- Written by Bin Wang
- Posted on December 22, 2020
- Updated on January 7, 2026
- 11892 Views
For various peering applications, there is a need to support the assignment of a MAC address on routed interfaces.
- Written by Vikas Hegde
- Posted on June 29, 2016
- Updated on February 8, 2022
- 12116 Views
Support for Media Access Control Security (MACsec) with static keys was added in EOS 4.15.4. This feature brings
- Written by Tarun Jaswanth LNU
- Posted on June 14, 2021
- Updated on June 2, 2025
- 13481 Views
Media Access Control Security (MACsec) is an industry standard encryption mechanism that protects all traffic
- Written by Jeff Chan
- Posted on June 16, 2022
- Updated on June 3, 2025
- 2813 Views
Media Access Control Security (MACSec) is an industry standard encryption mechanism to protect all traffic flowing on Ethernet links. Mac Security is described in IEEE 802.1X and IEEE 802.1AE standards.
- Written by Kieran Weaver
- Posted on December 20, 2024
- Updated on December 20, 2024
- 4329 Views
Media Access Control Security (MACsec) is an industry standard encryption mechanism that protects all traffic flowing on the Ethernet links. MACsec is based on IEEE 802.1X and IEEE 802.1AE standards.
- Written by Avineet Sharma
- Posted on April 24, 2025
- Updated on April 24, 2025
- 2708 Views
DMF 8.7.0 supports Media Access Control Security (MACsec) as an Early Field Trial (EFT) feature. MACsec is a global configuration option for the entire fabric, with the option to enable it on intracore traffic only. MACsec only encrypts traffic between core switches, ignoring all other ancillary traffic (e.g., tap to filter, delivery to tool). MACsec is a licensed feature. Verify a MACsec license is installed on all switches participating in MACsec before using this feature.
- Written by Japraj Sandhu
- Posted on December 20, 2024
- Updated on December 20, 2024
- 4057 Views
By default, the only visibility a user has into packets that are dropped due to errors with the MACsec/IPsec protocols is a set of counters, such as with show mac security counters detail. This feature enables redirecting such packets to the CPU for manual inspection; it is intended to assist with debugging unexpected packet drops.
- Written by Sriram Rajagopalan
- Posted on September 30, 2015
- Updated on February 5, 2022
- 14475 Views
Maintenance mode is a framework to allow for the easy removal of elements of a switch or the entire switch from
- Written by Shamit Kapadia
- Posted on March 4, 2025
- Updated on November 4, 2025
- 3893 Views
EVPN VXLAN all-active multihoming (AA-MH) provides redundancy to reduce or eliminate the impact of outages and maintenance. The objective of Maintenance Mode on AA-MH is to gracefully drain away the traffic from the EVPN core flowing through a switch that is part of multihoming while the switch is put into maintenance, and to gracefully add it back into the network and attract traffic again once the switch is out of maintenance. During the maintenance cycle any customer edge Ethernet or Port-Channel interfaces, whether they are participating as ethernet segments or not, can also be put into maintenance mode. Doing so eliminates the northbound traffic from the customer edge from flowing through the switch under maintenance. The traffic will instead take a path through other available multi-homing peers.
- Written by Marcin Szubert
- Posted on July 17, 2025
- Updated on July 17, 2025
- 2085 Views
Maintenance mode is a framework that allows for the easy removal of switch elements or the entire switch from service with minimal configuration. This feature supports the maintenance mode in WAN Routing System Adaptive Virtual Topology, including high availability deployment. Traffic is drawn away from the node entering maintenance mode. Currently, the feature supports only maintenance mode for the built-in unit System.
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on February 6, 2022
- 10437 Views
Maintenance mode with sub interfaces is an extension to the maintenance mode feature released in EOS 4 15 2F. With this
- Written by Jing Wu
- Posted on April 24, 2025
- Updated on April 29, 2025
- 2739 Views
This document describes managing certificates and private keys in DMF.
- Written by Preyas Hathi
- Posted on June 2, 2022
- Updated on June 2, 2022
- 9420 Views
A server cluster or a cluster is a group of Wireless Manager (WM) servers. A cluster comprises a parent WM server and one or more child WM servers. A cluster is created to manage multiple servers using a single server.
- Written by Joseph Walsh
- Posted on October 24, 2024
- Updated on October 24, 2024
- 4261 Views
The Management Connectivity Studio is used to configure out-of-band (OOB) management interfaces. You’ll create a profile of configured attributes for management interfaces, which can be assigned to multiple devices at once using tags.
- Written by Eric Lanini
- Posted on October 29, 2025
- Updated on November 13, 2025
- 1272 Views
In general, EOS always configures the PHYs to have the correct polarity to match that of the standard, such that if a standard compliant transceiver is plugged in and the peer is standard compliant everything will work.
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on February 8, 2022
- 10757 Views
MapReduce Tracer is an existing feature that monitors MapReduce nodes that are directly connected to Arista
- Written by Sunil Kumar
- Posted on May 5, 2025
- Updated on May 5, 2025
- 2615 Views
In DMF 8.7.0, the redesigned integration configuration now masks the password field and improves the configuration management. Use the Edit icon to Add, Modify, or Delete the Integration configuration.
