- Written by Jared Dulmage
- Posted on October 29, 2025
- Updated on October 29, 2025
- 1742 Views
Priority-Flow-Control (PFC) Fair Adaptive Dynamic Threshold (FADT) configuration facilitates efficient utilization of packet buffer resources for both lossy and lossless traffic. Reserve headroom buffer resources to absorb in-flight packets for congested, lossless flows. Assign default or user-defined PFC profiles to interface/PFC priority pairs, called Priority Groups (PG), to dynamically manage packet buffer usage and assertion of PFC pause.
- Written by Rajat Jain
- Posted on February 8, 2017
- Updated on February 4, 2022
- 11494 Views
PFC (Priority based Flow Control) is a flow control mechanism used in RDMA environments. PFC provides a link level
- Written by Veluchamy Dinakaran
- Posted on September 30, 2015
- Updated on September 30, 2015
- 11132 Views
This feature enables detection of egress queues that are unable to transmit packets for prolonged periods of time
- Written by Mukund PB
- Posted on June 20, 2022
- Updated on May 8, 2025
- 12086 Views
Priority Flow Control (PFC) Watchdog feature monitors interfaces for priority-flow-control Pause storm. If such a storm is detected on no-drop enabled priorities, it takes actions such as:
- Written by Mihyar Baroudi
- Posted on December 8, 2015
- Updated on June 14, 2019
- 11605 Views
DCS 7050X/X2/X3 series. DCS 7060X/X2/X3 series. In previous releases, PFC Watchdog supported only queues
- Written by Rahul Kumar Singh
- Posted on August 18, 2022
- Updated on October 11, 2024
- 14540 Views
This article is intended to discuss how to configure the Phone VLAN on an Arista switch.
- Written by Neeraj Joseph
- Posted on April 23, 2018
- Updated on September 12, 2025
- 13644 Views
The PHY test pattern CLI can be used to check the quality of the physical layer for an Ethernet interface. This is done by
- Written by Sandeep Betha
- Posted on January 31, 2022
- Updated on February 25, 2025
- 19229 Views
PIM External Gateways (PEGs) allow an EVPN overlay multicast network to interface with an external PIM domain. They can be used to interconnect two data centers using an external PIM domain in between them.
- Written by Padmini Misra
- Posted on September 30, 2015
- Updated on September 30, 2015
- 11353 Views
PIM VRF feature adds VRF support to these existing multicast protocols: PIM SM, PIM BSR, IGMP and MSDP.
- Written by Santosh Kumar
- Posted on December 22, 2017
- Updated on May 2, 2024
- 11912 Views
PIM Static Source Discovery (SSD) is a feature implemented as part of PIM-SM. Familiarity with setting up and configuring PIM-SM (Sparse Mode) and PIM-SSM (Source-Specific Multicast) is assumed.
- Written by Prachi Modi
- Posted on May 8, 2025
- Updated on May 8, 2025
- 2562 Views
With the 19.0 release of CV-CUE, you can place the switches on the floor map by dragging them on the floor map.
- Written by Lavanya Conjeevaram
- Posted on June 29, 2016
- Updated on February 8, 2017
- 10844 Views
Ingress policing on front panel ports is supported on DCS 7010X and DCS 7050X since EOS4.14.0F. When ingress policing
- Written by Jaffar Hameedabdul
- Posted on November 22, 2017
- Updated on November 22, 2017
- 10550 Views
Traffic is managed through policy maps that apply data shaping methods to specific data streams. A policy map is a data
- Written by Sambath Kumar Balasubramanian
- Posted on December 20, 2024
- Updated on October 3, 2025
- 5170 Views
EOS provides support for the use of IPsec to establish and maintain IPsec tunnels. This feature adds support for redirecting traffic matching on traffic policy rules to an IPSec tunnel.
