- Written by Paul Fallon
- Posted on 8月 28, 2020
- Updated on 4月 24, 2025
- 12838 Views
For a pair of QSFP100 ports grouped together on a gearbox, it is possible to enable a 10G or 25G link on the first primary port while maintaining the usage of the secondary port at any speed. For two QSFP100 ports on a gearbox, the primary port allows for breakout speeds 4x10G and 4x25G, while the secondary does not. The configuration of the primary port determines whether the secondary port can be used since in a full breakout mode such as 4x10G the secondary port is forced inactive.
- Written by Bohan Yang
- Posted on 3月 31, 2017
- Updated on 1月 11, 2022
- 13092 Views
In EOS 4.18.1, support for 25G/50G is added on 7500R, 7280R, 7500R2 and 7280R2 series. This feature provides forced
- Written by Eamon Doyle
- Posted on 2月 8, 2017
- Updated on 2月 9, 2017
- 10767 Views
The BGP extended communities support within EOS has been enhanced to include support for 4 octet AS Extended BGP
- Written by Radu Handolescu
- Posted on 10月 14, 2021
- Updated on 1月 14, 2026
- 14071 Views
The 400GBASE ZRP (also known as ZR+) is a transceiver that follows the OpenZR+ MSA (Multi Source Agreement)
- Written by Lavanya Conjeevaram
- Posted on 9月 11, 2017
- Updated on 2月 6, 2022
- 10938 Views
Starting EOS release 4.15.2F, the ability to re number front panel ports of 7050QX 32S is supported.
- Written by Jason Lai
- Posted on 10月 10, 2025
- Updated on 10月 10, 2025
- 3560 Views
This document provides information on how to configure static NAT with selective VXLAN encapsulation using policy-based routing (PBR) and debug related issues on Arista 7170 switches.
- Written by Salah Sheikh
- Posted on 11月 4, 2025
- Updated on 11月 4, 2025
- 6640 Views
Newly supported Features, Ingress IPv4/IPv6 and MAC ACL on FPP ( routed/switched ), Port-Channel, L3 subInterfaces ,Ingress IPv4/IPv6 and MAC ACL counters , Ingress IPv4/IPv6 and MAC ACL deny logging
- Written by Venkatesh Janakiraman
- Posted on 12月 19, 2019
- Updated on 1月 8, 2026
- 12013 Views
This TOI supplements the Ingress Traffic Policy applied on ingress port interfaces. Please refer to that document for a description of Traffic Policies and field-sets. This TOI explains the Traffic Policies as applied in the ingress direction on VLAN interfaces. For Traffic Policies on the egress direction of VLAN interfaces, see the Egress Traffic Policy TOI.
- Written by Mihyar Baroudi
- Posted on 2月 1, 2016
- Updated on 2月 16, 2017
- 10810 Views
The 7500E 6CFPX LC linecard with ACO CFP2 optics provides connectivity over DWDM systems and links. 7500E 6CFPX LC
- Written by Dhruba Jyoti Pokhrel
- Posted on 12月 13, 2024
- Updated on 12月 19, 2024
- 4238 Views
The 802.11be standards build on 802.11ax by providing ultra-high throughput, improved resource utilization, and interference mitigation. The 320 MHz support increases the throughput and performance in the 6GHz band. The improved resource utilization is attributed to the introduction of Multiple Resource Units (MRU) in Orthogonal Frequency Division Multiple Access (OFDMA) transmission and Multi-Link Operation (MLO).
- Written by Graeme Rennie
- Posted on 3月 31, 2017
- Updated on 4月 18, 2022
- 12923 Views
This article describes a feature for Tap Aggregation mode, which strips IEEE 802.1BR E-Tag and Cisco VN-Tag headers from all tagged packets received on tap interface before delivering them out of tool interfaces.
- Written by Manish Singhvi
- Posted on 9月 11, 2025
- Updated on 9月 16, 2025
- 2312 Views
802.1X dynamic interface configuration allows for dynamic interface configuration on the 802.1X authenticator based on device profiling performed by a Network Access Controller (NAC). Traditionally, 802.1X authenticators require static interface configuration. This enhancement extends dynamic capabilities beyond existing features like dynamic VLAN assignment and ACL programming, enabling any type of interface configuration to be applied dynamically via the CLI.
- Written by Tarun Jaswanth LNU
- Posted on 8月 24, 2020
- Updated on 4月 2, 2026
- 38864 Views
802.1X is an IEEE standard protocol that prevents unauthorized devices from gaining access to the network. We support dot1x protocol standard 802.1X-2004 (version=2)
- Written by Rahul Sharma
- Posted on 1月 12, 2026
- Updated on 1月 12, 2026
- 919 Views
This feature allows a user to adjust the MTU of radius requests for 802.1x supplicants. Currently this feature only adjusts the MTU size of radius requests for supplicants undergoing EAP TLS authentication. This can be useful in scenarios where hops between the switch and RADIUS doesn’t support IP MTU discovery and the switch ends up sending Access Requests based on the interface MTU size which get dropped at such hops. With this feature, a user has the flexibility to experiment and choose a MTU setting that works for such a topology forcing the Dot1x agent to send the Access Requests with the configured MTU.
