- Written by Roland Phung
- Posted on April 23, 2015
- Updated on May 1, 2015
- 5867 Views
EOS 4.15.0F is introducing support of IPv6 management capabilities inside a VRF. This means existing management
- Written by Ganesh Sundaresan
- Posted on May 1, 2015
- Updated on May 1, 2015
- 5724 Views
This feature adds the support for IPv6 unicast in a VRF context in EOS. This entails static routing and dynamic
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 5886 Views
IS IS adjacency uptime describes the uptime or downtime of neighbors since the last state change.
- Written by Anoop Dawani
- Posted on September 30, 2015
- Updated on February 6, 2022
- 5808 Views
Bidirectional Forwarding Detection(BFD) is a low overhead protocol designed to provide rapid detection of
- Written by Kamala R
- Posted on September 30, 2015
- Updated on July 20, 2023
- 6403 Views
The difference between the two forms of authentication is in the level of security provided. In case of clear text authentication, the password is specified as text in the authentication TLV, making it possible for an attacker to break the authentication by sniffing and capturing IS-IS PDUs on the network.
- Written by Nikhil Goyal
- Posted on November 22, 2017
- Updated on December 23, 2021
- 6492 Views
IS IS Graceful Restart adds support for Restart Signaling for IS IS, IETF RFC 5306. When IS IS is used
- Written by Nandan Saha
- Posted on September 30, 2015
- Updated on September 30, 2015
- 5830 Views
By default if there's a hostname configured on the switch, it is used as the IS IS hostname. It is also possible to
- Written by Arpit Bansal
- Posted on September 30, 2015
- Updated on September 30, 2015
- 5914 Views
An IS IS router can be configured as Level 1 2 which can form adjacencies and exchange routing information with both
- Written by Arunprakash Sekar
- Posted on September 30, 2015
- Updated on September 30, 2015
- 5996 Views
IS IS Multi Topology support enables an IS IS router to compute a separate topology for IPv4 and IPv6 links in the
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 6290 Views
This feature enables an Arista switch to run the IS IS routing protocol over a tunnel interface to another IS IS
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on July 30, 2024
- 13496 Views
Segment Routing provides mechanism to define end-to-end paths within a topology by encoding paths as sequences of sub-paths or instructions. These sub-paths or instructions are referred to as “segments”. IS-IS Segment Routing (henceforth referred to as IS-IS SR) provides means to advertise such segments through IS-IS protocol.
- Written by Arpit Bansal
- Posted on September 30, 2015
- Updated on April 22, 2020
- 6311 Views
Level 1 2 routers set attached bit in their Level 1 LSPs to indicate their reachability to the rest of the network. A
- Written by Bharath Somayaji
- Posted on September 30, 2015
- Updated on March 7, 2024
- 6166 Views
SPF Timers can be used in IS-IS to throttle the frequency of shortest-path-first (SPF) computations. In networks with a lot of churn, using these timers will help in containing the effect of network disruptions arising out of frequent SPF runs.
- Written by Ashish Yadav
- Posted on February 8, 2017
- Updated on February 9, 2017
- 5727 Views
The default behavior of a level 1 router running IS IS is to install a default route to a level 1 2 router present in a
- Written by Aditya Gujral
- Posted on September 30, 2015
- Updated on September 30, 2015
- 5797 Views
This feature adds Intermediate System to Intermediate System (IS IS) support for IP version 6 (IPv6) address family
- Written by Weichen Zhao
- Posted on August 25, 2016
- Updated on August 25, 2016
- 6037 Views
This feature provides a way to export non ISIS routes into level 1, level 2 or both by using route map's set clause. The
- Written by Aditya Gujral
- Posted on September 30, 2015
- Updated on February 7, 2022
- 5854 Views
This feature extends the IS IS set overload bit command to support wait for BGP option. In scenarios
- Written by Mihyar Baroudi
- Posted on December 8, 2015
- Updated on December 21, 2015
- 5986 Views
In our current implementation, on a switch with default startup config or no config, all ports come up in access
- Written by Isidor Kouvelas
- Posted on December 22, 2017
- Updated on December 9, 2020
- 7751 Views