- Written by Sahil Midha
- Posted on February 8, 2017
- Updated on February 7, 2022
- 10518 Views
QoS profiles have been applicable on fabric and front panel ports across all platforms from EOS 4.17.0F release
- Written by Satya Viswanathan
- Posted on April 22, 2015
- Updated on July 2, 2015
- 9908 Views
Policy Based Routing (PBR) is a feature that is applied on routable ports, to preferentially route packets. This is
- Written by Ethan Vadai
- Posted on March 6, 2020
- Updated on April 1, 2026
- 25891 Views
Policy-based routing (PBR) is a feature that is applied on routable ports, to preferentially route packets. Forwarding is based on a policy that is enforced at the ingress of the applied interface and overrides normal routing decisions. In addition to matches on regular ACLs, PBR policy-maps can also include “raw match” statements that look like a single entry of an ACL as a convenience for users.
- Written by Yan Hua
- Posted on August 22, 2025
- Updated on April 2, 2026
- 2026 Views
This document covers the usage of port-breakout CLI to break a port evenly into multiple interfaces. In the context of this document, a port is a logical entity that holds a list of interfaces, in most cases this is equivalent to the front panel transceiver cage.
- Written by Ryan Izard
- Posted on April 23, 2025
- Updated on April 23, 2025
- 3123 Views
In previous versions, the DMF Controller had a hidden CLI command to change the log level from INFO to WARN for a particular port down log in the DMF Controller. This hidden command has been removed in DMF 8.7.0. The following is an example of the hidden command:
- Written by Gabor
- Posted on April 18, 2024
- Updated on May 22, 2025
- 9823 Views
Port mirroring is used to send a copy of packets seen on one port to a network monitoring connection on another switch port. Port mirroring is commonly used with network probes or other monitoring devices; examples include intrusion detection devices, latency analyzers, or packet capture and protocol analysis tools.
- Written by Ioana Costea
- Posted on March 31, 2017
- Updated on September 15, 2025
- 11864 Views
Persistent port security is a feature which ensures that port-security MAC cache is preserved across link flap and system reload. The feature is useful when it is desired to have the same set of already allowed secure MAC addresses on a particular interface after system reload or link flaps. There are separate global configurations to enable persistent port-security for shutdown and protect mode. A command to clear the MAC entries and secure MAC cache for interfaces with port-security configured has been added.
- Written by Mihyar Baroudi
- Posted on December 8, 2015
- Updated on December 21, 2015
- 12281 Views
Port Security: Protect mode (PortSec Protect) is newly added to the Port Security feature and is designed to restrict
- Written by Ioana Costea
- Posted on April 25, 2025
- Updated on April 25, 2025
- 3578 Views
Introduced in the 4.34.0F release, the maximum links feature allows users to specify the number of active members in both LACP and static port-channels. If active members become inactive due to configuration changes or link failure, previously restricted members can become active. This ensures the port-channel remains operational, preventing disruptions even if all initial active members fail.
- Written by Utkarsha Verma
- Posted on June 29, 2016
- Updated on June 29, 2016
- 10497 Views
Port Channel member status logging on Arista switches allows logging of Ethernet interfaces joining or leaving a
- Written by Padmanabh Ratnakar
- Posted on April 20, 2021
- Updated on October 22, 2025
- 20340 Views
The postcard telemetry (GreenT - GRE Encapsulated Telemetry) feature is used to gather per flow telemetry information like path and per hop latency. For network monitoring and troubleshooting flow related issues, it is desirable to know the path, latency and congestion information for flows at different times.
- Written by Tom Meng
- Posted on November 11, 2019
- Updated on May 7, 2025
- 11593 Views
Power management is a way to limit the total available power to be used for Power over Ethernet (PoE) ports. Without power management, the total amount of power that the power supply units (PSU) are able to provide is used. Power management can be used to create power redundancies. For example, if a system has 2 1050W PSUs, the feature can set the total available power to be 800W for PoE. With this configuration, 1 PSU is sufficient to power the system and the unused PSU acts as a backup source, thus giving the system a 1+1 redundancy.
- Written by Julie Powell
- Posted on October 23, 2024
- Updated on October 23, 2024
- 4568 Views
View PTP counters to identify the types of messages being sent and received by PTP-enabled devices. Use this to troubleshoot issues with your network PTP configuration and connectivity. When announce and sync messages are present but delay request messages are missing, for instance, it may suggest that a host is having trouble locking to the boundary clock.
