- Written by Mouli Baskaran
- Posted on May 1, 2015
- Updated on March 19, 2016
- 9663 Views
IPv4/IPv6 over MPLS packets are now eligible for ACLs at egress stage by default. The feature is applicable only to
- Written by Sridhar Nagarajan
- Posted on January 8, 2026
- Updated on January 8, 2026
- 121 Views
EOS-4.35.1F adds support for egress IPv4/IPv6/MAC PACL. So, by default, egress IPv4/IPv6 ACL enabled on default profile and for MAC ACL to enable, it is required to add its support directly to the current tcam profile or create a new tcam profile based on the default profile and disable egress IPv4 and IPv6 ACL features.
- Written by Denis Evoy
- Posted on October 24, 2024
- Updated on October 24, 2024
- 4169 Views
Normally, an ingress router has no control over an autonomous system border router’s (ASBR) selection of inter-AS links. In the example below, Peer 2 and Peer 3 both advertise reachability to some remote network to ASBR 1 (e.g. service route 172.16.1.0/24). ASBR 1 would then use normal bestpath selection rules to select a preferred egress path (for traffic flowing to that service route). However, this means that the ingress router has no control over which egress path is chosen.
- Written by Ganesh Priyatham Palivela
- Posted on October 10, 2025
- Updated on October 10, 2025
- 980 Views
Egress Priority Tagging is a feature that allows a switch to send out priority tagged ethernet frames in place of untagged frames. Priority tagged frames are sent with the VLAN ID set to zero allowing downstream devices to read the 802.1p priority bits set in the VLAN header.
- Written by Tanuj Kumar Jhamb
- Posted on February 7, 2024
- Updated on September 16, 2025
- 6746 Views
sFlow is a sampling technique which monitors incoming traffic on all interfaces without affecting network performance. Egress sFlow is a feature which samples the packets in the egress pipeline for analytical purposes. Currently egress sFlow is only software based on Arista switches.
- Written by AKSHAYA Sridharan
- Posted on December 17, 2020
- Updated on October 22, 2025
- 12320 Views
Egress traffic-policing can be applied on L3 Ethernet subinterfaces for outbound traffic.
- Written by Anupama Srivastava
- Posted on September 30, 2015
- Updated on February 8, 2022
- 9671 Views
This feature optimizes the utilization of hardware resources by sharing tcam entries for a group of SVIs on which an
- Written by Dhruba Jyoti Pokhrel
- Posted on July 7, 2023
- Updated on July 7, 2023
- 7618 Views
RadSec or RADIUS over TLS is a protocol for secure communication between a client and the RADIUS server. RadSec uses TCP and TLS protocols to form a secure tunnel between the client and the server.
- Written by Akshay Gattani
- Posted on February 8, 2017
- Updated on February 9, 2017
- 9761 Views
The BGP implementation now provides the ability to display the age of paths received for a given prefix using the
- Written by Jacob Sword
- Posted on February 16, 2022
- Updated on November 5, 2025
- 14689 Views
Multiple dynamic counter features may be enabled simultaneously, primarily configured using the ‘[no] hardware counter feature [feature]’ CLI commands. Compatibility of these features has been enhanced to allow for greater flexibility in simultaneously enabled counter features. Changes in counter feature compatibility across EOS releases is detailed below.
- Written by Kenneth Cheung
- Posted on November 22, 2017
- Updated on July 21, 2023
- 11997 Views
EOS 4.20.1F introduces expanded VRRP, VARP and MLAG Peer Gateway virtual MAC capabilities on the 7500R, 7280R,
- Written by Mihyar Baroudi
- Posted on December 8, 2015
- Updated on February 7, 2022
- 9927 Views
IP in IP decapsulation was first introduced for the supported platforms(below) in EOS version 4.15.0F (IP in IP
- Written by Lavanya Conjeevaram
- Posted on April 1, 2015
- Updated on August 2, 2022
- 1226 Views
DANZ provides a set of features and tools to enhance instrumentation and network/ application performance monitoring with the following key functional areas.
- Written by Can Sun
- Posted on December 20, 2024
- Updated on December 20, 2024
- 3633 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on August 12, 2025
- Updated on August 13, 2025
- 1382 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Denis Evoy
- Posted on August 8, 2025
- Updated on August 8, 2025
- 1396 Views
The FIB contains mappings between a prefix (identifying a destination network) and its associated Forwarding Equivalence Class (FEC), with the FEC containing one or more resolved Vias defining how traffic should be forwarded towards that destination network.
