- Written by Ashit Tandon
- Posted on 11月 6, 2025
- Updated on 11月 6, 2025
- 31 Views
This feature allows a switch to statically modify the source or destination IP (and optionally the L4 port) for a transit packet. Static NAT support on 7050X3, 720XP and 720D platforms was first introduced in 4.21.6F. Starting at EOS 4.35.0F, NAT functionality is supported on certain 7050X4 and 7358X4 platforms.
- Written by Tomasz Pazurkiewicz
- Posted on 8月 29, 2025
- Updated on 8月 29, 2025
- 554 Views
The feature exposes metrics and health status of storage devices on controllers and all managed nodes, but not switches. Metrics and health status are updated every minute and exposed through the Telemetry collector
- Written by Tomasz Pazurkiewicz
- Posted on 9月 18, 2025
- Updated on 9月 18, 2025
- 402 Views
The feature exposes metrics and health status of storage devices on controllers and all managed nodes, but not switches. Metrics and health status are updated every minute and exposed through the Telemetry collector
- Written by Pankaj Srivastava
- Posted on 10月 24, 2024
- Updated on 10月 24, 2024
- 3914 Views
Storm control enables traffic policing on floods of packets on L2 switching networks. Support for counting dropped packets and bytes on interfaces where storm control metering is provisioned. Both packet and bytes count are supported and will be displayed. Drop logging on storm-control discards is also supported.
- Written by Peter Fordham
- Posted on 5月 1, 2015
- Updated on 5月 1, 2015
- 5543 Views
The existing storm control interface configuration mode CLI commands have been extended to support the new
- Written by Praveen Kumar Yadav
- Posted on 11月 16, 2023
- Updated on 9月 9, 2025
- 7335 Views
Storm control enables traffic policing on floods of packets on L2 switching networks. Support was enabled for Front panel ports and Lag in eos-4-25-2f with storm-control-speed-rate-support. Now, storm control will be supported per subinterfaces( both ethernet and port-channel). Scale of subinterfaces is 4095.
- Written by Vincent (Chia Hsuan)
- Posted on 9月 24, 2024
- Updated on 9月 3, 2025
- 5147 Views
A traffic storm is a flood of packets entering a network, resulting in excessive traffic and degraded performance. Storm control prevents network disruptions by limiting traffic beyond specified thresholds on individual physical LAN interfaces. Storm control monitors inbound traffic levels over one-second intervals and compares the traffic level with a specified benchmark. The storm-control command configures and enables storm control on the configuration mode physical interface.
- Written by Jaffar Hameedabdul
- Posted on 2月 8, 2017
- Updated on 2月 4, 2022
- 10178 Views
A traffic storm is a flood of packets entering a network, resulting in excessive traffic and degraded performance.
- Written by Sabah Khan
- Posted on 4月 3, 2024
- Updated on 4月 3, 2024
- 5147 Views
This feature introduces a new type of action that can be created and configured under Provisioning > Actions. These actions automate the process of assigning values to inputs in a studio and allow users to input data that originates from outside a studio.
- Written by Sabah Khan
- Posted on 4月 3, 2024
- Updated on 4月 3, 2024
- 5331 Views
These updates improve the layout of the Studios landing page by emphasizing essential studios and structuring all other studios in a more comprehensive, user-friendly way.
- Written by Shrey Malik
- Posted on 6月 29, 2016
- Updated on 2月 8, 2017
- 9620 Views
This feature enables ACL functionality on subinterfaces. ACLs on subinterfaces are configured using the
- Written by Satish Mahadevan
- Posted on 4月 21, 2015
- Updated on 10月 13, 2025
- 7879 Views
Subinterfaces are logical L3 interfaces that enable the division of a single Ethernet or Port-channel interface into multiple logical L3 interfaces based on the incoming 802.1q tag. They are commonly used in the L2/L3 boundary. They can also be used in the context of VRF-lite, by configuring each subinterface in a different VRF.
- Written by Scott Bailey
- Posted on 5月 23, 2022
- Updated on 7月 31, 2025
- 10119 Views
The CCS-750X-48ZXP is a 48 port 10GBASE-T linecard, capable of several full-duplex link speeds to support connecting to a variety of compatible devices of varying capabilities. All supported linkup speeds on this card can be automatically selected during the linkup process using IEEE 802.3 Clause 28 auto-negotiation. Note that IEEE 802.3 also allows for speeds lower than 1Gbps to link up without clause 28 auto-negotiation.
