- Written by Digvijay Gahlot
- Posted on 4月 20, 2021
- Updated on 1月 23, 2023
- 12335 Views
The L2 EVPN MPLS feature is available when configuring BGP in the multi-agent routing protocol model. Ethernet VPN (EVPN) is an extension of the BGP protocol introducing a new address family: L2VPN (address family number 25) / EVPN (subsequent address family number 70). It is used to exchange overlay MAC and IP address reachability information between BGP peers.
- Written by Satyam Singh
- Posted on 1月 3, 2023
- Updated on 1月 23, 2023
- 5233 Views
Hold Time is a field in OPEN BGP Message. If a BGP speaker doesn’t receive any keepalive or update messages from the other side for the duration of the hold time then it will declare the other side ‘dead’ and it will tear down the BGP session.
- Written by Feng Zhu
- Posted on 1月 3, 2023
- Updated on 1月 11, 2023
- 5337 Views
This feature monitors the BGP session status. When a BGP session goes down, traffic originally forwarded to the next hops learned from the downed BGP peer is quickly diverted to a backup path if any, or in the case of ECMP, remaining ECMP members.
- Written by Vivek Subbarao
- Posted on 1月 3, 2023
- Updated on 2月 6, 2024
- 5155 Views
Network Address Translation (NAT) is a feature used to obfuscate private internal addresses to the external world. The feature makes sure that private internal addresses are translated into a publicly visible address which is used by all external hosts and it also does the reverse translation of the public address to the private internal address.
- Written by Vamsi Anne
- Posted on 12月 29, 2021
- Updated on 5月 7, 2024
- 10125 Views
As Ethernet technologies made their way into the Metropolitan Area Networks (MAN) and the Wide Area Networks (WAN), from the conventional enterprise level usage, they are now widely being used by service providers to provide end-to-end connectivity to customers. Such service provider networks are typically spread across large geographical areas. Additionally, the service providers themselves may be relying on certain internet backbone providers, referred to as “operators”, to provide connectivity in case the geographical area to be covered is too huge. This mode of operation makes the task of Operations, Administration and Maintenance (OAM) of such networks to be far more challenging, and the ability of service providers to respond to such network faults swiftly directly impacts their competitiveness.
- Written by Mason Alexander Flowers
- Posted on 1月 3, 2023
- Updated on 1月 17, 2023
- 5742 Views
This feature introduces the show bgp evpn sanity ( brief | detail ) command. This command displays which EVPN configuration attributes are inconsistent as well as potential errors in the EVPN operational state.
- Written by Narendra C R
- Posted on 1月 3, 2023
- Updated on 5月 28, 2024
- 6127 Views
EOS currently supports EVPN Multicast by setting up PIM tunnels in the underlay with VXLAN as the transport. While this is an efficient delivery mechanism, it requires PIM to be deployed in the underlay. In certain cases, the overheads of provisioning/maintaining the multicast routers and the multicast routing state in the underlay may be significant. To support such scenarios, Ingress Replication (IR) or Head-End Replication (HER) can be used in the underlay to distribute overlay multicast traffic.
- Written by Chris Hydon
- Posted on 4月 20, 2021
- Updated on 10月 25, 2023
- 10530 Views
Multihoming in EVPN allows a single customer edge (CE) to connect to multiple provider edges (PE or tunnel endpoint).
- Written by Chris Hydon
- Posted on 6月 17, 2019
- Updated on 1月 25, 2024
- 21954 Views
Ethernet VPN (EVPN) networks normally require some measure of redundancy to reduce or eliminate the impact of outages and maintenance. RFC7432 describes four types of route to be exchanged through EVPN, with a built-in multihoming mechanism for redundancy. Prior to EOS 4.22.0F, MLAG was available as a redundancy option for EVPN with VXLAN, but not multihoming. EVPN multihoming is a multi-vendor standards-based redundancy solution that does not require a dedicated peer link and allows for more flexible configurations than MLAG, supporting peering on a per interface level rather than a per device level. It also supports a mass withdrawal mechanism to minimize traffic loss when a link goes down.
- Written by Evelyn Wang
- Posted on 3月 5, 2020
- Updated on 10月 11, 2024
- 8919 Views
The FEC (Forward Error Correction) traffic analyzer is designed to estimate the performance of the FEC layer, identify error statistics, and the source of correlated errors on physical interfaces.