- Written by Reji Thomas
- Posted on October 16, 2024
- Updated on October 16, 2024
- 4346 Views
RFC 5837 describes extensions to the Internet Control Message Protocol (ICMP) that enable network devices to identify incoming and outgoing interfaces and next-hop addresses via extensions to specific ICMP error messages. These extensions are particularly useful for network diagnostics and troubleshooting applications.
- Written by Dylan Walsh
- Posted on October 20, 2022
- Updated on August 7, 2025
- 11806 Views
EosSdkRpc is an agent built on top of the Arista EOS SDK. It uses gRPC as a mechanism to provide remote access to the EOS SDK. The gRPC interface that EosSdkRpc supports closely matches the interface provided by EOS SDK, and the intent is that the .proto interface can be publicly supported. EosSdkRpc allows for remote access and using protobuf to specify the interface isolates user code from the Linux ABI issues that come with building C++ applications on different compiler, libc, and kernel versions. EosSdkRpc is built using C++ but supports clients written in any of the languages currently supported by the gRPC framework.
- Written by Ajay Kini
- Posted on September 16, 2025
- Updated on September 16, 2025
- 1071 Views
This feature allows configuring backup entries for static MPLS LFIB routes via EOS SDK RPC to be activated if its corresponding primary entries are unable to forward traffic due to next hops being unresolved or its corresponding interface being down. Any backup entries will not be activated to forward traffic until all primary entries are unviable. Thereby, backup entries configured for the Static MPLS routes are a mechanism to achieve fast failover when the primary path fails.
- Written by Srilekha Nune
- Posted on April 24, 2025
- Updated on April 24, 2025
- 2463 Views
This feature prevents policy churn by automatically placing switch interfaces with frequent flapping into an error-disabled state, effectively performing an automatic administrative shutdown. The feature also allows for automatically recovering these interfaces after a specified time. This feature reduces the risk of lost packets caused by continuous recomputation of DANZ Monitoring Fabric (DMF) policies due to flapping interfaces.
- Written by Steve Ulrich
- Posted on June 5, 2023
- Updated on July 22, 2025
- 7920 Views
Traffic policies applied to interfaces are used to match traffic based on packet header fields or their summarized counterparts and take configured actions against them. The match rules configured in these policies are usually installed in a prioritized hardware table (i.e., TCAM) where the action of the first-hit filter is taken. The summarized fields are also installed in various hardware tables. The hardware utilization of traffic policies is very much dependent not only in the number of configured match rules but also in how the set of values are distributed for each field.
- Written by Abhishek Raghuveer
- Posted on July 9, 2025
- Updated on July 10, 2025
- 2053 Views
This feature is an extension of ZTX monitor mode functionality to virtual machines where a virtual machine running on a hypervisor(ESXi/KVM) will facilitate the generation of MSS policies by exporting flow telemetry to CloudVision Portal. vZTX will primarily focus on the use cases where the data traffic in the customer sites are limited(<10Gbps). This will help the customer to reduce the capital expenditure costs by avoiding the need of purchasing a dedicated hardware box. So, this product can cater to the needs of small to medium size enterprise customers.
- Written by Vamsi Anne
- Posted on December 29, 2021
- Updated on August 19, 2025
- 15394 Views
As Ethernet technologies made their way into the Metropolitan Area Networks (MAN) and the Wide Area Networks (WAN), from the conventional enterprise level usage, they are now widely being used by service providers to provide end-to-end connectivity to customers. Such service provider networks are typically spread across large geographical areas. Additionally, the service providers themselves may be relying on certain internet backbone providers, referred to as “operators”, to provide connectivity in case the geographical area to be covered is too huge. This mode of operation makes the task of Operations, Administration and Maintenance (OAM) of such networks to be far more challenging, and the ability of service providers to respond to such network faults swiftly directly impacts their competitiveness.
- Written by Vamsi Anne
- Posted on October 20, 2022
- Updated on December 30, 2024
- 12131 Views
As Ethernet technologies made their way into the Metropolitan Area Networks (MAN) and the Wide Area Networks (WAN) from the conventional enterprise level usage, they are now widely being used by service providers to provide end-to-end connectivity to customers. Such service provider networks are typically spread across large geographical areas. Additionally, the service providers themselves may be relying on certain internet backbone providers, referred to as “operators”, to provide connectivity in case the geographical area to be covered is too huge.
