- Written by Chitra Ramachandran
- Posted on April 18, 2024
- Updated on April 18, 2024
- 594 Views
A typical multicast receiver expresses interest in a multicast stream by sending IGMP messages, the last hop router would then convert this IGMP to a PIM message and propagate upstream. As part of this feature when an IGMP message or PIM message is received in a VRF and there is a corresponding VRF leak configuration, the IGMP / PIM state is then leaked into the source VRF and processed only in the source VRF.
- Written by Tarun Jaswanth LNU
- Posted on August 24, 2020
- Updated on May 7, 2024
- 20838 Views
802.1X is an IEEE standard protocol that prevents unauthorized devices from gaining access to the network.
- Written by Kenneth Blanc
- Posted on June 6, 2017
- Updated on May 15, 2024
- 6574 Views
BFD Stateful Switchover (SSO) allows for a switchover from an active supervisor to a standby supervisor where BFD
- Written by Jason Shamberger
- Posted on March 11, 2020
- Updated on April 18, 2024
- 12782 Views
EOS 4.21.3F introduces support for BGP Flowspec, as defined in RFC5575 and RFC7674. The typical use case is to filter or redirect DDoS traffic on edge routers.
- Written by Rajesh Velandy
- Posted on April 22, 2024
- Updated on April 24, 2024
- 499 Views
Bidirectional Protocol Independent Multicast (PIM) allows routers to build trees to deliver multicast traffic from sources to receivers. It is a variant of sparse-mode PIM that efficiently addresses the use case where receivers for a multicast group are also sources for that group.
- Written by Vikas Hegde
- Posted on November 22, 2017
- Updated on May 15, 2024
- 12486 Views
Connectivity Monitor is an EOS feature that allows users to monitor their network resources from their Arista switches. The resources being monitored may or may not be Arista devices. Connectivity monitoring is unidirectional in nature.
- Written by Thomas Cannon
- Posted on April 18, 2024
- Updated on April 18, 2024
- 416 Views
This TOI describes a feature allowing packets that do not match any VLAN translations to be dropped from a port. This can be useful to drop selective Q-in-Q packets that do not receive a VLAN. The Configuration section details CLI commands used to configure the feature.
- Written by Nathanael Dattappa
- Posted on April 18, 2024
- Updated on April 18, 2024
- 596 Views
Link Flap Damping is a feature designed to detect situations when an interface is continuously flapping. If enough flaps are done, the damping mechanism is triggered temporarily holding the interface link-down. This smoothes out link flap occurrences and reduces churn in the network caused by link flaps.
- Written by Johnny Chen
- Posted on June 24, 2021
- Updated on May 9, 2024
- 9088 Views
ECMP Hash visibility CLI determines the output interface for an ECMP set based on the flow parameters supplied by the user. Ingress interface, source IP address, destination IP address and IP protocol are the required parameters.
- Written by Dylan Walsh
- Posted on October 20, 2022
- Updated on April 22, 2024
- 5274 Views
EosSdkRpc is an agent built on top of the Arista EOS SDK. It uses gRPC as a mechanism to provide remote access to the EOS SDK. The gRPC interface that EosSdkRpc supports closely matches the interface provided by EOS SDK, and the intent is that the .proto interface can be publicly supported. EosSdkRpc allows for remote access and using protobuf to specify the interface isolates user code from the Linux ABI issues that come with building C++ applications on different compiler, libc, and kernel versions.
- Written by Vamsi Anne
- Posted on December 29, 2021
- Updated on May 7, 2024
- 7846 Views
As Ethernet technologies made their way into the Metropolitan Area Networks (MAN) and the Wide Area Networks (WAN), from the conventional enterprise level usage, they are now widely being used by service providers to provide end-to-end connectivity to customers. Such service provider networks are typically spread across large geographical areas. Additionally, the service providers themselves may be relying on certain internet backbone providers, referred to as “operators”, to provide connectivity in case the geographical area to be covered is too huge. This mode of operation makes the task of Operations, Administration and Maintenance (OAM) of such networks to be far more challenging, and the ability of service providers to respond to such network faults swiftly directly impacts their competitiveness.