- Written by James Shephard
- Posted on 8月 25, 2019
- Updated on 7月 5, 2023
- 10764 Views
Forwarding destination prediction enables visibility into how a packet is forwarded through the switch, allowing you to determine which interfaces a packet would egress out of. Typical use cases include, but are not limited to, determining egress members for Port-Channels and ECMPs.
- Written by Gary McCarthy
- Posted on 1月 3, 2023
- Updated on 4月 29, 2024
- 5350 Views
Prior to release EOS 4.29.1, a statically configured BGP neighbor, listen range or interface peer could reference a single peer group for inheriting configuration parameters. EOS 4.29.1 adds the ability for that peer group to inherit configuration from up to 8 additional “ancestor” peer groups. The term “leaf peer group” is given to the peer group which is directly referenced by the BGP neighbor, listen range or interface peer.
- Written by Prasanna Subramaniam
- Posted on 1月 3, 2023
- Updated on 1月 4, 2023
- 5617 Views
This feature optimizes the utilization of hardware resources by sharing the hardware resources between different VLAN interfaces when they have the same ACL attached in the ingress direction. This is particularly useful for larger deployments where the ACL is applied to multiple VLANs and with the RACL sharing capability, lesser hardware resources are used irrespective of the number of VLANs
- Written by Tanuj Kumar Jhamb
- Posted on 10月 20, 2022
- Updated on 7月 11, 2023
- 8013 Views
sFlow is a sampling technique which monitors the incoming traffic on all the interfaces without affecting the network performance.
- Written by Madhu Sudan
- Posted on 6月 21, 2020
- Updated on 11月 5, 2024
- 9767 Views
Several customers have expressed interest in using IPv6 addresses for VXLAN underlay in their Data Centers (DC). Prior to 4.24.1F, EOS only supported IPv4 addresses for VXLAN underlay, i.e., VTEPs were reachable via IPv4 addresses only.
- Written by Azad Kumar
- Posted on 1月 3, 2023
- Updated on 1月 3, 2023
- 5412 Views
ISIS Leaked Route Summarization is a feature which summarizes all the L1 leaked routes in L2 routers. With the help of this L2 LSP size reduces (smaller no of routes in L2 LSP).
- Written by Navneet Sinha
- Posted on 6月 29, 2016
- Updated on 7月 30, 2024
- 13867 Views
Segment Routing provides mechanism to define end-to-end paths within a topology by encoding paths as sequences of sub-paths or instructions. These sub-paths or instructions are referred to as “segments”. IS-IS Segment Routing (henceforth referred to as IS-IS SR) provides means to advertise such segments through IS-IS protocol.
- Written by Marc Laprade
- Posted on 11月 3, 2021
- Updated on 6月 13, 2023
- 10107 Views
This feature will allow the user to select whether port mirror destinations of type GRE tunnel include the optional “key” field in the GRE header on certain platforms. The key field allows the user to uniquely identify a particular packet flow. The feature also allows the user to specify the value of the 32 bit key field.
- Written by Prakrati Vidyarthi
- Posted on 8月 16, 2018
- Updated on 11月 5, 2024
- 15084 Views
Normally, a switch traps L2 protocol frames to the CPU. However, certain use-cases may require these frames to be forwarded or dropped. And in cases where the L2 protocol frames are forwarded (eg: Pseudowire), we may require the frames to be trapped to the CPU or dropped. The L2 Protocol Forwarding feature provides a mechanism to control the behavior of L2 protocol frames received on a port or subinterface.
- Written by Andy Cheng
- Posted on 1月 3, 2023
- Updated on 10月 9, 2024
- 5813 Views
4.29.1F adds Latency Analyzer (LANZ) support to the Arista SwitchApp on 7130 series. LANZ monitors SwitchApp internal buffer congestion. When the number of bytes in a buffer is over a high threshold, a congestion start event is created. When the number of bytes in a buffer is below a low threshold, a congestion end event occurs. LANZ on SwitchApp does not report any congestion update as the buffer sizes are too small for it to be meaningful. As SwitchApp comes in different profiles, each profile has a different hardware behavior due to the underlying architectural difference.
- Written by Andrei Dvornic
- Posted on 4月 2, 2015
- Updated on 2月 8, 2024
- 11189 Views
Loop protection is a loop detection and prevention method which is independent of Spanning Tree Protocol (STP) and is not disabled when the switch is in switchport backup mode or port is in discarding state. The LoopProtect agent has a method to detect loops and take action based on the configuration by the user. In order to find loops in the system, a loop detection frame is sent out periodically on each interface that loop protection is enabled on. The frame carries broadcast destination MAC address, bridge MAC source address, OUI Extended EtherType 0x88b7 as well as information to specify the origins of the packet.