This feature is available when configuring BGP in the multi agent routing protocol model. Ethernet
- Written by Lavanya Conjeevaram
- Posted on June 29, 2016
- Updated on April 25, 2018
- 6847 Views
L3 interface ingress counters can be used to count routable traffic coming into the box on sub interfaces and vlan
- Written by Jayden Navarro
- Posted on February 8, 2017
- Updated on February 15, 2017
- 5953 Views
LACP on Loopback Interfaces allows for Active Port Channels on one or more interfaces whose link endpoints terminate
- Written by Jayden Navarro
- Posted on February 8, 2017
- Updated on February 9, 2017
- 6761 Views
LACP State Transition Event Monitoring on Arista switches allows for quick and filterable viewing of LACP state
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on February 2, 2016
- 6936 Views
LAGs are allocated hardware resources on transition from one member (software LAG) to two members (hardware LAG) and
- Written by Greg Poloczek
- Posted on September 11, 2017
- Updated on September 11, 2017
- 6910 Views
Arista switches use the hashing algorithm to load balance traffic among LAG (Link Aggregation Group) members
- Written by Stefan Rebaud
- Posted on March 31, 2017
- Updated on January 11, 2022
- 6611 Views
This document describes the current status of LANZ on DCS 7500R, DCS 7280R and DCS 7020R, for both polling and
- Written by Pinky Agrawal
- Posted on November 22, 2017
- Updated on December 22, 2017
- 5739 Views
LANZ on 7160S 32CQ, 7160 48YC6 and 7160 48TC6 adds support for monitoring congestion on front panel ports with Start,
- Written by Andrei Dvornic
- Posted on April 2, 2015
- Updated on February 8, 2024
- 10827 Views
Loop protection is a loop detection and prevention method which is independent of Spanning Tree Protocol (STP) and is not disabled when the switch is in switchport backup mode or port is in discarding state. The LoopProtect agent has a method to detect loops and take action based on the configuration by the user. In order to find loops in the system, a loop detection frame is sent out periodically on each interface that loop protection is enabled on. The frame carries broadcast destination MAC address, bridge MAC source address, OUI Extended EtherType 0x88b7 as well as information to specify the origins of the packet.
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on November 17, 2016
- 7512 Views
The Label Distribution Protocol (LDP) is a protocol in the Multiprotocol Label Switching (MPLS) context that allows
- Written by Xin Guang (Tony) Du
- Posted on August 25, 2016
- Updated on November 23, 2020
- 10060 Views
The LDP pseudowire feature provides support for emulating Ethernet connections over a Multiprotocol Label
- Written by Peter Lam
- Posted on September 30, 2015
- Updated on December 11, 2023
- 10251 Views
Leaf Smart System Upgrade (SSU) provides the ability to upgrade the EOS image with minimal traffic disruption.Note: It is possible that SSU shutdown and bootup are not supported in the same image. If a product has shutdown support in image A and bootup support in a later image B, then SSU upgrade cannot be performed from image A to any images earlier than image B, including image A itself. However, upgrading from image A to image B onwards is allowed.
- Written by Sahil Midha
- Posted on December 22, 2017
- Updated on February 6, 2022
- 8384 Views
Link Fault Signalling (LFS) is a mechanism by which remote link faults are asserted over a link experiencing
- Written by Dhruba Jyoti Pokhrel
- Posted on July 16, 2024
- Updated on July 16, 2024
- 846 Views
Local Authentication (also known as authentication survivability) is the ability of access points (AP) to authenticate and onboard clients to the network using root CA certificates through the integrated EAP server of the AP. Use Local Authentication when the RADIUS servers are not reachable to authenticate the clients. It is typically a temporary authentication mechanism; avoid using it as a primary authentication. If there are certificate chains, you must upload the root CA certificate along with the certificate chain.
- Written by Prachi Modi
- Posted on February 20, 2023
- Updated on February 20, 2023
- 3967 Views
With the 14.0 release, CloudVision Cognitive Unified Edge (CV-CUE) removes the Wireless Manager(WM) UI dependency for login and for applying the service license. You will no longer be redirected to WM and can now directly login to CV-CUE from the UI.