- Written by Alton Lo
- Posted on May 14, 2024
- Updated on May 15, 2024
- 87 Views
This new feature explains the use of the BGP Domain PATH (D-PATH) attribute that can be used to identify the EVPN domain(s) through which the EVPN MAC-IP routes have passed. EOS DCI Gateway provides new mechanisms for users to specify the EVPN Domain Identifier for its local and remote domains. DCI Gateways sharing the same redundancy group should share the same local domain identifier and same remote domain identifier.
- Written by Xuan Qi
- Posted on October 20, 2022
- Updated on May 17, 2024
- 2918 Views
EVPN gateway support for all-active (A-A) multihoming adds a new redundancy model to our multi-domain EVPN solution introduced in [1]. This deployment model introduces the concept of a WAN Interconnect Ethernet Segment identifier (WAN I-ESI). The WAN I-ESI allows the gateway’s EVPN neighbors to form L2 and L3 overlay ECMP on routes re-exported by the gateways. The identifier is shared by gateway nodes within the same domain (site) and set in MAC-IP routes that cross domain boundaries.
- Written by Stefan Kheraj
- Posted on April 18, 2024
- Updated on April 18, 2024
- 463 Views
Filtered mirroring allows certain packets to be selected for mirroring, rather than all packets ingressing or egressing a mirror source port.
- Written by Feng Zhu
- Posted on May 7, 2024
- Updated on May 7, 2024
- 229 Views
A forwarding equivalence class (FEC) entry is the data structure that holds all reachable vias where the packets should be sent to, for certain routes. Before this feature, a FEC could not contain both IPv4 next hop vias and IPv6 next hop vias. This feature starts supporting FECs that have both IPv4 next hop vias and IPv6 next hop vias. In an Equal Cost Multi-Path (ECMP) FEC, some of the vias may have IPv4 next hop and others may have IPv6 next hop.
- Written by Kaushik Kumar Ram
- Posted on August 21, 2020
- Updated on May 7, 2024
- 7096 Views
Generic UDP Encapsulation (GUE) is a general method for encapsulating packets of arbitrary IP protocols within a UDP tunnel. GUE provides an extensible header format with optional data. In this release, decap capability of GUE packets of variant 1 header format has been added. This variant allows direct encapsulation using the UDP header without the GUE header. The inner payload could be one of IPv4, IPv6, or MPLS.
- Written by Mithilesh Tiwari
- Posted on April 18, 2024
- Updated on April 18, 2024
- 443 Views
This document describes the introduction and use of the global knob which facilitates the txQueue percentage-based allocations based on the available bandwidth of the parent interface.
- Written by Deepak Sebastian
- Posted on November 12, 2019
- Updated on May 7, 2024
- 7208 Views
This feature adds support for offloading BFD Transmit path to hardware (ASIC) for specific types of BFD sessions. This will improve accuracy of transmit timer implementations for BFD (especially with fast timers like 50 ms) and relieve pressure on the main CPU in scenarios of scale.
- Written by Vinay Garg
- Posted on April 18, 2024
- Updated on April 18, 2024
- 443 Views
Support for ingress Port ACLs on GUE Packets. The matching of ACLs can be done on outer IP header as well as UDP header fields for gue routed/bridged, decap/transit packets, and the ACL can be applied to Front Panel Ports.
- Written by Navneet Sinha
- Posted on June 29, 2016
- Updated on May 7, 2024
- 11049 Views
Segment Routing provides mechanism to define end-to-end paths within a topology by encoding paths as sequences of sub-paths or instructions. These sub-paths or instructions are referred to as “segments”. IS-IS Segment Routing (henceforth referred to as IS-IS SR) provides means to advertise such segments through IS-IS protocol.