- Written by Yin Chen
- Posted on October 30, 2023
- Updated on April 14, 2026
- 9702 Views
This article provides a general introduction to Precision Time Protocol (PTP) supported within EOS. PTP is aimed at distributing time with sub-microsecond accuracy. PTP support is based on the IEEE-1588 specification for version 2 of the protocol.
- Written by Jack Jiang
- Posted on October 10, 2025
- Updated on October 10, 2025
- 1858 Views
Precision Time Protocol (PTP) is a protocol aimed at distributing time between devices with sub-microsecond accuracy. PTP support is based on the IEEE-1588 specification for version 2 of the protocol. cEOS-lab is a containerised image which provides a portable way to run EOS in a virtualised environment. With this support, multiple virtual labs can be spun up to be used for testing and learning of the PTP feature.
- Written by Eric Lanini
- Posted on March 3, 2023
- Updated on October 11, 2024
- 9555 Views
Precoding is used to help reduce the burst error length of DFE (Decision Feedback Equalizer) error events with PAM-4 modulation
- Written by Cong Du
- Posted on April 13, 2015
- Updated on May 1, 2015
- 9432 Views
Starting EOS 4.15.0F, a BGP route reflector can preserve the BGP attributes (next hop, local preference and metric)
- Written by Mithilesh Tiwari
- Posted on April 17, 2026
- Updated on April 17, 2026
- 75 Views
Forwarding destination prediction allows users to determine which interface a given packet will egress out. This feature is enhanced to identify the TCAM bank and rule offset for the matched ACL rule responsible for the forwarding decision. This allows network operators to trace the egress result back to the exact rule that triggered the action.
- Written by Corey Hines
- Posted on August 17, 2018
- Updated on March 5, 2026
- 14348 Views
Priority Flow Control is a link-layer flow control mechanism which may be used by an overwhelmed network node to ask its transmitters to stop transmission for a specified period of time. It does so by using special frames known as PFC frames, thus, relieving congestion at the receiver node. With respect to this behavior, PFC is very similar to Link Layer Flow Control ( LLFC ), however, unlike LLFC, PFC allows the overwhelmed node to specify which 802.1Q Class of Service ( CoS ) it wants to stop receiving traffic for. Thus, allowing differentiated treatment of traffic based on CoS.
- Written by Saurav Arora
- Posted on July 15, 2025
- Updated on July 15, 2025
- 2434 Views
Destination based RTBH (remote triggered blackholing) is used on edge devices in a network to prevent DOS attack on a target network (IP/prefix) by blackholing/dropping the traffic destined towards this target. One of the ways to achieve this is through a trigger router sending a routing update for the prefix under attack to the edge routers configured for black hole filtering. The next-hop of such routing updates ends up getting resolved to a null/drop interface on the edge device, which results in blackholing all traffic destined towards this target network.
- Written by Shelesh Bansal
- Posted on November 8, 2023
- Updated on April 17, 2026
- 8604 Views
This feature provides protocol independent UCMP support for all the routes which follow the IGP path provided there is no UCMP computation done at the protocol level itself. This feature optimizes bandwidth utilization by weighting next-hop members according to their link capacity.
- Written by Julie Powell
- Posted on July 25, 2024
- Updated on July 25, 2024
- 5407 Views
Provisioning Settings allows you to configure CloudVision's default behavior when pushing configuration and image changes to devices. Each setting relates to an action used in Change Control. Ordinarily you should only need to use the default settings, but you can alter them for more control over CloudVision and EOS interactions for devices in your network.
- Written by Vivek Ilangovan
- Posted on October 24, 2024
- Updated on October 24, 2024
- 4691 Views
Proxy node segment helps in advertising segments in a segment-routing domain for prefixes that are originated outside the segment-routing domain. Node B in the SR domain can advertise proxy-segments to node A for the loopacks of C and D which are not present in the SR domain. This feature will help in creating mpls routes for those loopbacks on node B. Note that if C and D loopbacks have LDP enabled and if they have exchanged the LDP labels with B then B can by default create a SR to LDP stitched mpls route even without enabling this feature. This feature is specific to the case where such stitched routes cannot be created.