- Written by Tarun Jaswanth LNU
- Posted on 6月 14, 2021
- Updated on 8月 12, 2024
- 8406 Views
Media Access Control Security (MACsec) is an industry standard encryption mechanism that protects all traffic
- Written by David Mirabito
- Posted on 12月 30, 2021
- Updated on 10月 17, 2024
- 14874 Views
MetaWatch is an FPGA-based feature available for Arista 7130 Series platforms. It provides precise timestamping of packets, aggregation and deep buffering for Ethernet links. Timestamp information and other metadata such as device and port identifiers are appended to the end of the packet as a trailer.
- Written by Dickson Chum
- Posted on 1月 3, 2023
- Updated on 9月 25, 2024
- 7197 Views
Mirroring to a GRE tunnel allows mirrored packets to transit to a L3 network using GRE encapsulation.
- Written by Mukund Mundhra
- Posted on 1月 3, 2023
- Updated on 1月 18, 2023
- 5823 Views
For packets received on the front-panel interfaces and delivered to the CPU interface, this feature allows creation of a profile to configure buffer reservations for the egress CPU queues in the MMU (MMU = Memory Management Unit which manages how the on-chip packet buffers are organized).
- Written by Swati Patel
- Posted on 1月 3, 2023
- Updated on 7月 12, 2023
- 9680 Views
Multicast EVPN IRB solution allows for the delivery of customer BUM (Broadcast, Unknown unicast and Multicast) traffic in L3VPNs using multicast in the underlay network. This document contains only partial information that is new or different for the Multicast EVPN Multiple Underlay Groups solution.
- Written by Marius
- Posted on 10月 20, 2022
- Updated on 1月 13, 2023
- 5457 Views
Before 4.29.0F, the next hop self option could only be configured for a neighbor in global router mode and would apply to all address families. Attempting to configure next-hop-self in address family mode would silently move the configuration to global mode (for the specified neighbor).
- Written by Kaladhar Musunuru
- Posted on 9月 30, 2015
- Updated on 1月 20, 2023
- 7204 Views
The nexthop group feature allows users to manually configure a set of tunnels. Nexthop group counters provide the ability to count packets and bytes associated with each tunnel nexthop, irrespective of the number of times it appears in one or more nexthop groups. In other words, if a nexthop group entry shares a tunnel resource with another entry, they will also share the same counter.
- Written by Rajesh Semwal
- Posted on 1月 3, 2023
- Updated on 1月 20, 2023
- 5259 Views
This feature adds streaming support for the BGP RIB OpenConfig model via gNMI. The current implementation supports streaming of locRib for IPv4 and IPv6 unicast address families.
- Written by Rahul Kumar Singh
- Posted on 8月 18, 2022
- Updated on 10月 11, 2024
- 8085 Views
This article is intended to discuss how to configure the Phone VLAN on an Arista switch.
- Written by David Cronin
- Posted on 3月 3, 2022
- Updated on 3月 14, 2024
- 9402 Views
This document describes a new CLI command to help debug how and why policy permits and denies paths. The aim of this CLI command is for the user to debug a route map or RCF (Routing Control Functions) function by specifying as input a prefix for which BGP has reachability for, either via a BGP peer or a redistribute source.
- Written by Tom Meng
- Posted on 1月 3, 2023
- Updated on 1月 20, 2023
- 4983 Views
This feature is a CLI show command which displays the history of system power consumption after the system boots up.
- Written by Tom Meng
- Posted on 1月 3, 2023
- Updated on 1月 20, 2023
- 5255 Views
This feature is used to save power by turning off front panel LEDs when they are not needed. After this feature is enabled, LEDs will be turned off after 1 hour from the time of system boots up or feature enabled. Transceiver insertion/removal or USB insertion will cause the LEDs to turn on for 1 hour.
- Written by Sourabh Bollapragada
- Posted on 1月 3, 2023
- Updated on 2月 7, 2024
- 6450 Views
PTP 1-step Boundary Clock (or 1-step BC) is similar to 2-step BC in function but doesn’t send the PTP Follow_Up message. The timestamp present in the PTP Follow_Up message’s preciseOriginTimestamp field is sent in the PTP Sync message’s originTimestamp field along with a non-zero correctionField. This allows us to support more PTP master ports because the control plane does not need to generate PTP Follow_Up messages anymore. PTP 1-step BC supports all the existing features supported by 2-step BC like G8275.1 profile, G8275.2 profile, etc unless otherwise specified in the limitations.