- Written by Zeyad Tamimi
- Posted on March 3, 2023
- Updated on May 15, 2024
- 5788 Views
At a high level, L1 profiles are a set of configurations which allow EOS users to change the numbering scheme and default L1 configurations of all front panel interfaces across their network switch.
- Written by Yiming Pan
- Posted on April 18, 2024
- Updated on April 18, 2024
- 437 Views
Arista’s 7135 Connect Series of Layer 1+ switches are powerful network devices that allow for dynamic connections between various layer 1 components on the system, such as the front panel and FPGA. These connections are driven by an underlying CLOS network of crossbar switches. The following commands provide the ability to configure middle stage crossbar switches within the system to create dynamic layer 1 connections.
- Written by Abdul Haseeb Jehangir
- Posted on March 12, 2020
- Updated on May 15, 2024
- 8322 Views
Mirror on drop is a network visibility feature which allows monitoring of MPLS or IP flow drops occurring in the ingress pipeline. When such a drop is detected, it is sent to the control plane where it is processed and then sent to configured collectors. Additionally, CLI show commands provide general and detailed statistics and status.
- Written by Charlotte Fedderly
- Posted on April 22, 2024
- Updated on April 22, 2024
- 530 Views
On supported devices, a port-channel can be configured as a mirroring destination for both ingress and egress source directions. Traffic mirrored to a port-channel is load-balanced based on the global port-channel load-balance configuration, which is the same for other port-channels.
- Written by Adrian Fettes
- Posted on April 22, 2024
- Updated on April 22, 2024
- 469 Views
An interface may be a source for both a mirroring session and sFlow at the same time. For more information about mirroring and ingress and egress sFlow look in the Resources section below.
- Written by Dickson Chum
- Posted on January 3, 2023
- Updated on May 15, 2024
- 5125 Views
Mirroring to a GRE tunnel allows mirrored packets to transit to a L3 network using GRE encapsulation.
- Written by Sam Ho
- Posted on August 25, 2019
- Updated on May 2, 2024
- 6794 Views
This feature adds support for allowing multiple destinations in a single monitor session.
- Written by Dickson Chum
- Posted on April 18, 2024
- Updated on April 18, 2024
- 477 Views
Mirrored packets may be configured to be truncated per mirroring session.
- Written by Sharad Birmiwal
- Posted on April 18, 2024
- Updated on April 18, 2024
- 703 Views
EOS supported two routing protocol implementations: multi-agent and ribd. The ribd routing protocol model is removed starting from the EOS-4.32.0F release. Multi-agent will be the only routing protocol model. Both models largely work the same way though there are subtle differences.
- Written by Xuan Qi
- Posted on April 18, 2024
- Updated on April 18, 2024
- 592 Views
This feature adds all-active (A-A) multihoming support on the multi-domain EVPN VXLAN-MPLS gateway. It allows L2 and L3 ECMP to form between the multihoming gateways on the TOR devices inside the site and on the gateways in the remote sites. Therefore, traffic can be load-balanced to the multi-homing gateway and redundancy and fast convergence can be achieved.
- Written by Aparna Karanjkar
- Posted on June 17, 2019
- Updated on May 3, 2024
- 7750 Views
EOS supports reading and streaming various OpenConfig configuration and state models over gNMI (gRPC Network Management Interface), RESTCONF, and NETCONF transports. A subset of the configuration models may also be modified over these transports
- Written by Robert
- Posted on April 22, 2024
- Updated on April 24, 2024
- 443 Views
By default, the scheduling between parent interfaces and the attached shaped subinterfaces is done in strict priority mode where the parent interface has the highest priority. Subinterfaces that are not shaped use the same queues as the parent so the traffic on these subinterfaces will also have strict priority over shaped subinterfaces.
- Written by Santosh Kumar
- Posted on December 22, 2017
- Updated on May 2, 2024
- 5176 Views
PIM Static Source Discovery (SSD) is a feature implemented as part of PIM-SM. Familiarity with setting up and configuring PIM-SM (Sparse Mode) and PIM-SSM (Source-Specific Multicast) is assumed.