- Written by Rahul Sharma
- Posted on October 10, 2025
- Updated on October 10, 2025
- 1624 Views
This feature allows a customer to configure a whitelist of acceptable grandmaster clocks per switch. When such a list is configured, announce messages from only the acceptable clocks are accepted and announce messages from all other clocks are rejected. If there is no such list configured, the default behaviour kicks in i.e. all potential grandmaster clocks are considered.
- Written by Matt Murray
- Posted on May 1, 2015
- Updated on February 5, 2022
- 6161 Views
This document describes the enhancements to Arista's IEEE 1588 PTP implementation introduced in EOS 4.15.0F.
- Written by Julie Powell
- Posted on July 25, 2024
- Updated on July 25, 2024
- 5415 Views
CloudVision provides more than 20 overlay options to help you visualize the properties of network devices, interfaces, and links. Use the PTP overlay to visualize the topology of PTP enabled devices and their links. At a glance, you can see which device in a PTP domain is the grandmaster and which devices belong to a PTP domain.
- Written by Simon Eteen
- Posted on May 9, 2022
- Updated on July 22, 2025
- 12918 Views
The`ptp forward-v1` command configures the switch to forward Precision Time Protocol version 1 packets as regular multicast traffic. By default, when PTP is enabled and PTPv1 packets are received on the PTP enabled interfaces, these packets are trapped by the CPU, logged and discarded. The feature is already supported on various Arista platforms, this article highlights added support on the 7280R/7280R2/7020R/7500R/7500R2 platforms in EOS 4.26.0F and on the 7280R3/7500R3/7800R3/7289 platforms in EOS 4.29.0F. It highlights some differences in support for 7280/7500/7800 R/R2 platforms versus 7280/7500/7800 R3 platforms.
- Written by Sean McDonagh
- Posted on September 24, 2025
- Updated on September 24, 2025
- 1674 Views
This feature keeps the configured hostname for a managed appliance and the actual hostname on the managed appliance aligned. Before this change, the configured hostname for a managed appliance on the controller and the actual hostname on the managed appliance could be different.
- Written by Salam Noureddine
- Posted on September 30, 2015
- Updated on September 30, 2015
- 10293 Views
This feature makes ARP and ND packets use a higher priority output queue when software forwarded on the switch. Doing
- Written by Sahil Midha
- Posted on June 29, 2016
- Updated on February 7, 2022
- 12072 Views
Since, now there can be multiple inputs, conflicts may arise. Non conflicting configurations are when non default
- Written by Brian Schuette
- Posted on April 7, 2015
- Updated on February 7, 2022
- 8007 Views
QSFP+ modules that support TX power DOM will now display the reported TX power value via show interfaces transceiver.
- Written by Dan Cunningham
- Posted on September 30, 2015
- Updated on September 30, 2015
- 13818 Views
Forward Error Correction (FEC) is required with some QSFP100 media to achieve error free operation of the link when
- Written by Conor Hopkins
- Posted on March 16, 2021
- Updated on March 17, 2025
- 12250 Views
The current behaviour on R series products is to drop all packets marked for drop by the chip Packet Processor in the
- Written by Anupama Srivastava
- Posted on May 1, 2015
- Updated on May 1, 2015
- 8989 Views
RACL divergence enables the optimization of the utilization of hardware resources by installing ACLs only on the
- Written by Panduranga Bhat
- Posted on April 15, 2015
- Updated on May 1, 2015
- 9067 Views
TCAM sharing between different VLAN Interfaces when they have same ACL attached : Configurable via CLI
- Written by Dhruba Jyoti Pokhrel
- Posted on December 16, 2024
- Updated on December 16, 2024
- 4096 Views
RADIUS Pooling lets you assign a pre-defined list of RADIUS Servers that Access Points (AP) can use to authenticate, authorize, and maintain clients' accounts. It offers better load-balancing capabilities and improved scalability.You do not have to specify the order of the RADIUS servers as Primary or Secondary. Every AP randomly chooses the RADIUS servers from the pool, and then independently decides the sequence of the RADIUS servers and follows the order. Two APs sharing the same RADIUS pool may not share the same order for the RADIUS servers. APs automatically distribute the client load based on an intelligent algorithm.