- Written by Yitao (Eric) Wu
- Posted on 4月 14, 2015
- Updated on 5月 13, 2015
- 10907 Views
802.1X port security controls who can send traffic through and receive traffic from the individual switch ports. A
- Written by Manish Singhvi
- Posted on 10月 10, 2025
- Updated on 10月 10, 2025
- 1711 Views
802.1X supplicant feature supports different Extensible Authentication Protocol( EAP ) methods for 802.1X authentication. This document specifically talks about support for supplicants doing EAP Password ( EAP-PWD ) based authentication. Defined in RFC5931, EAP-PWD is an EAP method that uses a shared password for authentication. Furthermore, this feature allows EOS devices to interoperate with systems that rely on EAP-PWD for deriving MACsec CAK/CKN from the EAP Master Session Key (MSK) and EAP Session ID as per 802.1X-2020.
- Written by Ethan Rahn
- Posted on 11月 13, 2019
- Updated on 12月 12, 2025
- 12120 Views
This feature adds support in AAA using the LDAP protocol. LDAP can be used for authentication and
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2656 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2535 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2541 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2550 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2538 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2612 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 7月 18, 2025
- 2498 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2547 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Can Sun
- Posted on 6月 19, 2025
- Updated on 8月 5, 2025
- 2567 Views
Measured boot is an anti-tamper mechanism. It calculates the cryptographic signatures for software system components and extends the signatures into the Trusted Platform Module (TPM) security chip. Upon startup, with the feature turned on, the Aboot bootloader and EOS calculate the hash of various system components and extend the hashes into the Platform Configuration Registers (PCRs), which is one of the resources of the Trusted Platform Module (TPM) security chip. The calculation and extension event is called the measured boot event, which is associated with a revision number to help the user identify changes to the event.
- Written by Paul McDade
- Posted on 9月 18, 2025
- Updated on 9月 18, 2025
- 1718 Views
When configuring the MAC address of a switch, CLI commands and REST endpoints will accept a MAC address formatted as three groups of four hexadecimal digits separated by periods (e.g. 1122.3344.5566) in addition to the already accepted form of six hexadecimal digit pairs separated by colons (e.g. 11:22:33:44:55:66).
- Written by Julie Powell
- Posted on 7月 25, 2024
- Updated on 7月 25, 2024
- 5532 Views
You can now enable CloudVision to combine the authentication and authorization requests that it sends to a RADIUS server into a single request. When RADIUS is configured as the AAA provider, CloudVision will send separate authentication and authorization requests by default. This can cause issues with One-Time Password (OTP) users, as issued passwords are only valid for one request. Note: Non-OTP RADIUS systems will be unaffected by the change. To combine authentication and authorization requests, navigate to Settings > Access Control and enable the Combine Login Auth Requests checkbox.
- Written by Joseph Walsh
- Posted on 7月 25, 2024
- Updated on 7月 25, 2024
- 5438 Views
This studio enables you to quickly configure access interfaces towards endpoint devices in your campus network. This configuration relates to the devices in Access Pods deployed using the Campus Fabric (L2/L3/EVPN) Studio. The studio consists of port profiles and campus networks. You can create port profiles, which contain configuration for attributes like speed and MTU, which you can then assign to device interfaces in a campus fabric. Editing the profile will then affect all interfaces that the profile has been assigned to. You can also configure individual interfaces.
- Written by Joseph Walsh
- Posted on 10月 30, 2024
- Updated on 10月 30, 2024
- 4670 Views
This studio enables you to quickly configure access interfaces towards endpoint devices in your campus network. This configuration relates to the devices in Access Pods deployed using the Campus Fabric (L2/L3/EVPN) Studio.
- Written by Preyas Hathi
- Posted on 6月 2, 2022
- Updated on 6月 2, 2022
- 10064 Views
With the 12.0 release, CloudVision Cognitive Unified Edge (CV-CUE) introduces Access Points (AP) Explorer. AP Explorer helps you view the distribution of APs by various attributes such as Model, Software Version, Status, and so on.
- Written by Noah Tinker
- Posted on 3月 13, 2026
- Updated on 3月 16, 2026
- 329 Views
Security policies occasionally prevent the download of PCAP files from packet queries. The integrated Wireshark web interface enables PCAP analysis within the DMF environment and requires authentication for access. This integration provides full Wireshark functionality while keeping the PCAP file on the Controller to maintain adherence to security requirements.
- Written by Gurpreet Singh
- Posted on 9月 30, 2015
- Updated on 6月 15, 2018
- 11001 Views
This feature enables user to modify QoS parameters for SVI traffic (L3 VLAN) based on ACL classification. The QoS
- Written by Nicolas Robert
- Posted on 7月 2, 2025
- Updated on 7月 2, 2025
- 2748 Views
The feature allows filtering on source and destination IP addresses within the VXLAN inner payload, on ingress port ACL. The feature can be configured using the inner keyword within the VXLAN ACL configuration. Because of some limitations, the feature should be utilized for debugging purposes.