- Written by Digvijay Gahlot
- Posted on December 22, 2017
- Updated on December 22, 2017
- 10276 Views
Classification of MPLS packets based on traffic class bits in MPLS header for QoS Policy Maps. DCS
- Written by Yashvir Singh
- Posted on March 2, 2021
- Updated on May 9, 2025
- 14075 Views
This feature allows classification of packets on QoS policy-maps based on the Class of Service (CoS), VLAN, Drop Eligible Indicator (DEI) in the 802.1q header of the packet. CoS (Class of Service) corresponds to the Priority code point (PCP) bits in the 802.1q header.
- Written by Shyam Kota
- Posted on November 6, 2019
- Updated on January 27, 2026
- 13851 Views
This feature allows setting the desired maximum VOQ latency. Drop probabilities are adjusted in hardware to meet this limit.
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on June 29, 2016
- 10936 Views
Currently, the 'maximum routes' knob allows one to set an upper bound on the number of routes that can be received from a
- Written by Ioana Costea
- Posted on November 9, 2020
- Updated on April 11, 2025
- 10709 Views
Previously, the maximum valid port channel ID was equal to the maximum number of port channels configurable on the
- Written by Can Sun
- Posted on August 12, 2025
- Updated on January 20, 2026
- 1975 Views
Measured boot is a tamper-detection mechanism that records a system's boot process. It calculates cryptographic hashes of system components and configurations, which are then securely stored in the Platform Configuration Registers (PCRs) of a Trusted Platform Module (TPM) chip. This process creates a secure "hash chain" of the boot sequence. After the system starts, the TPM Quote operation, along with the PCR extension records, can be used to verify the PCR values, confirming that the system components are unchanged and the software is trusted.
- Written by Can Sun
- Posted on December 20, 2024
- Updated on December 20, 2024
- 4079 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, and the event is associated with a revision number to help the user identify changes to the event.
- Written by Mihyar Baroudi
- Posted on February 1, 2016
- Updated on March 4, 2022
- 18719 Views
Media Access Control Security (MACSec) is an industry standard encryption mechanism to protect all traffic flowing
- Written by Alejandro Schwoykoski
- Posted on December 22, 2021
- Updated on January 20, 2026
- 19094 Views
MetaMux is an FPGA-based feature available on Arista’s 7130 platforms. It performs ultra-low latency Ethernet packet multiplexing with or without packet contention queuing. The port to port latency is a function of the selected MetaMux profile, front panel ingress port, front panel egress port, FPGA connector ingress port, and platform being used.
- Written by David Mirabito
- Posted on December 30, 2021
- Updated on January 29, 2026
- 29079 Views
MetaWatch is an FPGA-based feature available for Arista 7130 Series platforms. It provides precise timestamping of packets, aggregation and deep buffering for Ethernet links. Timestamp information and other metadata such as device and port identifiers are appended to the end of the packet as a trailer
- Written by Julie Powell
- Posted on November 4, 2024
- Updated on November 4, 2024
- 4838 Views
CloudVision provides support for microperimeter segmentation and enforcement as part of Arista’s Multi-Domain Segmentation Service (MSS) for Zero Trust Networking (ZTN).
ZTN works to reduce lateral movement into increasingly smaller areas where workloads are granularly identified and only approved connections are permitted.
- Written by Abdul Haseeb Jehangir
- Posted on March 12, 2020
- Updated on August 28, 2025
- 17929 Views
Mirror on drop is a network visibility feature which allows monitoring of MPLS or IP flow drops occurring in the ingress pipeline. When such a drop is detected, it is sent to the control plane where it is processed and then sent to configured collectors. Additionally, CLI show commands provide general and detailed statistics and status.
- Written by Anurag Mishra
- Posted on January 22, 2019
- Updated on December 17, 2024
- 10322 Views
This feature allows a user to configure a mirror session with subinterface sources from the CLI. This feature is only available with ingress mirroring (rx direction)
- Written by Sabah Khan
- Posted on July 25, 2024
- Updated on July 25, 2024
- 5129 Views
Port mirroring allows you to duplicate ethernet packets or frames on a source interface to send to a remote host, like DANZ Monitoring Fabric (DMF). The mirrored packets or frames can be sent via a SPAN interface dedicated for communication with the host or over an L2 Generic Routing Encapsulation (L2GRE) tunnel.
- Written by Kevin Amiraux
- Posted on September 30, 2015
- Updated on February 13, 2026
- 23488 Views
Arista switches provide several mirroring features. Filtered mirroring to CPU adds a special destination to the mirroring features that allows the mirrored traffic to be sent to the switch supervisor. The traffic can then be monitored and analyzed locally without the need of a remote port analyzer. Use case of this feature is for debugging and troubleshooting purposes.
- Written by Robert Ling
- Posted on May 2, 2025
- Updated on May 2, 2025
- 2641 Views
DMF 8.7.0 introduces an updated dashboard for viewing sFlow drops. The DMF analytics Node (AN) displays reasons for dropped packets as a Mirror on Drop (MOD) drop Flow sFlow collector by analyzing overall drops and drops by flow.
