- Written by Vishrant Vasavada
- Posted on 6月 5, 2023
- Updated on 6月 5, 2023
- 3810 Views
A new configuration command label local-termination explicit-null under BGP LU address family allows BGP LU speakers to send explicit-null labels for prefixes for which the router is a terminating LSP node. The prefix is expected to be originating locally (via network command).
- Written by Harsimran
- Posted on 6月 5, 2023
- Updated on 6月 5, 2023
- 3879 Views
STUN (Session Traversal Utilities for NAT) is a client-server protocol that can be used by a network endpoint to determine the IP address and port assigned to it by a NAT device. The protocol is defined in RFC8489.
This document describes the STUN client and server capabilities in CloudEOS, and how this is used by Dynamic Path Selection (DPS) feature.
- Written by Harsimran
- Posted on 6月 5, 2023
- Updated on 6月 5, 2023
- 3175 Views
STUN Debugging Guide Questions and Answers
- Written by Deepanshu Shukla
- Posted on 8月 21, 2020
- Updated on 6月 3, 2024
- 12859 Views
This feature adds support for “Dynamic Load Balancing (DLB)” on Equal Cost Multi Path (ECMP) groups.
It is intended to help overcome the potential shortcomings of traditional hash-based load balancing by considering the traffic load of members of ECMP groups. DLB considers the state of the port while assigning egress ports to packets, resulting in a more even flow. The state of each port member is determined by measuring the amount of data transmitted from a given port and total number of packets enqueued to a given port.
- Written by Shashank Manjunath
- Posted on 6月 5, 2023
- Updated on 9月 18, 2024
- 3774 Views
This feature adds support for configuring multiple authentication keys each with a specified lifetime using a shared secret profile. With a shared secret profile, a current key (key having the most recent start time) is automatically picked as per the lifetime specified. Authentication types supported are MD5 and SHA. The feature can be configured at both global and interface level. SHA algorithms supported are SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512.
- Written by Neil Jarvis
- Posted on 3月 2, 2022
- Updated on 6月 7, 2023
- 8644 Views
A L2 sub-interface is a logical bridging endpoint associated with traffic on an interface distinguished by 802.1Q tags, where each <interface, 802.1Q tag> tuple is treated as a first-class bridging interface.
- Written by Prateek Mali
- Posted on 8月 19, 2020
- Updated on 9月 25, 2024
- 19948 Views
Access Control Lists (ACL) use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets and usually TCAM is used to match packets to rules. For example, there can be a rule to match the packet source IP address against a list of IP addresses, and drop the packet if there is a match. This will be expressed in TCAM with multiple entries matching the list of IP addresses. Number of entries is reduced by masking off bits, if possible. TCAM is a limited resource, so with classifiers having a large number of rules and a big field list, TCAM runs out of resources.
- Written by Naresh Kumar L S
- Posted on 2月 22, 2022
- Updated on 4月 4, 2024
- 8063 Views
Several customers have expressed interest in using IPv6 addresses for VxLAN underlay in their Data Centers (DC). Prior to 4.27.2F, only IPv4 addresses are supported for VxLAN underlay, i.e VTEPs are reachable via IPv4 addresses only. This feature enables a VTEP to send VxLAN Encapsulated packets using IPv6 underlay.
- Written by Shyam Kota
- Posted on 5月 21, 2019
- Updated on 6月 7, 2023
- 8677 Views
Add the ability to generate SYSLOG messages when a transceiver's digital optical monitoring threshold is crossed.
- Written by Victoria Austin
- Posted on 6月 5, 2023
- Updated on 5月 2, 2024
- 2615 Views
This feature is disabled by default. It can be enabled by a CLI toggle "logging transceiver communication" under the "monitor layer1" config mode. Note that “logging transceiver” will enable SMBus communication failure and digital optical monitoring syslogs. See under Resources for more information on digital optical monitoring syslogs.
- Written by Tegar Wicaksono
- Posted on 6月 20, 2022
- Updated on 6月 9, 2023
- 5146 Views
This feature provides support for packet counters for Tap Aggregation on default forwarding, GRE tunnel termination, traffic steering based on policy map and traffic steering based on traffic policy (Aegis). For brevity, counters for policy-map traffic steering will be referred to as policy-map counters, and counters for traffic-policy traffic steering will be referred to as traffic-policy counters.
- Written by Brian Schuette
- Posted on 6月 5, 2023
- Updated on 6月 9, 2023
- 3622 Views
In an optical transceiver, electrical signals leaving the switch are converted to optical signals in the transmit path. Optical signals arriving at the transceiver are converted to electrical signals that enter the switch in the receive path. At the point of conversion, an automatic decision can be made to turn off (squelch) output when the input level drops below a certain threshold of usability (usually, LOS condition.) This is referred to as automatic squelching.
- Written by Vishrant Vasavada
- Posted on 1月 3, 2023
- Updated on 5月 21, 2024
- 4047 Views
The new show command show configuration consistency adds the ability to check for “dangling” references in the configuration. For example, it is possible to configure an access-list, TEST-ACL, to an interface (ip access-group TEST-ACL in), without actually defining TEST-ACL (ip access-list TEST-ACL). This show command will list such “undefined” references.
- Written by Anirudh Ramesh Iyer
- Posted on 5月 5, 2021
- Updated on 7月 19, 2024
- 16865 Views
This article describes how to customize TCAM ( Ternary Content Addressable Memory ) lookup for each feature which uses TCAM.
- Written by Shyam Kota
- Posted on 6月 14, 2019
- Updated on 6月 1, 2023
- 8201 Views
This article describes a set of CLI commands to create TCAM profiles. The profile is composed of a set of TCAM features, with each feature having customized lookup key, actions and packet types to hit.
- Written by Isidor Kouvelas
- Posted on 2月 28, 2022
- Updated on 7月 29, 2024
- 13964 Views
Virtual Private LAN Service (VPLS) appears in (almost) all respects as an Ethernet type service to customers of a Service Provider (SP). A VPLS glues together several individual LANs across a packet switched network to appear and function as a single bridged LAN. This is accomplished by incorporating MAC address learning, flooding, and forwarding functions in the context of pseudowires that connect these individual LANs across the packet switched network. LDP signaling is used for the setup and teardown of the mesh of pseudowires that constitute a given VPLS instance.
- Written by Sarah Chen
- Posted on 6月 5, 2023
- Updated on 7月 19, 2024
- 3847 Views
Wan Routing System solution provides connectivity between different enterprise branches, DCs and head office across different geographical regions, zones and sites by using the best optimal path available based on the type of application.
- Written by Eamon Doyle
- Posted on 6月 5, 2023
- Updated on 6月 13, 2023
- 3157 Views
A fundamental business requirement for any network operator is to reduce costs where possible. For network operators, deploying devices to many locations can be a significant cost as sending trained specialists to each site for installations is both time-consuming and expensive.