- Written by Aditya Gujral
- Posted on September 30, 2015
- Updated on February 7, 2022
- 5173 Views
This feature extends the IS IS set overload bit command to support wait for BGP option. In scenarios
- Written by Mihyar Baroudi
- Posted on December 8, 2015
- Updated on December 21, 2015
- 5315 Views
In our current implementation, on a switch with default startup config or no config, all ports come up in access
- Written by Isidor Kouvelas
- Posted on December 22, 2017
- Updated on December 9, 2020
- 6967 Views
This feature is available when configuring BGP in the multi agent routing protocol model. Ethernet
- Written by Lavanya Conjeevaram
- Posted on June 29, 2016
- Updated on April 25, 2018
- 6148 Views
L3 interface ingress counters can be used to count routable traffic coming into the box on sub interfaces and vlan
- Written by Jayden Navarro
- Posted on February 8, 2017
- Updated on February 15, 2017
- 5290 Views
LACP on Loopback Interfaces allows for Active Port Channels on one or more interfaces whose link endpoints terminate
- Written by Jayden Navarro
- Posted on February 8, 2017
- Updated on February 9, 2017
- 6053 Views
LACP State Transition Event Monitoring on Arista switches allows for quick and filterable viewing of LACP state
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on February 2, 2016
- 6169 Views
LAGs are allocated hardware resources on transition from one member (software LAG) to two members (hardware LAG) and
- Written by Greg Poloczek
- Posted on September 11, 2017
- Updated on September 11, 2017
- 6194 Views
Arista switches use the hashing algorithm to load balance traffic among LAG (Link Aggregation Group) members
- Written by Stefan Rebaud
- Posted on March 31, 2017
- Updated on January 11, 2022
- 5952 Views
This document describes the current status of LANZ on DCS 7500R, DCS 7280R and DCS 7020R, for both polling and
- Written by Pinky Agrawal
- Posted on November 22, 2017
- Updated on December 22, 2017
- 5047 Views
LANZ on 7160S 32CQ, 7160 48YC6 and 7160 48TC6 adds support for monitoring congestion on front panel ports with Start,
- Written by Andrei Dvornic
- Posted on April 2, 2015
- Updated on February 8, 2024
- 9596 Views
Loop protection is a loop detection and prevention method which is independent of Spanning Tree Protocol (STP) and is not disabled when the switch is in switchport backup mode or port is in discarding state. The LoopProtect agent has a method to detect loops and take action based on the configuration by the user. In order to find loops in the system, a loop detection frame is sent out periodically on each interface that loop protection is enabled on. The frame carries broadcast destination MAC address, bridge MAC source address, OUI Extended EtherType 0x88b7 as well as information to specify the origins of the packet.
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on November 17, 2016
- 6767 Views
The Label Distribution Protocol (LDP) is a protocol in the Multiprotocol Label Switching (MPLS) context that allows
- Written by Xin Guang (Tony) Du
- Posted on August 25, 2016
- Updated on November 23, 2020
- 9256 Views
The LDP pseudowire feature provides support for emulating Ethernet connections over a Multiprotocol Label
- Written by Peter Lam
- Posted on September 30, 2015
- Updated on December 11, 2023
- 9006 Views
Leaf Smart System Upgrade (SSU) provides the ability to upgrade the EOS image with minimal traffic disruption.Note: It is possible that SSU shutdown and bootup are not supported in the same image. If a product has shutdown support in image A and bootup support in a later image B, then SSU upgrade cannot be performed from image A to any images earlier than image B, including image A itself. However, upgrading from image A to image B onwards is allowed.
- Written by Sahil Midha
- Posted on December 22, 2017
- Updated on February 6, 2022
- 7448 Views
Link Fault Signalling (LFS) is a mechanism by which remote link faults are asserted over a link experiencing
- Written by Dhruba Jyoti Pokhrel
- Posted on July 16, 2024
- Updated on July 16, 2024
- 157 Views
Local Authentication (also known as authentication survivability) is the ability of access points (AP) to authenticate and onboard clients to the network using root CA certificates through the integrated EAP server of the AP. Use Local Authentication when the RADIUS servers are not reachable to authenticate the clients. It is typically a temporary authentication mechanism; avoid using it as a primary authentication. If there are certificate chains, you must upload the root CA certificate along with the certificate chain.
- Written by Prachi Modi
- Posted on February 20, 2023
- Updated on February 20, 2023
- 3348 Views
With the 14.0 release, CloudVision Cognitive Unified Edge (CV-CUE) removes the Wireless Manager(WM) UI dependency for login and for applying the service license. You will no longer be redirected to WM and can now directly login to CV-CUE from the UI.
