- Written by Joseph Walsh
- Posted on 11月 6, 2024
- Updated on 11月 6, 2024
- 4206 Views
The Interface Diagnostics quick action provides you with a fast and efficient way to run interface cycles and cable diagnostics on your campus devices from the Campus Health Overview Dashboard. The devices available are those with a Campus tag, which is automatically assigned to devices configured with the Campus Fabric Studio (L2/L3/EVPN).
- Written by Neel Neogi
- Posted on 12月 30, 2020
- Updated on 5月 15, 2025
- 19016 Views
The document describes the support for dedicated and group ingress policing on interfaces without using QoS policy-maps to match on the traffic and apply policing.
- Written by Joseph Walsh
- Posted on 7月 25, 2024
- Updated on 7月 25, 2024
- 5156 Views
You can use the Access Interface Configuration quick action to assign configuration profiles to devices. The guided workflow will display an illustration of device front panels, which you can use to select interfaces from.
- Written by Joseph Walsh
- Posted on 10月 30, 2024
- Updated on 10月 30, 2024
- 4232 Views
You can use the Access Interface Configuration quick action to assign configuration profiles to devices. The guided workflow will display an illustration of device front panels, which you can use to select interfaces from.
- Written by Dhruba Jyoti Pokhrel
- Posted on 7月 7, 2023
- Updated on 7月 7, 2023
- 7871 Views
One of the reasons why Wi-Fi clients encounter RF issues is non-Wi-Fi interference. All Wi-Fi 6 and above APs can perform interference classification. CloudVision Cognitive Unified Edge (CV-CUE) classifies interference into four categories — Wi-Fi, Microwave Oven (MWO), Frequency Hopping Spread Spectrum (FHSS), and Continuous Wave (CW).
- Written by Srinivasan Koona Lokabiraman
- Posted on 6月 29, 2023
- Updated on 1月 10, 2025
- 9345 Views
The internet exit feature enables hosts attached to a VRF in an edge router to reach prefixes that may be reachable over the internet. Since the addresses assigned within a VRF may be non-routable private addresses which cannot be directly used when going to the Internet, the NAT feature is used as a part of the Internet exit solution to provide internet connectivity.
- Written by Richard Goh
- Posted on 8月 16, 2018
- Updated on 3月 18, 2025
- 12315 Views
IPv6 multicast routing protocols are used to distribute IPv6 datagrams to one or more recipients. IPv6 PIM builds and maintains multicast routing using reverse path forwarding (RPF) based on the unicast routing table. IPv6 PIM is protocol-independent and can use routing tables consisting of OSPFv3, IPv6 BGP or static routes, for RPF lookup. MLD is used to discover multicast hosts and maintain group membership on a directly attached link.
- Written by Xuguang (Shawn) Yang
- Posted on 5月 1, 2015
- Updated on 2月 5, 2022
- 10530 Views
With this feature, Arista 7050 and 7050X series of switches can now decapsulate IP in IP tunneled packets.
- Written by Srinivasan Viswanathan
- Posted on 12月 27, 2024
- Updated on 7月 23, 2025
- 4102 Views
With this feature, Arista 7050 and 7050X series of switches can now decapsulate IP in IP tunneled packets. When IP in IP decapsulation is configured, incoming packets with an outer IP header having IpProto=4 (IP in IP) and IpDest matching the one configured will be decapsulated, meaning that the outer IP header will be removed from the packet and all subsequent forwarding decisions will be based on the inner IP header.
- Written by Pratik Mangalore
- Posted on 12月 14, 2020
- Updated on 11月 5, 2025
- 20167 Views
IP Locking is an EOS feature configured on an Ethernet Layer 2 port. When enabled, it ensures that a port will only permit IP and ARP packets with IP source addresses that have been authorized. As of EOS-4.25.0F release update, IP Locking can run in two modes - IPv4 Locking (which will be referred to as IP Locking) and IPv6 Locking, which can be configured using the commands mentioned in the below sections. IP Locking prevents another host on a different interface from claiming ownership of an IP address through either IP or ARP spoofing.