- Written by Vikas Hegde
- Posted on June 29, 2016
- Updated on February 8, 2022
- 7269 Views
Support for Media Access Control Security (MACsec) with static keys was added in EOS 4.15.4. This feature brings
- Written by Sriram Rajagopalan
- Posted on September 30, 2015
- Updated on February 5, 2022
- 8906 Views
Maintenance mode is a framework to allow for the easy removal of elements of a switch or the entire switch from
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on February 6, 2022
- 6037 Views
Maintenance mode with sub interfaces is an extension to the maintenance mode feature released in EOS 4 15 2F. With this
- Written by Preyas Hathi
- Posted on June 2, 2022
- Updated on June 2, 2022
- 5142 Views
A server cluster or a cluster is a group of Wireless Manager (WM) servers. A cluster comprises a parent WM server and one or more child WM servers. A cluster is created to manage multiple servers using a single server.
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on February 8, 2022
- 6444 Views
MapReduce Tracer is an existing feature that monitors MapReduce nodes that are directly connected to Arista
- Written by Digvijay Gahlot
- Posted on December 22, 2017
- Updated on December 22, 2017
- 5938 Views
Classification of MPLS packets based on traffic class bits in MPLS header for QoS Policy Maps. DCS
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 6447 Views
Currently, the 'maximum routes' knob allows one to set an upper bound on the number of routes that can be received from a
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on March 4, 2022
- 11385 Views
Media Access Control Security (MACSec) is an industry standard encryption mechanism to protect all traffic flowing
- Written by Sabah Khan
- Posted on July 25, 2024
- Updated on July 25, 2024
- 818 Views
Port mirroring allows you to duplicate ethernet packets or frames on a source interface to send to a remote host, like DANZ Monitoring Fabric (DMF). The mirrored packets or frames can be sent via a SPAN interface dedicated for communication with the host or over an L2 Generic Routing Encapsulation (L2GRE) tunnel.
- Written by Kevin Amiraux
- Posted on September 30, 2015
- Updated on August 16, 2024
- 10542 Views
Arista switches provide several mirroring features. Filtered mirroring to CPU adds a special destination to the mirroring features that allows the mirrored traffic to be sent to the switch supervisor. The traffic can then be monitored and analyzed locally without the need of a remote port analyzer. Use case of this feature is for debugging and troubleshooting purposes.
- Written by Shamit Kapadia
- Posted on September 30, 2015
- Updated on January 31, 2024
- 9947 Views
In an MLAG setup, routing on a switch (MLAG peer) is possible using its own bridge/system MAC, VARP MAC or VRRP MAC. When a peer receives an IP packet with destination MAC set to one of the aforementioned MACs, the packet gets routed if the hardware has enough information to route the packet. Before introducing this feature, if the destination MAC is peer’s bridge MAC, the packet is L2 bridged on the peer-link and the routing takes place on the peer. This behavior to use the peer-link to bridge the L3 traffic to the peer is undesirable especially when the MLAG peers can route the packets themselves.
- Written by Som Neema
- Posted on September 30, 2015
- Updated on September 30, 2015
- 8106 Views
MLAG currently checks for basic MLAG configuration to be consistent (e.g. domain id) before formation with the peer.
- Written by Tarun Soin
- Posted on February 15, 2018
- Updated on July 11, 2019
- 8971 Views
When MLAG peer link goes down, the secondary peer assumes the primary peer is down/dead, and takes over the primary
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on November 17, 2016
- 6428 Views
In an MLAG setup, periodic TCP/UDP heartbeats are sent over peer link to ensure IP connectivity between peers. Prior
- Written by Ryan Megathlin
- Posted on September 12, 2024
- Updated on September 12, 2024
- 372 Views
This feature allows users to configure L2 subinterfaces on MLAG interfaces. L2 subinterfaces are not supported on the MLAG peer-link.
- Written by Hemanth Murthy
- Posted on February 8, 2017
- Updated on December 17, 2020
- 7864 Views
If an MLAG flaps on one peer, then we may have to remap the MAC addresses learned, such that the reachability is via the
- Written by Sahil Midha
- Posted on May 14, 2015
- Updated on July 3, 2024
- 1106 Views
For packets sent and received on the front-panel interfaces, this feature allows creation of a profile to configure buffer reservations in the MMU (MMU = Memory Management Unit which manages how the on-chip packet buffers are organized). The profile can contain configurations for ingress and egress. On the ingress, configuration is supported at both a port level as well as a priority-group level.