- Written by Vikas Hegde
- Posted on June 29, 2016
- Updated on February 8, 2022
- 6513 Views
Support for Media Access Control Security (MACsec) with static keys was added in EOS 4.15.4. This feature brings
- Written by Sriram Rajagopalan
- Posted on September 30, 2015
- Updated on February 5, 2022
- 7995 Views
Maintenance mode is a framework to allow for the easy removal of elements of a switch or the entire switch from
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on February 6, 2022
- 5346 Views
Maintenance mode with sub interfaces is an extension to the maintenance mode feature released in EOS 4 15 2F. With this
- Written by Preyas Hathi
- Posted on June 2, 2022
- Updated on June 2, 2022
- 4502 Views
A server cluster or a cluster is a group of Wireless Manager (WM) servers. A cluster comprises a parent WM server and one or more child WM servers. A cluster is created to manage multiple servers using a single server.
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on February 8, 2022
- 5774 Views
MapReduce Tracer is an existing feature that monitors MapReduce nodes that are directly connected to Arista
- Written by Digvijay Gahlot
- Posted on December 22, 2017
- Updated on December 22, 2017
- 5244 Views
Classification of MPLS packets based on traffic class bits in MPLS header for QoS Policy Maps. DCS
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 5738 Views
Currently, the 'maximum routes' knob allows one to set an upper bound on the number of routes that can be received from a
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on March 4, 2022
- 10326 Views
Media Access Control Security (MACSec) is an industry standard encryption mechanism to protect all traffic flowing
- Written by Sabah Khan
- Posted on July 25, 2024
- Updated on July 25, 2024
- 42 Views
Port mirroring allows you to duplicate ethernet packets or frames on a source interface to send to a remote host, like DANZ Monitoring Fabric (DMF). The mirrored packets or frames can be sent via a SPAN interface dedicated for communication with the host or over an L2 Generic Routing Encapsulation (L2GRE) tunnel.
- Written by Kevin Amiraux
- Posted on September 30, 2015
- Updated on May 31, 2024
- 8221 Views
Arista switches provide several mirroring features. Filtered mirroring to CPU adds a special destination to the mirroring features that allows the mirrored traffic to be sent to the switch supervisor. The traffic can then be monitored and analyzed locally without the need of a remote port analyzer. Use case of this feature is for debugging and troubleshooting purposes.
- Written by Shamit Kapadia
- Posted on September 30, 2015
- Updated on January 31, 2024
- 9021 Views
In an MLAG setup, routing on a switch (MLAG peer) is possible using its own bridge/system MAC, VARP MAC or VRRP MAC. When a peer receives an IP packet with destination MAC set to one of the aforementioned MACs, the packet gets routed if the hardware has enough information to route the packet. Before introducing this feature, if the destination MAC is peer’s bridge MAC, the packet is L2 bridged on the peer-link and the routing takes place on the peer. This behavior to use the peer-link to bridge the L3 traffic to the peer is undesirable especially when the MLAG peers can route the packets themselves.
- Written by Som Neema
- Posted on September 30, 2015
- Updated on September 30, 2015
- 7238 Views
MLAG currently checks for basic MLAG configuration to be consistent (e.g. domain id) before formation with the peer.
- Written by Tarun Soin
- Posted on February 15, 2018
- Updated on July 11, 2019
- 8221 Views
When MLAG peer link goes down, the secondary peer assumes the primary peer is down/dead, and takes over the primary
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on November 17, 2016
- 5741 Views
In an MLAG setup, periodic TCP/UDP heartbeats are sent over peer link to ensure IP connectivity between peers. Prior
- Written by Hemanth Murthy
- Posted on February 8, 2017
- Updated on December 17, 2020
- 7116 Views
If an MLAG flaps on one peer, then we may have to remap the MAC addresses learned, such that the reachability is via the
- Written by Sahil Midha
- Posted on May 14, 2015
- Updated on July 3, 2024
- 309 Views
For packets sent and received on the front-panel interfaces, this feature allows creation of a profile to configure buffer reservations in the MMU (MMU = Memory Management Unit which manages how the on-chip packet buffers are organized). The profile can contain configurations for ingress and egress. On the ingress, configuration is supported at both a port level as well as a priority-group level.
- Written by Prachi Modi
- Posted on July 16, 2024
- Updated on July 16, 2024
- 146 Views
With the 17.0 release, you can view the Tunnel Status and Tunnel State of the standby VXLAN tunnel. Until now, you could only see the status of the tunnel being used. There was no way to know if your standby tunnel was reachable or not. With this release, you can view the Tunnel Status and the Tunnel State of your primary or secondary tunnel operating in the Standby Mode.