- Written by Dan Cunningham
- Posted on 4月 18, 2022
- Updated on 6月 6, 2025
- 16429 Views
This feature introduces support for the SFP-10G-MRA-T SFP transceiver. This is a rate adapting transceiver, meaning it can convert the system side interface to a lower rate on the line side.
- Written by Siddharth Karandikar
- Posted on 9月 18, 2025
- Updated on 9月 18, 2025
- 405 Views
This feature adds support for the following IPFIX keys TCP Source Port, TCP Destination Port, UDP Source Port, UDP Destination Port
- Written by Lavanya Conjeevaram
- Posted on 6月 29, 2016
- Updated on 2月 7, 2022
- 9557 Views
The guaranteed bandwidth feature ensures minimum bandwidth for outgoing lower priority traffic from a
- Written by Eamon Doyle
- Posted on 3月 4, 2025
- Updated on 3月 4, 2025
- 2305 Views
A fundamental business requirement for any network operator is to reduce costs where possible. For network operators, deploying devices to many locations can be a significant cost as sending trained specialists to each site for installations is both time-consuming and expensive.
- Written by David Jowett
- Posted on 12月 27, 2024
- Updated on 12月 27, 2024
- 2804 Views
This feature extends the existing UDP payload hashing support to allow an alternative set of bytes to be used in the calculation of the LAG and ECMP hash if an 16 bit field of the payload matches a provided pattern.
- Written by Mayank Singh
- Posted on 7月 2, 2025
- Updated on 7月 2, 2025
- 1115 Views
The support for configurable dynamic authorization port for different clients has been added to proxy the radius dynamic authorization (CoA) requests. By default, all radius dynamic authorization requests are only proxied to clients at port 3799, which is configurable now.
- Written by Joanna Shao
- Posted on 9月 24, 2024
- Updated on 4月 15, 2025
- 3356 Views
This feature adds support for configurable max sFlow datagram size. The current default max datagram size is 1400 bytes, which can cause some sFlow datagrams to be dropped when there is an MTU set. This feature enables the configuration of the max datagram payload size within the range of 200 to 1500 bytes to help avoid fragmentation. Note that this feature only configures software sFlow and is not supported on hardware-accelerated sFlow.
- Written by Josh Pfosi
- Posted on 6月 11, 2019
- Updated on 7月 31, 2025
- 17113 Views
This feature adds support for CPU traffic policy capable of matching and acting on IP traffic which would otherwise
- Written by Robert Hrusecky
- Posted on 9月 12, 2024
- Updated on 9月 12, 2024
- 3937 Views
Prior to 4.32.2F, the “reset system storage secure” CLI command can be used to perform a best-effort storage device wipe of all sensitive data. However, this command has the limitation that it wipes EOS from the storage device, leaving the system “stuck” in Aboot. The “reset system storage secure rollback” command provides the same secure erase functionality, but additionally allows the user to preserve a subset of files on the main flash device by copying them into RAM during the secure erase procedure. The set of files that are preserved is configurable. After a successful wipe, the system will return to EOS after the erase is complete if the EOS SWI image and adequate configuration files are preserved (such as boot-config and startup-config).
- Written by Alok Kumar
- Posted on 2月 7, 2024
- Updated on 5月 7, 2025
- 9032 Views
Dot1q (802.1Q) is a tunneling protocol that encapsulates traffic from multiple customer (c-tag) VLANs in an additional single outer service provider (s-tag) VLAN for transit across a larger network structure that includes traffic from all customers. Tunneling eliminates the service provider requirement that every VLAN be configured from multiple customers, avoiding overlapping address space issues.
- Written by Deepanshu Shukla
- Posted on 8月 21, 2020
- Updated on 9月 3, 2025
- 19760 Views
This feature adds support for “Dynamic Load Balancing (DLB)” on Equal Cost Multi Path (ECMP) groups.
It is intended to help overcome the potential shortcomings of traditional hash-based load balancing by considering the traffic load of members of ECMP groups. DLB considers the state of the port while assigning egress ports to packets, resulting in a more even flow. The state of each port member is determined by measuring the amount of data transmitted from a given port and total number of packets enqueued to a given port.
- Written by Haomin
- Posted on 10月 10, 2025
- Updated on 10月 10, 2025
- 258 Views
Dynamic NAT Priority feature, which extends the Dynamic NAT feature, allows you to configure the order in which dynamic NAT rules are evaluated by the switch.
- Written by Ashit Tandon
- Posted on 5月 5, 2025
- Updated on 5月 5, 2025
- 1785 Views
The packet path, prerequisites, and restrictions listed in this document apply to this feature as well Dynamic Twice NAT is a variant of the dynamic NAT feature where both the source and destination IP can be modified while forwarding a packet. One of the IP addresses will be dynamically assigned, while the other will be statically assigned.