- Written by Christopher Yamashita
- Posted on January 3, 2025
- Updated on September 16, 2025
- 3969 Views
As Ethernet technologies made their way into the Metropolitan Area Networks (MAN) and the Wide Area Networks (WAN) from the conventional enterprise level usage, they are now widely being used by service providers to provide end-to-end connectivity to customers. Such service provider networks are typically spread across large geographical areas. Additionally, the service providers themselves may be relying on certain internet backbone providers, referred to as “operators”, to provide connectivity in case the geographical area to be covered is too huge. This mode of operation makes the task of Operations, Administration and Maintenance (OAM) of such networks far more challenging, and the ability of service providers to respond to frame loss in such networks directly impacts their competitiveness.
- Written by Shourya Agrawal
- Posted on April 25, 2025
- Updated on April 25, 2025
- 2393 Views
This feature adds support for using the management port on AWE-7220RP-5TH-2S alternately as Ethernet8 port.
- Written by Mihyar Baroudi
- Posted on September 11, 2017
- Updated on October 31, 2019
- 11839 Views
The EOS Event Manager feature provides the ability to specify a condition and an action to be carried out when that
- Written by Mihyar Baroudi
- Posted on October 24, 2024
- Updated on October 24, 2024
- 4468 Views
The EOS Event Manager feature provides the ability to specify a condition and an action to be carried out when that condition is detected. It is a flexible and configurable way to automate the reaction to conditions without the need for a system operator to observe and apply the desired actions manually.
- Written by Mihyar Baroudi
- Posted on September 11, 2017
- Updated on May 7, 2024
- 12911 Views
The EOS Event Manager feature, introduced in 4.17.0F, provides the ability to specify a condition and an action
- Written by Mihyar Baroudi
- Posted on September 11, 2017
- Updated on February 8, 2022
- 12733 Views
The EOS Event Manager feature provides the ability to specify a condition and an action to be carried out when that
- Written by Abhiram Kalluru
- Posted on March 4, 2025
- Updated on March 4, 2025
- 3053 Views
Event monitor is extended to support new event types that continuously synchronize their contents with the sqlite database (in contrast with event monitor’s current behavior of synchronizing event state only when cli commands are run.)
- Written by Julie Powell
- Posted on November 4, 2024
- Updated on November 4, 2024
- 3744 Views
CloudVision allows you to generate event notifications so that you can stay up to date on your network's status and performance. Notification configuration involves formatting notifications, configuring notification platforms, assigning notification receivers, and configuring notification rules.
- Written by Manuel Lai
- Posted on June 9, 2017
- Updated on August 2, 2022
- 2744 Views
The ability to monitor and react to Syslog messages provides a powerful and flexible tool that can be used to apply self
- Written by Julie Powell
- Posted on July 25, 2024
- Updated on July 25, 2024
- 4699 Views
In order to minimize the volume of change control events, CloudVision has introduced a new event, Change Control Events. Change Control Events is generated when 2 or more of the following events are triggered for the same change control:
- Written by Julie Powell
- Posted on October 22, 2024
- Updated on October 22, 2024
- 3870 Views
CloudVision will generate a Disk Utilization on CloudVision Node Breached Threshold event when disk utilization for a CloudVision node has either exceeded the default threshold or breached the user-configured threshold set in event rules.
- Written by Julie Powell
- Posted on April 3, 2024
- Updated on April 3, 2024
- 6114 Views
Event Rollup allows you to manage the volume of identical events and can be used to flag when an event is recurring. Event Rollup groups together events that are identical except for their timestamps. It does so in two ways: dynamically via the Event List and according to a 24-hour window via the detailed event view. It can be enabled or disabled at will, using the Roll Up toggle.
- Written by Alton Lo
- Posted on November 6, 2023
- Updated on March 5, 2025
- 8971 Views
RFC7432 defines the MAC/IP advertisement NLRI (route type 2) for exchanging EVPN overlay end-hosts’ MAC and IP address reachability information. When an EVPN MAC/IP route contains more than one path to the same destination, the EVPN MAC/IP best-path selection algorithm determines which of these paths should be considered as the best path.
- Written by Alton Lo
- Posted on March 18, 2020
- Updated on January 12, 2026
- 25526 Views
In the Centralized Anycast Gateway configuration, the Spines are configured with EVPN-IRB and are used as the IP Default Gateway(DWG), whereas the Top of rack switches perform L2 EVPN Routing.