- Written by Lavanya Conjeevaram
- Posted on November 22, 2017
- Updated on September 4, 2019
- 5866 Views
The feature MP BGP Multicast provides a way to populate the MRIB (Multicast Routing Information Base). MRIB is an
- Written by Mayukh Saubhasik
- Posted on May 1, 2015
- Updated on December 22, 2017
- 5885 Views
EOS 4.15.0F adds support for MPLS encapsulation of IP packets in EOS. The functionality is exposed through two
- Written by Max Xiao
- Posted on May 1, 2015
- Updated on February 5, 2022
- 5433 Views
Multiprotocol Label Switching (MPLS) is a networking process that replaces complete network addresses with short
- Written by Anil Joshi
- Posted on June 29, 2016
- Updated on November 3, 2022
- 7398 Views
MPLS-over-GRE encapsulation support in EOS 4.17.0 enables tunneling IPv4 packets over MPLS over GRE tunnels. This feature leverages next-hop group support in EOS. With this feature, IPv4 routes may be resolved via MPLS-over-GRE next-hop group to be able to push one MPLS label and then GRE encapsulate the resulting labelled IPv4 packet before sending out of the egress interface.
- Written by Ajay Chhatwal
- Posted on March 31, 2017
- Updated on August 15, 2017
- 5343 Views
This feature allows the Arista switch to act as the tunnel head for an MPLS tunnel and is exposed through two
- Written by Soumen Biswas
- Posted on April 24, 2015
- Updated on February 5, 2022
- 6648 Views
While migrating from PVST to MSTP, or vice verse, the network engineer may choose not to run MSTP throughout the
- Written by Allen Shih
- Posted on November 22, 2017
- Updated on November 22, 2017
- 10835 Views
Multi hop BFD allows for liveness detection between systems whose path may consist of multiple hops. With an
- Written by Shelly Chang
- Posted on November 22, 2017
- Updated on December 22, 2017
- 5619 Views
Multicast Only Fast Reroute (MoFRR) is a feature based on PIM sparse mode (PIM SM) protocol to minimize packet loss in a
- Written by Karan Jagjit Kumar
- Posted on June 29, 2016
- Updated on July 21, 2023
- 5871 Views
LANZ adds support for monitoring congestion on backplane (or fabric) ports on DCS 7304, DCS 7308, DCS 7316, DCS
- Written by Prashant Kumar
- Posted on April 13, 2015
- Updated on July 18, 2023
- 5220 Views
In Tap Aggregation mode, an interface can be configured as tap or tool port. Tap ports are used to 'tap' the traffic and
- Written by Dhruba Jyoti Pokhrel
- Posted on July 16, 2024
- Updated on July 16, 2024
- 151 Views
Multiple VLAN Registration Protocol (MVRP) is a Layer 2 protocol. The protocol allows access points to propagate the VLAN created on CV-CUE to the connected Switches. The real-time propagation of configuration allows you the flexibility of configuring your wired and wireless network in one interface and distributing it to other active interfaces. You do not have to worry about managing and maintaining the configurations in all interfaces.
- Written by Mihyar Baroudi
- Posted on December 8, 2015
- Updated on February 5, 2022
- 5368 Views
The NAT Application Gateway (ALG) feature allows FTP connections between client server to be translated using
- Written by Jikai Yin
- Posted on June 29, 2016
- Updated on December 11, 2023
- 7878 Views
NAT Peer State Synchronization feature provides redundancy and resiliency for Dynamic NAT across a pair of devices in an attempt to mitigate the risk of single NAT device failure. Each switch advertises connection state updates to its peer. State update consists of connection creation, connection state change (TCP mostly) or connection tear down
- Written by Prachi Modi
- Posted on December 11, 2022
- Updated on December 12, 2022
- 3621 Views
In the 13.0 release, CloudVision Cognitive Unified Edge (CV-CUE) adds a new report and also includes some enhancements to existing reports.
- Written by Kaladhar Musunuru
- Posted on September 30, 2015
- Updated on January 20, 2023
- 6284 Views
The nexthop group feature allows users to manually configure a set of tunnels. Nexthop group counters provide the ability to count packets and bytes associated with each tunnel nexthop, irrespective of the number of times it appears in one or more nexthop groups. In other words, if a nexthop group entry shares a tunnel resource with another entry, they will also share the same counter.
- Written by Tom Emmons
- Posted on April 13, 2015
- Updated on May 3, 2015
- 5040 Views
Nexthop selection using GRE key allows for nexthop routing selection based on the GRE key of a GRE encapsulated IP