- Written by Brian Neville
- Posted on 8月 8, 2025
- Updated on 10月 23, 2025
- 807 Views
gNOI (gRPC Network Operations Interface) defines a set of gRPC-based microservices for executing operational commands on network devices.
- Written by Brian Neville
- Posted on 11月 8, 2023
- Updated on 11月 6, 2025
- 8414 Views
gNSI (gRPC Network Security Interface) defines a set of gRPC-based microservices for executing security-related operations on network devices. Some of the RPCs that gNSI exposes are used to rotate security configurations on the switch.
- Written by Prashant Kumar
- Posted on 4月 30, 2025
- Updated on 8月 28, 2025
- 1716 Views
In the realm of network service level agreements (SLAs), a customer often commits to a certain level of service for their clients. This may necessitate limiting bandwidth at the Layer 3 sub-interface level. Currently, egress service policies can achieve bandwidth control, but ingress control lacks a similar mechanism.
- Written by Denver Blake
- Posted on 10月 18, 2024
- Updated on 10月 18, 2024
- 3508 Views
This document describes the support for user-defined fields (UDF) acl rules in QoS policy feature. This feature is an extension of QoS policy to allow increased flexibility of the match criteria by using user-defined fields which will help customers control traffic based on other parts of the packet header and payload that is not supported by the other key-fields.
- Written by Girish Dasari
- Posted on 9月 11, 2024
- Updated on 9月 11, 2024
- 3700 Views
IS-IS SR Stateful Switchover (SSO) support allows for a switchover from an active supervisor to a standby supervisor where MPLS traffic remains undisrupted during switchover. This involves reconciliation of all Segment Routing related information in the network using IS-IS Graceful Restart procedures. And also installing the same in forwarding hardware in a manner that does not disrupt the ongoing traffic.
- Written by Nilesh Unhale
- Posted on 8月 12, 2025
- Updated on 8月 12, 2025
- 719 Views
MIBs are used in SNMP (Simple Network Management Protocol) to monitor and manage network devices. IS-IS MIB provides structured information to track IS-IS protocol performance, routing table status, and link-state information.
- Written by Alok Kumar
- Posted on 11月 29, 2023
- Updated on 7月 7, 2025
- 6990 Views
This feature provides a CLI command showing the list of mac addresses that could not be learned due to hash collision in the hardware table. A hash collision occurs when two or more distinct pieces of data map to the same entry ( or slot ) in the hardware table. It can happen when the hash function used to calculate the index for a given mac address results in the already occupied index, resulting in the failure of inserting the later mac address to the hardware table.
- Written by Venkata Kishore Madhbhaktula
- Posted on 12月 17, 2019
- Updated on 5月 23, 2025
- 11612 Views
Enforces the MTU for Layer 3 packets on 7280R3/7500R3/7800R3 switches. The MTU can be set on any SVI and the MTU of that specific SVI is enforced when the packets egress out of a trunk port. This behavior is not supported on 7280E/R/R2 and 7500E/R/R2 line cards.
- Written by Brian Schuette
- Posted on 4月 30, 2025
- Updated on 4月 30, 2025
- 2174 Views
Linear pluggable optics (LPO) represent a significant advancement in transceiver technology. These modules are designed to reduce costs, power consumption, and latency compared to traditional Digital Signal Processing (DSP) based transceivers.
- Written by Eudean Sun
- Posted on 4月 30, 2025
- Updated on 4月 30, 2025
- 1766 Views
The Linux audit system provides the ability to record security events on the switch. Audit rules must be configured and enabled at the CLI. Audit rules can be configured in different groups to assist with organization and maintenance.
- Written by Hongda Huang
- Posted on 4月 25, 2025
- Updated on 4月 25, 2025
- 1793 Views
The Lowest Load feature uses load as a key metric for selecting the best path. When this metric is prioritized, routers will choose the path with the lowest load as the best option.
- Written by Vishrant Vasavada
- Posted on 4月 24, 2025
- Updated on 4月 24, 2025
- 1782 Views
DMF 8.7.0 provides support for Management Redundancy on an Extensible Operating System (EOS) Fixed System Chassis. It provides a method to enable redundant active/active connectivity on the management IP address for a Danz Monitoring Fabric (DMF) switch in a fixed system chassis using an out-of-band management port and a front-panel port on the switch.