- Written by Vivek Dua
- Posted on 9月 15, 2023
- Updated on 7月 22, 2025
- 8061 Views
Current behavior for IPv4 Options packets is to let Kernel do the forwarding. Strata Platforms do this by setting the action of drop=1 and CPU=1 in the IP_OPTION_CONTROL_PROFILE_TABLE Hardware table so that all IPv4 options packets reach the CPU for forwarding in the Kernel.
- Written by Kartic Bhargav
- Posted on 4月 23, 2018
- Updated on 5月 15, 2018
- 11354 Views
Similar to L4 ports, ACL rules can be configured to filter ingress packets based on their IP length (present in the IPv4
- Written by Sarah Chen
- Posted on 9月 30, 2015
- Updated on 9月 30, 2015
- 11358 Views
IP Source Guard (IPSG) is a security feature that can help prevent IP spoofing attacks. It filters inbound IP packets
- Written by Kiranmayi Kasarapu
- Posted on 9月 30, 2015
- Updated on 1月 20, 2026
- 10245 Views
With this feature, IPv4 or IPv6 packets matching a static nexthop-group route can be encapsulated within an IP-in-IP tunnel and forwarded
- Written by Srinivasan Viswanathan
- Posted on 12月 27, 2024
- Updated on 12月 27, 2024
- 4141 Views
With this feature, IPv4 or IPv6 packets matching a static nexthop-group route can be encapsulated within an IP-in-IP tunnel and forwarded
- Written by Haris S M
- Posted on 3月 4, 2025
- Updated on 2月 2, 2026
- 3664 Views
When the next hop of an IP route (hereafter referred to as the dependent route) resolves over another IP route (hereafter referred to as the resolving route), the adjacency information of the resolving route’s FEC is typically duplicated into the dependent route’s FEC. With this feature, we prevent the duplication of the adjacency information. Instead, the dependent route’s FEC points to the resolving route’s FEC, forming a hierarchical FEC for the dependent route.
- Written by Indu Mahadevan
- Posted on 3月 12, 2026
- Updated on 3月 13, 2026
- 10 Views
This feature addresses a restriction on the combination of IKE and IPSec algorithms that can be used in a security configuration. The National Information Assurance Partnership (NIAP) Common Criteria certification requires that:
- Written by Indu Mahadevan
- Posted on 12月 24, 2024
- Updated on 12月 24, 2024
- 4028 Views
Support for IPSec connections in a full-cone Network/Port Address Translation (NAT) environment has been added to the Dynamic Path Selection (DPS) setup. DPS optimizes application performance by selecting different paths for various types of traffic. In this configuration, STUN is used to discover the translated IP address of WAN interfaces and export it to BGP.
- Written by Jyothish Kunkumath
- Posted on 1月 6, 2022
- Updated on 10月 21, 2025
- 19473 Views
IPSec tunnel mode support allows the customer to encrypt traffic transiting between two tunnel endpoints.
- Written by Navneet Sinha
- Posted on 6月 29, 2016
- Updated on 6月 29, 2016
- 13394 Views
This feature enables dataplane forwarding of IPv4 traffic on interfaces that are not IPv4 address enabled, but only
- Written by Dhanashree Nagre
- Posted on 4月 21, 2015
- Updated on 2月 7, 2022
- 11433 Views
IPv4 routes of certain prefix lengths can be optimized for enhanced route scale on 7500E, 7280E, 7500R and 7280R
- Written by Sriram Sellappa
- Posted on 1月 23, 2019
- Updated on 3月 13, 2026
- 12228 Views
IPv4 routes of certain prefix lengths can be optimized for enhanced route scale. This document describes the enhancements done to IPv4 route scale in subsequent EOS releases.
