- Written by Digvijay Gahlot
- Posted on 4月 20, 2021
- Updated on 1月 23, 2023
- 11929 Views
The L2 EVPN MPLS feature is available when configuring BGP in the multi-agent routing protocol model. Ethernet VPN (EVPN) is an extension of the BGP protocol introducing a new address family: L2VPN (address family number 25) / EVPN (subsequent address family number 70). It is used to exchange overlay MAC and IP address reachability information between BGP peers.
- Written by Michael (Mike) Fink
- Posted on 12月 22, 2017
- Updated on 9月 25, 2023
- 13598 Views
Filtered Mirroring allows certain packets to be selected for mirroring, rather than all packets ingressing or egressing a particular port.
- Written by Colin MacGiollaEain
- Posted on 1月 6, 2023
- Updated on 1月 6, 2023
- 6575 Views
When using virtual instances for network simulation (among other things), there exists the issue that the virtual device interface mapping does not match that of the actual physical interfaces on the real devices. While a conversion/substitution could be done, this would result in the creation of large amounts of code/config that serves little useful purpose.
- Written by Nader Lahouti
- Posted on 4月 25, 2022
- Updated on 6月 2, 2022
- 8931 Views
The Media Controller Service provides a deterministic high performance service with an easy to use API interface to manage and monitor real-time broadcast workflows in IP networks. It allows fast programming of static multicast routes and igmp snooping across L2/L3 interfaces with real-time tallies for feedback.
- Written by Vipul Shah
- Posted on 3月 13, 2020
- Updated on 5月 4, 2022
- 8703 Views
The goal of IAR operation is to minimize the CPU processing and churn in hardware by identifying a set of nexthop adjacencies such that updating those adjacencies in-place is sufficient to correctly forward the traffic quickly for all the affected routes.
- Written by Jesper Skriver
- Posted on 4月 25, 2022
- Updated on 7月 10, 2024
- 6829 Views
Route reflectors are commonly used to distribute routes between BGP peers belonging to the same autonomous system. However, this can lead to non-optimal path selection. The reason for this is that the route reflector chooses the optimal route based on IGP cost from its perspective. This may not be optimal from the perspective of the client as its location may be different from the RR
- Written by Shamit Kapadia
- Posted on 4月 25, 2022
- Updated on 6月 19, 2023
- 7936 Views
To understand why BGP-LU tunnels are required to be redistributed into LDP and vice versa, let’s consider the following basic topology for InterAS Option C. It uses IS-IS as IGP where indicated along with LDP:
- Written by Forhad Ahmed
- Posted on 4月 19, 2022
- Updated on 3月 7, 2023
- 6334 Views
BGP Monitoring Protocol (BMP) allows a monitoring station to connect to a router and collect all of the BGP announcements received from the router’s BGP peers.
- Written by Bharath Somayaji
- Posted on 4月 25, 2022
- Updated on 9月 8, 2023
- 8111 Views
Class Based Forwarding (CBF) is a means for steering IP traffic into colored tunnels based on the ingress DSCP values. CBF may be used with SR-TE Policy or RSVP-TE colored tunnels.
- Written by Fathima Thasneem
- Posted on 4月 25, 2022
- Updated on 5月 28, 2024
- 6865 Views
As Ethernet technologies made their way into the Metropolitan Area Networks ( MAN ) and the Wide Area Networks ( WAN ), from the conventional enterprise level usage, they are now widely being used by service providers to provide end-to-end connectivity to customers. Such service provider networks are typically spread across large geographical areas. Additionally, the service providers themselves may be relying on certain internet backbone providers, referred to as “operators”, to provide connectivity in case the geographical area to be covered is too huge.
- Written by Huong Nguyen
- Posted on 11月 13, 2019
- Updated on 10月 12, 2023
- 12960 Views
Support for DHCPv4 (RFC 2131) and DHCPv6 Server (RFC 8415) was added to EOS-4.22.1 and EOS-4.23.0 respectively. EOS DHCP server leverages ISC Kea as backend. The router with DHCP Server enabled acts as a server that allocates and delivers network addresses with desired configuration parameters to its hosts.
- Written by Devon McAvoy
- Posted on 10月 4, 2019
- Updated on 7月 31, 2024
- 10129 Views
DirectFlow runs alongside the existing layer 2/3 forwarding plane, enabling a network architecture that incorporates new capabilities, such as TAP aggregation and custom traffic engineering, alongside traditional forwarding models. DirectFlow allows users to define flows that consist of match conditions and actions to perform that are a superset of the OpenFlow 1.0 specification. DirectFlow does not require a controller or any third party integration as flows can be installed via the CLI.
- Written by Seng Leung
- Posted on 5月 9, 2022
- Updated on 6月 2, 2022
- 7479 Views
When OpenConfig is enabled, the entire YANG tree is exposed to the client. This allows a client to have read and write access to all parts of the YANG tree. In some cases, it would be preferable to block portions of the YANG tree so that specific part of the tree cannot be modified or read by the client.