- Written by Prakhar Rastogi
- Posted on 9月 2, 2021
- Updated on 1月 10, 2023
- 8005 Views
RADIUS over TLS provides secure and reliable transport for RADIUS clients. RADIUS over TLS allows RADIUS
- Written by Dan Cunningham
- Posted on 10月 3, 2023
- Updated on 6月 18, 2024
- 7307 Views
The SFP-10G-RA-1G-LX and SFP-10G-RA-1G-SX transceivers are rate adapting SFP+ transceivers with internal clause 37 auto-negotiation (AN) support. The transceiver host interface is 10G XFI and the module rate adapts in the egress direction from 10G to 1G before transmitting data on the attached fiber. In the ingress direction it rate adapts the received 1G data to 10G before sending to the host switch. This allows 1000BASE-LX and 1000BASE-SX support on switches which do not natively support 1G operation.
- Written by David Cronin
- Posted on 3月 3, 2022
- Updated on 11月 6, 2024
- 19172 Views
Routing control functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by David Cronin
- Posted on 3月 3, 2022
- Updated on 11月 7, 2024
- 11631 Views
Routing Control Functions (RCF) is a language that can express route filtering and attribute modification logic in a powerful and programmatic fashion.The document covers: Configurations of a RCF function for BGP points of application
- Written by Shamit Kapadia
- Posted on 5月 3, 2022
- Updated on 6月 5, 2023
- 8156 Views
Routing Control Functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by Roger Levesque
- Posted on 1月 3, 2023
- Updated on 1月 11, 2023
- 6604 Views
Routing control functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by David Cronin
- Posted on 3月 4, 2022
- Updated on 4月 16, 2024
- 16436 Views
Routing control functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by Hillol Chakraborty
- Posted on 1月 3, 2023
- Updated on 1月 23, 2023
- 4968 Views
SR P2MP ( Segment Routing Point to Multipoint ) is a protocol that can be used to steer multicast traffic across a network. This provides a better way to instantiate MVPN Provider tunnel in service provider network over traditional way of using RSVP P2MP.
- Written by Akshay Gattani
- Posted on 12月 19, 2019
- Updated on 1月 11, 2023
- 8362 Views
This feature adds support for static inter-VRF routes. This enables configuration of routes to destinations in one ingress VRF with an ability to specify a next-hop in a different egress VRF through a static configuration.
- Written by David Jowett
- Posted on 1月 3, 2023
- Updated on 1月 11, 2023
- 5534 Views
The feature allows egress sFlow sampling to be enabled per a subinterface. The egress sFlow sampling per a subinterface configuration will only have effect when egress sFlow sampling is disabled on the parent interface as egress sFlow sampling on the parent interface includes traffic on all subinterfaces.
- Written by Leighton Carmichael-Powell
- Posted on 1月 3, 2023
- Updated on 7月 14, 2023
- 5710 Views
This document describes the prefix counter feature and is intended for customers who are familiar with and are using VRF selection policies (see linked TOI for details). In short, the prefix counter feature enables traffic matching a VRF selection policy to be counted on a per-prefix/per-route basis. This is limited to IPv4 traffic and prefixes of length 32.
- Written by Basil Saji
- Posted on 11月 9, 2020
- Updated on 10月 11, 2024
- 10636 Views
Private VLAN is a feature that segregates a regular VLAN broadcast domain while maintaining all ports in the same IP subnet. There are three types of VLAN within a private VLAN
- Written by Eamon Doyle
- Posted on 1月 3, 2023
- Updated on 1月 10, 2023
- 5818 Views
A fundamental business requirement for any network operator is to reduce costs where possible. For network operators, deploying devices to many locations can be a significant cost as sending trained specialists to each site for installations is both time-consuming and expensive.
- Written by Neil Jarvis
- Posted on 3月 2, 2022
- Updated on 6月 7, 2023
- 8877 Views
A L2 sub-interface is a logical bridging endpoint associated with traffic on an interface distinguished by 802.1Q tags, where each <interface, 802.1Q tag> tuple is treated as a first-class bridging interface.
- Written by Bidong Chen
- Posted on 10月 20, 2022
- Updated on 1月 17, 2023
- 6535 Views
This feature enables Tap Aggregation generic header removal on a tap port.
- Written by Pooja Deo
- Posted on 1月 3, 2023
- Updated on 5月 17, 2023
- 4684 Views
Prior to this feature we supported a maximum of two levels of Forward Equivalence Class hierarchies in hardware.