- Written by Neel Kabra
- Posted on 6月 27, 2024
- Updated on 3月 5, 2025
- 5789 Views
This feature enhances IPv4 VRF scale to 1024 VRFs on AWE-7230R and AWE-7250R, and 64 VRFs on AWE-7220R.On CloudEOS, the VRF scale is as follows
- Written by Roland Phung
- Posted on 5月 1, 2015
- Updated on 5月 1, 2015
- 10370 Views
As of EOS 4.15.0F, VRRP is supported in a VRF context. Virtual IP addresses can be reused in different VRF contexts,
- Written by Manogna Namburi
- Posted on 5月 1, 2015
- Updated on 7月 24, 2023
- 10084 Views
IPv6 access lists can be used to filter IPv6 network traffic. Starting EOS 4.15.0F release, we have added support
- Written by Kumaran Narayanan
- Posted on 4月 25, 2025
- Updated on 7月 8, 2025
- 3162 Views
This feature enables IPv6 access control list (ACLs) on cloudEOS and AWE-series platforms, providing access control on incoming traffic (ingress direction). ACLs use packet classification to mark certain packets going through the packet processor pipeline and then take configured action against them. Rules are defined based on various fields of packets.
- Written by Brett Hatch
- Posted on 4月 30, 2025
- Updated on 4月 30, 2025
- 3252 Views
This feature provides an IPv6 address provisioning mechanism which is driven by tenant authentication results and offers inter-tenant traffic isolation. The generated IPv6 connected route subnets can also be summarized into aggregate routes dynamically for advertising out to BGP peers.
- Written by Siddharth Verma
- Posted on 5月 1, 2015
- Updated on 5月 1, 2015
- 10066 Views
IPv6 egress ACLs applied to routed interfaces across the same chip on the DCS 7500E and the DCS 7280E series can be
- Written by Jason Lai
- Posted on 7月 15, 2025
- Updated on 7月 15, 2025
- 2073 Views
This document provides information on how to configure IPv6 Endpoint Independent Filtering (EIF) and debug issues on the nat-vxlan profile on Arista 7170 switches.
- Written by Greg Poloczek
- Posted on 4月 10, 2015
- Updated on 5月 1, 2015
- 10243 Views
Arista switches use the hashing algorithm to load balance traffic among LAG (Link Aggregation Group) members
- Written by Shelly Chang
- Posted on 10月 24, 2024
- Updated on 5月 13, 2025
- 5290 Views
This solution allows delivery of both IPv4 and IPv6 multicast traffic in an IP-VRF using an IPv6 multicast in the underlay network. The protocol used to build multicast trees in the underlay network is IPv6 PIM-SSM.
- Written by Christopher Brown
- Posted on 12月 22, 2017
- Updated on 12月 22, 2017
- 10403 Views
The IPv6 Neighbor Discovery protocol performs Neighbor Unreachability Detection (NUD) in order to determine if two
- Written by Anoop Dawani
- Posted on 9月 30, 2015
- Updated on 12月 19, 2024
- 10378 Views
With this feature, IPv4 and IPv6 packets matching a static nexthop-group route can be encapsulated within an IP-in-IP tunnel and forwarded
- Written by Satya Viswanathan
- Posted on 12月 9, 2015
- Updated on 2月 5, 2022
- 10233 Views
Policy-Based Routing (PBR) provides the flexibility of routing according to custom-defined policies
- Written by Jahnavi Singhal
- Posted on 6月 29, 2016
- Updated on 2月 5, 2022
- 10274 Views
With this, IPv6 routes can be configured pointing to a static Nexthop group of 2 types:. Type
- Written by Jayden Navarro
- Posted on 11月 22, 2017
- Updated on 2月 7, 2022
- 10254 Views
IPv6 Router Advertisement Consistency Logging, when enabled, allows for notification through syslogging of
- Written by Srinivasan Viswanathan
- Posted on 12月 27, 2024
- Updated on 7月 22, 2025
- 3922 Views
The document describes an extension of the decap group feature, that allows IPv6 addresses to be configured and used as part of a group. IP-in-IP packets with v6 destination matching a configured decap group IP will be decapsulated and forwarded based on the inner header. That will allow any IP-to-IP packet type to be decapsulated, i.e. IPv4 in IPv4, IPv4 in IPv6, IPv6 in IPv4 and IPv6 in IPv6.
