI Extended EtherType 0x88b7 as well as information to specify the origins of the packet.
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on November 17, 2016
- 4255 Views
The Label Distribution Protocol (LDP) is a protocol in the Multiprotocol Label Switching (MPLS) context that allows
- Written by Xin Guang (Tony) Du
- Posted on August 25, 2016
- Updated on November 23, 2020
- 6511 Views
The LDP pseudowire feature provides support for emulating Ethernet connections over a Multiprotocol Label
- Written by Peter Lam
- Posted on September 30, 2015
- Updated on April 10, 2018
- 4974 Views
Leaf Smart System Upgrade (SSU) provides the ability to upgrade the EOS image with minimal traffic disruption.
- Written by Sahil Midha
- Posted on December 22, 2017
- Updated on February 6, 2022
- 4785 Views
Link Fault Signalling (LFS) is a mechanism by which remote link faults are asserted over a link experiencing
- Written by Prachi Modi
- Posted on February 20, 2023
- Updated on February 20, 2023
- 1451 Views
With the 14.0 release, CloudVision Cognitive Unified Edge (CV-CUE) removes the Wireless Manager(WM) UI dependency for login and for applying the service license. You will no longer be redirected to WM and can now directly login to CV-CUE from the UI.
- Written by Vikas Hegde
- Posted on June 29, 2016
- Updated on February 8, 2022
- 3979 Views
Support for Media Access Control Security (MACsec) with static keys was added in EOS 4.15.4. This feature brings
- Written by Sriram Rajagopalan
- Posted on September 30, 2015
- Updated on February 5, 2022
- 5285 Views
Maintenance mode is a framework to allow for the easy removal of elements of a switch or the entire switch from