- Written by Alton Lo
- Posted on May 14, 2024
- Updated on July 10, 2025
- 8181 Views
This new feature explains the use of the BGP Domain PATH (D-PATH) attribute that can be used to identify the EVPN domain(s) through which the EVPN MAC-IP routes have passed. EOS DCI Gateway provides new mechanisms for users to specify the EVPN Domain Identifier for its local and remote domains. DCI Gateways sharing the same redundancy group should share the same local domain identifier and same remote domain identifier.
- Written by Aaron Bamberger
- Posted on April 23, 2020
- Updated on April 21, 2025
- 14640 Views
E-Tree is an L2 EVPN service (defined in RFC8317) in which each attachment circuit (AC) is assigned the role of Root or Leaf. In this implementation, ACs are configured at the VLAN level, and the forwarding rules are enforced using a combination of local configuration of leaf VLANs (for local hosts), and asymmetric route targets (for remote hosts).
- Written by Lavanya Conjeevaram
- Posted on March 31, 2017
- Updated on July 23, 2025
- 18767 Views
Ethernet VPN (EVPN) is an extension of the BGP protocol introducing a new address family: L2VPN (address family number 25) / EVPN (subsequent address family number 70). It is used to exchange overlay MAC and IP address reachability information between BGP peers within a tunnel
- Written by Lavanya Conjeevaram
- Posted on December 22, 2017
- Updated on September 5, 2025
- 14221 Views
In the traditional data center design, inter-subnet forwarding is provided by a centralized router, where traffic traverses across the network to a centralized routing node and back again to its final destination. In a large multi-tenant data center environment this operational model can lead to inefficient use of bandwidth and sub-optimal forwarding.
- Written by Jeff Wen
- Posted on January 21, 2019
- Updated on September 12, 2025
- 14920 Views
In the traditional data center design, inter-subnet forwarding is provided by a centralized router, where traffic traverses across the network to a centralized routing node and back again to its final destination. In a large multi-tenant data center environment this operational model can lead to inefficient use of bandwidth and sub-optimal forwarding.
- Written by Jeffrey Nelson
- Posted on October 28, 2020
- Updated on January 24, 2025
- 28129 Views
This feature adds control plane support for inter subnet forwarding between EVPN networks. This support is achieved
- Written by May Young
- Posted on June 24, 2021
- Updated on January 5, 2026
- 16091 Views
This feature is available when configuring Layer2 EVPN or EVPN IRB.
- Written by Alton Lo
- Posted on January 23, 2019
- Updated on July 4, 2025
- 20751 Views
“MLAG Domain Shared Router MAC” is a new mechanism to introduce a new router MAC to be used for MLAG TOR Leaf pairs. The user can either explicitly configure the MAC address of their choice or use the system-generated MLAG system-id for this purpose.
- Written by Wade Carpenter
- Posted on April 24, 2020
- Updated on March 19, 2025
- 23259 Views
EVPN MPLS VPWS (RFC 8214) provides the ability to forward customer traffic to / from a given attachment circuit (AC) without any MAC lookup / learning. The basic advantage of VPWS over an L2 EVPN is the reduced control plane signalling due to not exchanging MAC address information. In contrast to LDP pseudowires, EVPN MPLS VPWS uses BGP for signalling. Port based and VLAN based services are supported.
- Written by Alton Lo
- Posted on December 24, 2024
- Updated on December 24, 2024
- 4728 Views
Multihoming in EVPN allows a single customer edge (CE) to connect to multiple provider edges (PE or tunnel endpoint). These PE devices are all connected to the same Ethernet-Segment (ES). Multihoming is activated by assigning a unique Ethernet Segment Identifier (ESI) and ES-Import Route Target (RT) which enables all the PEs connected to the same multihomed site to import the Type 4 ES routes
- Written by Xuan Qi
- Posted on March 13, 2020
- Updated on March 13, 2020
- 15227 Views
In EOS 4.22.0F, EVPN VXLAN all active multi homing L2 support is available. A customer edge (CE) device can connect to
- Written by Chris Hydon
- Posted on June 17, 2019
- Updated on December 19, 2024
- 30104 Views
Ethernet VPN (EVPN) networks normally require some measure of redundancy to reduce or eliminate the impact of outages and maintenance. RFC7432 describes four types of route to be exchanged through EVPN, with a built-in multihoming mechanism for redundancy. Prior to EOS 4.22.0F, MLAG was available as a redundancy option for EVPN with VXLAN, but not multihoming. EVPN multihoming is a multi-vendor standards-based redundancy solution that does not require a dedicated peer link and allows for more flexible configurations than MLAG, supporting peering on a per interface level rather than a per device level. It also supports a mass withdrawal mechanism to minimize traffic loss when a link goes down.