- Written by Mohit Saxena
- Posted on 5月 1, 2015
- Updated on 6月 15, 2018
- 12086 Views
Ingress policing provides the ability to monitor the data rates for a particular class of traffic and perform action
- Written by Chirag Dasannacharya
- Posted on 4月 17, 2026
- Updated on 4月 17, 2026
- 120 Views
Beginning with EOS version 4.36.0F, the CCS-710XP series offers the ability to increase ingress Access Control List (ACL) scale if counters are declared unnecessary. This will be the default behavior on CCS-710XP platforms running releases from 4.36.0F onwards. This document details steps to enable or disable counters as required, along with resources for related issues.
- Written by Julie Powell
- Posted on 7月 25, 2024
- Updated on 7月 25, 2024
- 5342 Views
A new role permission, Action Execution, has been introduced to control the execution of custom actions when they are run in isolation, such as via Studio Autofill actions and standalone executions in the Action editor. A custom action is a user-created action that has either been installed via a package or has been created using python script and arguments.
- Written by Varun
- Posted on 3月 16, 2026
- Updated on 3月 16, 2026
- 372 Views
This feature adds the support for a standby server to the existing syslog logging mechanism for UDP syslog servers. The user can specify a logging group and specify remote syslog servers. The first host configured will be the “active” server, which means syslogs will be forwarded to that host whenever it is reachable via ICMP. The second host will be the “standby” server, which will receive syslogs if the active server goes down. This provides more robustness for setups with multiple potential syslog servers.
- Written by Shashank Hegde
- Posted on 9月 30, 2015
- Updated on 9月 30, 2015
- 10600 Views
The active active neutron controller support in CVX enables the deployment of highly available neutron service with
- Written by Chris Pearson
- Posted on 8月 22, 2025
- Updated on 8月 22, 2025
- 2018 Views
This feature gives AVT/DPS tunnels the ability to transport IPv6 overlay traffic. Formerly, such tunnels could only transport IPv4 overlay traffic.
- Written by Gaurav Verma
- Posted on 4月 15, 2015
- Updated on 2月 6, 2022
- 11376 Views
Starting EOS 4.15.0F, users can configure NAT at IP address level with dynamically assigned one to one mapping
- Written by VIKAS NARAYANAPPA
- Posted on 3月 12, 2026
- Updated on 3月 12, 2026
- 393 Views
Adjacency sharing is a feature which deduplicates FEC to avoid installing identical FECs in hardware. Often this applies to Equal Cost Multi Path (ECMP) FECs, which are generally a much more scarce resource. Hierarchical FECs are not supported with adjacency sharing.
- Written by Michael (Mike) Fink
- Posted on 12月 22, 2017
- Updated on 3月 19, 2025
- 20065 Views
The following table describes the advanced mirroring features that are currently supported with links to their respective TOIs.
- Written by Prachi Modi
- Posted on 3月 20, 2026
- Updated on 3月 20, 2026
- 347 Views
With the 21.2 release, CV-CUE introduces Advanced Alert Parameters to fine-tune alert sensitivity.
In diverse Wi-Fi environments, static global alert thresholds might generate false positives. For example, a high density of clients re-associating during a radio frequency change might be flagged as a DoS attack.
- Written by Noah Tinker
- Posted on 3月 13, 2026
- Updated on 3月 13, 2026
- 313 Views
The AES-256 Support for SNMPv3 feature implements 256-bit encryption for SNMPv3 interactions on the DMF Controller and managed devices. Configuring the AES-256 privacy protocol option enhances the User-based Security Model (USM) by enforcing 256-bit encryption standards.
- Written by John Schimmel
- Posted on 4月 24, 2025
- Updated on 6月 3, 2025
- 5430 Views
The DANZ Monitoring Fabric (DMF) Aggregate Arista GRE TAP action receives GRE-encapsulated packet samples from EOS switches, and generates an IPFIX report containing the flow 5-tuple, metadata, and timestamps from switches that the packet passed through. Use the IPFIX report to determine the flows in a data fabric, monitor server session initialization delays, estimate the bandwidth of flows, and learn the path of packets through the fabric.
- Written by Bruno Perriot
- Posted on 9月 12, 2024
- Updated on 1月 21, 2026
- 5603 Views
The AGM for ECMP feature allows monitoring the number of packets and bytes going through each member of the configured ECMP group on the system, with a high time resolution.
- Written by John Schimmel
- Posted on 5月 2, 2025
- Updated on 5月 2, 2025
- 2880 Views
The DANZ Monitoring Fabric (DMF) Aggregate sFlow takes sFlow packet samples and generates an IPFIX report containing the flow 5-tuple, metadata, and timestamps from switches that the packet passed through.
- Written by Prasoon Saurav
- Posted on 2月 8, 2017
- Updated on 2月 9, 2017
- 10881 Views
Aggregate storm control with traffic class option provides the capability to rate limit BUM(Broadcast, Unknown
- Written by Anoop Dawani
- Posted on 9月 30, 2015
- Updated on 9月 30, 2015
- 10520 Views
This article describes changes to the platform command 'show platform fm6000 agileports'. Earlier this command was