- Written by Harish Prabhu
- Posted on 4月 18, 2022
- Updated on 6月 2, 2022
- 6648 Views
This feature introduces a new CLI command which disables the above-mentioned propagation of DSCP and ECN bits from the outer IP header.
- Written by Yin Chen
- Posted on 5月 9, 2022
- Updated on 6月 2, 2022
- 6607 Views
Precision Time Protocol (PTP) management messages are general messages sent to PTP-enabled switches on the data plane. On Arista switches, its behavior depends on the configured PTP mode.
- Written by Edwin Tambi
- Posted on 8月 19, 2020
- Updated on 7月 3, 2024
- 19186 Views
EOS supports the ability to match on a single VLAN tag (example: encapsulation dot1q vlan 10) or a VLAN tag pair (example: encapsulation dot1q vlan 10 inner 20) to map matching packets to an interface. In this case, the encapsulation string is considered consumed by the mapped interface before forwarding, which means that the tags are effectively removed from the incoming packet for the purposes of any downstream forwarding.
- Written by Pratik Mangalore
- Posted on 12月 14, 2020
- Updated on 11月 22, 2023
- 11568 Views
IP Locking is an EOS feature configured on an Ethernet Layer 2 port. When enabled, it ensures that a port will only permit IP and ARP packets with IP source addresses that have been authorized. As of EOS-4.25.0F release update, IP Locking can run in two modes - IPv4 Locking (which will be referred to as IP Locking) and IPv6 Locking, which can be configured using the commands mentioned in the below sections. IP Locking prevents another host on a different interface from claiming ownership of an IP address through either IP or ARP spoofing.
- Written by Parikshit Misra
- Posted on 4月 28, 2022
- Updated on 6月 2, 2022
- 6467 Views
An IPsec service ACL provides a way to block IPsec connections to/from specific addresses. This feature works in a similar way to other protocols in EOS that provide this functionality.
- Written by Tanuj Kumar Jhamb
- Posted on 4月 18, 2022
- Updated on 6月 2, 2022
- 6182 Views
The flow-label match for QoS policy map can be achieved by using the TCAM profile “qos-match-ipv6-flow-label” which is available from EOS 4.27.2F onwards.
- Written by Nathan Wolfe
- Posted on 2月 15, 2018
- Updated on 2月 21, 2024
- 10969 Views
Introduced in EOS-4.20.1F, “selectable hashing fields” feature controls whether a certain header’s field is used in the hash calculation for LAG and ECMP.
- Written by David Mirabito
- Posted on 12月 30, 2021
- Updated on 7月 30, 2024
- 14132 Views
MetaWatch is an FPGA-based feature available for Arista 7130 Series platforms. It provides precise timestamping of packets, aggregation and deep buffering for Ethernet links. Timestamp information and other metadata such as device and port identifiers are appended to the end of the packet as a trailer.
- Written by Prashant Srinivas
- Posted on 4月 25, 2022
- Updated on 11月 29, 2023
- 8322 Views
The solution described in this document allows multicast traffic arriving on a VRF interface on a Provider’s Edge (PE) router to be delivered to Customer’s Edge (CE) routers with downstream receivers in the same VPN.
- Written by Johnny Chen
- Posted on 4月 25, 2022
- Updated on 6月 2, 2022
- 6857 Views
The Per-MAC ACL feature provides the functionality to apply an IPv4/IPv6 ACL to a 802.1x supplicant instead of applying them on the port that the supplicant is behind. This allows for more flexible and specific traffic policies to be defined for supplicants trying to access certain resources on the network.
- Written by Shamit Kapadia
- Posted on 5月 3, 2022
- Updated on 6月 5, 2023
- 7841 Views
Routing Control Functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by David Cronin
- Posted on 3月 4, 2022
- Updated on 4月 16, 2024
- 15779 Views
Routing control functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by Shamit Kapadia
- Posted on 5月 3, 2022
- Updated on 6月 2, 2022
- 6903 Views
Routing Control Functions (RCF) is a language that can be used to express route filtering and attribute modification logic in a powerful and programmatic fashion.
- Written by Kalash Nainwal
- Posted on 12月 14, 2020
- Updated on 7月 31, 2024
- 11673 Views
RSVP-TE, the Resource Reservation Protocol (RSVP) for Traffic Engineering (TE), is used to distribute MPLS labels for steering traffic and reserving bandwidth. The Label Edge Router (LER) feature implements the headend functionality, i.e., RSVP-TE tunnels can originate at an LER which can steer traffic into the tunnel.
- Written by Dan Cunningham
- Posted on 4月 18, 2022
- Updated on 6月 18, 2024
- 10325 Views
This feature introduces support for the SFP-10G-MRA-T SFP transceiver. This is a rate adapting transceiver, meaning it can convert the system side interface to a lower rate on the line side.