- Written by Christopher Brown
- Posted on 12月 16, 2020
- Updated on 3月 7, 2025
- 9557 Views
ARP and IPv6 Neighbor Discovery use a neighbor cache to store neighbor address resolutions. The capacity of the neighbor cache is determined by the resources and capabilities of the device platform. The neighbor cache capacity feature adds a means to specify a per-interface capacity for the neighbor cache. A neighboring device, through misconfiguration or maliciousness, can unfairly use a large number of address resolutions. This feature can help to mitigate this over-utilization.
- Written by Matthew Carrington-Fair
- Posted on 8月 12, 2025
- Updated on 8月 12, 2025
- 712 Views
This feature allows configuring backup nexthop group entries to be used if their corresponding primary entries are unable to forward traffic due to being unresolved or with outgoing interfaces that are marked as down. By default, any configured backup entries will not be activated to forward traffic until all primary nexthop group entries are unavailable. Backup nexthop group entries are a tool used to achieve fast failover when forwarding traffic via nexthop groups.
- Written by Sulyab Thottungal Valapu
- Posted on 10月 29, 2020
- Updated on 10月 17, 2024
- 10101 Views
This document describes the OSPFv2 and OSPFv3 feature that allows enabling or disabling the inclusion of LSAs having “Down” (DN) bit set in SPF calculations. The DN Bit is a loop prevention mechanism implemented when OSPF is used as CE - PE IGP protocol.
- Written by Manjula Gopalakrishnan
- Posted on 7月 13, 2018
- Updated on 7月 13, 2018
- 9505 Views
This feature enables the user to configure PBR policy on an interface in any VRF, to match and forward incoming packets
- Written by Mingchao Lian
- Posted on 9月 11, 2024
- Updated on 9月 11, 2024
- 3596 Views
In order to support PIM/IPv4 multicast routing on EOS switches with Broadcom Tomahawk4 ASICs, multicast support using ALPM is required. This works in both 3-level Algorithmic Longest Prefix Match (ALPM) capabilities and 2-level ALPM.
- Written by Mehul Mistry
- Posted on 8月 12, 2025
- Updated on 8月 12, 2025
- 982 Views
Port isolation is a feature that segregates the ports in a VLAN broadcast domain into isolated and non-isolated ports and facilitates blocking traffic between ports marked as isolated.
- Written by Basil Saji
- Posted on 11月 9, 2020
- Updated on 11月 4, 2025
- 15582 Views
Private VLAN is a feature that segregates a regular VLAN broadcast domain while maintaining all ports in the same IP subnet. There are three types of VLAN within a private VLAN
- Written by Venkata Vyshnav Lagisetty
- Posted on 3月 1, 2024
- Updated on 11月 3, 2025
- 65 Views
The feature adds support for redirecting traffic matching on traffic policy rules applied to an egress interface to a specified next-hop or next-hop group. This feature requires the packet to be recirculated a second time through the packet forwarding pipeline to get its configured single or multiple next-hops to be resolved. This is achieved by configuring traffic-policy with redirect interface action applied on egress interface in conjunction with ingress redirect next-hop action applied on the recirculation interface.
- Written by Praneel Jhunjhunwala
- Posted on 1月 3, 2025
- Updated on 1月 3, 2025
- 2792 Views
A remark is a user specified comment that is written within an IP prefix-list. Remarks allow documentation to be added directly into the configuration of an IP prefix-list. Both IPv4 and IPv6 prefix-lists are supported.
- Written by Fei Rao
- Posted on 12月 20, 2024
- Updated on 12月 20, 2024
- 2988 Views
There are two types of reload on a switch running EOS, normal reload and Smart System Upgrade (SSU). Scheduled normal reload is supported via ‘reload in’ command, to perform a normal reload after a specified delay. It asks for saving unsaved configuration changes and confirmation in order to schedule the reload. Scheduled SSU is supported via ‘reload fast-boot in’ command. However, after scheduling an SSU reload, if there are unsaved configuration changes, or saved configuration changes which block an SSU reload, the scheduled reload will be aborted at scheduled time.
- Written by Ayush
- Posted on 9月 5, 2025
- Updated on 9月 5, 2025
- 486 Views
User Defined Fields (UDFs) are access-list (ACL) filters that consist of an offset into a packet and a pattern to match at the given offset. It can be used to match non-standard fields in a packet that don’t have existing well-defined filter criteria. An example of a non-standard field is bytes at an arbitrary offset within a UDP payload.
- Written by Matthieu Simon
- Posted on 9月 19, 2025
- Updated on 9月 19, 2025
- 381 Views
This document describes a new feature of Arista Analytics that can process sFlow® records containing IP packets encapsulated in additional protocol headers.