- Written by Rachee Singh
- Posted on 4月 10, 2015
- Updated on 5月 1, 2015
- 10142 Views
This feature adds IPv6 VRF support to Open Shortest Path First(OSPF) Protocol version 3. It allows for OSPFv3
- Written by Roland Phung
- Posted on 4月 23, 2015
- Updated on 5月 1, 2015
- 10170 Views
EOS 4.15.0F is introducing support of IPv6 management capabilities inside a VRF. This means existing management
- Written by Ganesh Sundaresan
- Posted on 5月 1, 2015
- Updated on 5月 1, 2015
- 10010 Views
This feature adds the support for IPv6 unicast in a VRF context in EOS. This entails static routing and dynamic
- Written by Navneet Sinha
- Posted on 6月 29, 2016
- Updated on 6月 29, 2016
- 10241 Views
IS IS adjacency uptime describes the uptime or downtime of neighbors since the last state change.
- Written by Anoop Dawani
- Posted on 9月 30, 2015
- Updated on 2月 6, 2022
- 10079 Views
Bidirectional Forwarding Detection(BFD) is a low overhead protocol designed to provide rapid detection of
- Written by Deepak
- Posted on 1月 6, 2026
- Updated on 1月 6, 2026
- 649 Views
The IS-IS BFD Damping feature allows IS-IS to delay adjacency establishment on a link that experiences frequent BFD flaps.
- Written by Deepak
- Posted on 2月 16, 2026
- Updated on 2月 16, 2026
- 159 Views
The IS-IS BFD TLV feature implements RFC 6213. When this feature is enabled, IS-IS will prevent adjacency establishment on a link if the BFD peering is down.
- Written by Zetang Lei
- Posted on 7月 2, 2024
- Updated on 3月 21, 2025
- 5755 Views
This feature introduces a way for IS-IS to advertise its IP reachability and SID for loopback interfaces only when routes matching an RCF function are present. One example use-case is to use IS-IS Segment Routing to attract traffic to a router only when routes towards the ultimate destination are present. The RCF function is matched against winning routes in the Unicast RIB (seen with 'show rib route …').
- Written by Rabi Narayan
- Posted on 1月 19, 2026
- Updated on 1月 20, 2026
- 464 Views
Link State IGPs such as IS-IS depend upon having a consistent LSDB across all the Intermediate Systems (ISs or nodes) in the network in order to provide correct forwarding of data packets. When topology change occurs due to various network events, new/updated LSPs are propagated network-wide. The speed of propagation is key for a faster network convergence.
- Written by Sarah Chen
- Posted on 1月 12, 2022
- Updated on 8月 22, 2025
- 16952 Views
IS-IS flexible algorithm (FlexAlgo) provides a lightweight, simplified mechanism for performing basic traffic engineering functions within a single IS-IS area. FlexAlgo requires the cooperation of all nodes within the IS-IS area but does not require an external controller. Paths are computed by each node within the area, resulting in an MPLS switched forwarding path to nodes that are advertising a node Segment Identifier (SID) for the algorithm. The results of the path computation are placed in the colored tunnel RIB or system tunnel RIB, which simplifies route resolution.
- Written by Kamala R
- Posted on 9月 30, 2015
- Updated on 7月 20, 2023
- 10812 Views
The difference between the two forms of authentication is in the level of security provided. In case of clear text authentication, the password is specified as text in the authentication TLV, making it possible for an attacker to break the authentication by sniffing and capturing IS-IS PDUs on the network.
- Written by Nikhil Goyal
- Posted on 11月 22, 2017
- Updated on 12月 23, 2021
- 11026 Views
IS IS Graceful Restart adds support for Restart Signaling for IS IS, IETF RFC 5306. When IS IS is used