- Written by Shamit Kapadia
- Posted on September 30, 2015
- Updated on January 31, 2024
- 15498 Views
In an MLAG setup, routing on a switch (MLAG peer) is possible using its own bridge/system MAC, VARP MAC or VRRP MAC. When a peer receives an IP packet with destination MAC set to one of the aforementioned MACs, the packet gets routed if the hardware has enough information to route the packet. Before introducing this feature, if the destination MAC is peer’s bridge MAC, the packet is L2 bridged on the peer-link and the routing takes place on the peer. This behavior to use the peer-link to bridge the L3 traffic to the peer is undesirable especially when the MLAG peers can route the packets themselves.
- Written by Som Neema
- Posted on September 30, 2015
- Updated on September 30, 2015
- 13301 Views
MLAG currently checks for basic MLAG configuration to be consistent (e.g. domain id) before formation with the peer.
- Written by Tarun Soin
- Posted on February 15, 2018
- Updated on July 11, 2019
- 13965 Views
When MLAG peer link goes down, the secondary peer assumes the primary peer is down/dead, and takes over the primary
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on November 17, 2016
- 10953 Views
In an MLAG setup, periodic TCP/UDP heartbeats are sent over peer link to ensure IP connectivity between peers. Prior
- Written by Ryan Megathlin
- Posted on September 12, 2024
- Updated on December 20, 2024
- 5206 Views
This feature allows users to configure L2 subinterfaces on MLAG interfaces. L2 subinterfaces are not supported on the MLAG peer-link.
- Written by Shyam Kota
- Posted on June 13, 2019
- Updated on August 4, 2025
- 18886 Views
The objective of Maintenance Mode on MLAG is to gracefully drain away the traffic (L2 and BGP) flowing through a switch
- Written by Prakhar Rastogi
- Posted on April 23, 2018
- Updated on September 5, 2025
- 13552 Views
MLAG Smart System Upgrade (SSU) provides the ability to upgrade the EOS image of an MLAG switch with minimal traffic disruption.
- Written by Ravikumar Chandrasekaran
- Posted on March 21, 2025
- Updated on March 21, 2025
- 3206 Views
MLAG will support the following features Bridging, Routing, STP, VARP
- Written by Kenneth Cheung
- Posted on June 4, 2020
- Updated on June 19, 2025
- 13399 Views
On a MLAG chassis, MAC addresses learned on individual peers are synced and appropriate interfaces are mapped to these MAC addresses. In case of unexpected events like reloading of one of the peers in the MLAG chassis or flapping of one or more MLAG interfaces, some loss of traffic may be observed.
- Written by Hemanth Murthy
- Posted on February 8, 2017
- Updated on December 17, 2020
- 12827 Views
If an MLAG flaps on one peer, then we may have to remap the MAC addresses learned, such that the reachability is via the
- Written by Kartic Bhargav
- Posted on November 4, 2025
- Updated on November 4, 2025
- 6134 Views
For packets sent and received on the front-panel interfaces, this feature allows creation of a profile to configure buffer reservations in the MMU (MMU = Memory Management Unit which manages how the on-chip packet buffers are organized).
- Written by Sahil Midha
- Posted on May 14, 2015
- Updated on July 3, 2024
- 6169 Views
For packets sent and received on the front-panel interfaces, this feature allows creation of a profile to configure buffer reservations in the MMU (MMU = Memory Management Unit which manages how the on-chip packet buffers are organized). The profile can contain configurations for ingress and egress. On the ingress, configuration is supported at both a port level as well as a priority-group level.
- Written by Alphan Karacaer
- Posted on February 27, 2025
- Updated on February 27, 2025
- 3356 Views
The main objective of this feature is to prevent modular systems from being shut down due to insufficient power by powering off cards if there is not enough power in the system at card startup.
- Written by Travis Hammond
- Posted on March 6, 2020
- Updated on January 2, 2025
- 10644 Views
This feature allows the removal of a configurable number of leading bytes starting from the Ethernet layer of packets sent to a monitor session. A new per-monitor session CLI command is provided to configure this, up to a maximum of 90 bytes.
- Written by Prachi Modi
- Posted on July 16, 2024
- Updated on July 16, 2024
- 5006 Views
With the 17.0 release, you can view the Tunnel Status and Tunnel State of the standby VXLAN tunnel. Until now, you could only see the status of the tunnel being used. There was no way to know if your standby tunnel was reachable or not. With this release, you can view the Tunnel Status and the Tunnel State of your primary or secondary tunnel operating in the Standby Mode.
- Written by Siddarth Karki
- Posted on March 3, 2023
- Updated on January 16, 2026
- 10627 Views
From the 4.29.2F release of EOS, proactive probing of servers is supported. Using this feature Arista switches can continuously probe configured servers to check their liveliness and use the information obtained from these probes while sending out requests to the servers.
- Written by Lavanya Conjeevaram
- Posted on November 22, 2017
- Updated on September 4, 2019
- 11189 Views
The feature MP BGP Multicast provides a way to populate the MRIB (Multicast Routing Information Base). MRIB is an