- Written by Srinivasan Viswanathan
- Posted on 4月 18, 2022
- Updated on 6月 2, 2022
- 6909 Views
Compatible platforms start up in the “default” forwarding-table partition mode, which provides the ability to program up to 8K L2 addresses.
- Written by Kaustav Majumdar
- Posted on 4月 19, 2022
- Updated on 6月 2, 2022
- 6414 Views
Support for Media Access Control Security ( MACsec ) was added in EOS-4.15.4. It introduced the concept of configuring pre-shared keys ( PSKs ) for the purpose of MKA negotiation.
- Written by Andreas Roeseler
- Posted on 4月 19, 2022
- Updated on 6月 2, 2022
- 5479 Views
The Ephemeral Port Range is a range of network ports that are typically reserved for automatic port allocation. Ports in this range could be grabbed and released frequently by custom agents that require a port but do not require a specific known port.
- Written by Neil Jarvis
- Posted on 3月 2, 2022
- Updated on 6月 7, 2023
- 8568 Views
A L2 sub-interface is a logical bridging endpoint associated with traffic on an interface distinguished by 802.1Q tags, where each <interface, 802.1Q tag> tuple is treated as a first-class bridging interface.
- Written by Muhammad Yousuf
- Posted on 9月 9, 2021
- Updated on 2月 27, 2024
- 8270 Views
This TOI supplements the Ingress Traffic Policy applied on ingress interfaces. Please refer to that document for a description of Traffic Policies and field-sets. This TOI explains the Traffic Policies as applied in the egress direction on interfaces
- Written by Prateek Mali
- Posted on 8月 19, 2020
- Updated on 9月 25, 2024
- 19784 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Aoxi Yao
- Posted on 5月 3, 2022
- Updated on 9月 18, 2023
- 7117 Views
This feature introduces the support for Traffic Policy on VLANs. Traffic Policy allows the user to configure rules to match on certain packets through the packet processing pipeline. The user can also place actions to match packets.
- Written by Kallol Mandal
- Posted on 4月 25, 2022
- Updated on 9月 25, 2024
- 7819 Views
Overlay IPv6 routing over VXLAN tunnel using an anycast gateway (direct routing) has been previously supported using the “ipv6 virtual-router” configuration for both the data-plane and EVPN (or CVX) control-plane learning environments.
- Written by James Brinkley
- Posted on 4月 25, 2022
- Updated on 1月 5, 2023
- 9293 Views
SWIM (SWI Modularized) is a change to the format of EOS.swi. It is a feature that is mostly internal, but has a few customer visible side-effects one should be mindful of.
- Written by Graeme Rennie
- Posted on 2月 15, 2022
- Updated on 5月 11, 2022
- 7124 Views
This article describes the Tap Aggregation MAC Address Replacement feature. This feature provides the ability to configure user-specific values to replace the destination and source MAC addresses of packets forwarded by Tap Aggregation.
- Written by Stefan Kheraj
- Posted on 10月 21, 2021
- Updated on 5月 11, 2022
- 7268 Views
Traffic steering to nexthop groups allows specifying one or more nexthop groups as the destination for a TAP aggregation steering policy. Traffic steering is a TAP aggregation process that uses class maps and policy maps to direct data streams received on TAP ports.
- Written by Will Li
- Posted on 4月 18, 2022
- Updated on 6月 2, 2022
- 6024 Views
The ‘redirect’ action used in TCAM profile has lower priority than system rules, if packets match both TCAM rule using ‘redirect’ action and system rules. Hence ‘redirect’ action does not take effect on these packets.
- Written by Isidor Kouvelas
- Posted on 2月 28, 2022
- Updated on 7月 29, 2024
- 13805 Views
Virtual Private LAN Service (VPLS) appears in (almost) all respects as an Ethernet type service to customers of a Service Provider (SP). A VPLS glues together several individual LANs across a packet switched network to appear and function as a single bridged LAN. This is accomplished by incorporating MAC address learning, flooding, and forwarding functions in the context of pseudowires that connect these individual LANs across the packet switched network. LDP signaling is used for the setup and teardown of the mesh of pseudowires that constitute a given VPLS instance.
- Written by Jeevan Surya Maddu
- Posted on 6月 10, 2019
- Updated on 4月 21, 2022
- 10918 Views
A VLAN-Aware bundle MAC-VRF allows multiple L2 domains to be advertised by a single MAC-VRF. The Ethernet Tag ID (ETID) as described in RFC7432 identifies the L2 domain within an EVPN instance corresponding to each route.
- Written by Navlok Mishra
- Posted on 2月 8, 2017
- Updated on 5月 17, 2024
- 7096 Views
WRED ( Weighted Random Early Detection ) is one of the congestion management techniques.