- Written by Paulo Panhoto
- Posted on April 18, 2024
- Updated on April 18, 2024
- 519 Views
This feature provides a continuous, live, stream of ingress counters for Policy-Based Routing (PBR) rules in terms of bytes and packets. It is implemented as a special call in EosSdkRpc and follows this definition:
- Written by Gabor
- Posted on April 18, 2024
- Updated on April 18, 2024
- 742 Views
Port mirroring is used to send a copy of packets seen on one port to a network monitoring connection on another switch port. Port mirroring is commonly used with network probes or other monitoring devices; examples include intrusion detection devices, latency analyzers, or packet capture and protocol analysis tools.
- Written by Asang Dani
- Posted on April 17, 2024
- Updated on April 17, 2024
- 516 Views
The goal of route prioritization is to improve overall network behavior by ensuring that routes classified as having a higher priority are processed and installed in a timely fashion. Activity for lower priority routes must not significantly delay high priority route processing. For example, when a network event affects a large number of BGP routes causing them to be reprogrammed, the programming of an important IGP route that provides underlay connectivity and is affected by a subsequent event should not have to be queued behind the BGP routes. Prioritizing the IGP route programming will improve network convergence. It may also eliminate duplicate work for other routes depending on it.
- Written by Gokul Unnikrishnan
- Posted on May 7, 2024
- Updated on May 7, 2024
- 153 Views
The sFlow VPLS extension adds support for providing VPLS-related information to sFlow packet samples, for VPLS forwarded traffic. Specifically, for customer traffic ingressing on a CE-facing PE interface in a VPLS deployment that uses statically configured LDP pseudowires, information such as the name of the VPLS instance and the ID of the pseudowire that the packet will egress over will be included in the sFlow datagram.
- Written by Thejesh Panchappa
- Posted on May 1, 2015
- Updated on May 13, 2024
- 5718 Views
This is an infrastructure that provides management of SSL certificates, keys and profiles. SSL/TLS is an application-layer protocol that provides secure transport between client and server through a combination of authentication, encryption and data integrity. SSL/TLS uses certificates and private-public key pairs to provide this security.
- Written by Josh Pfosi
- Posted on June 11, 2019
- Updated on April 22, 2024
- 9439 Views
This feature adds support for CPU traffic policy capable of matching and acting on IP traffic which would otherwise
- Written by Brian Neville
- Posted on November 8, 2023
- Updated on May 17, 2024
- 2122 Views
gNSI (gRPC Network Security Interface) defines a set of gRPC-based microservices for executing security-related operations on network devices.
- Written by Brian Hsieh
- Posted on May 7, 2024
- Updated on May 7, 2024
- 150 Views
IPv6 Duplicate Address Detection Proxy is a proxy-based mechanism allowing the use of Duplicate Address Detection (DAD) by IPv6 nodes in a point-to-multipoint architecture with a "split-horizon" forwarding scheme. In Split-horizon scenario where the hosts can not directly communicate with each other, but only through a BNG (Broadband Network Gateway).
- Written by David Jowett
- Posted on April 18, 2024
- Updated on April 18, 2024
- 419 Views
This feature extends sampled flow tracker to support the selective sampling of certain traffic types (specified globally), such as routed IPv4, routed IPv6, and MPLS pop and route IPv4, per interface. The feature is applicable on interfaces, subinterfaces, port channels, and port channel subinterfaces.
- Written by Patrick MacArthur
- Posted on February 23, 2021
- Updated on April 18, 2024
- 5547 Views
Sub-interfaces can be grouped into logical units called scheduling groups, which are shaped as a single unit. Each scheduling group may be assigned a scheduling policy which defines a shape rate in kbps and optionally a guaranteed bandwidth, also in kbps.
- Written by Krystian
- Posted on May 15, 2024
- Updated on May 15, 2024
- 58 Views
Support is added to use VRRP (Virtual Router Redundancy Protocol) virtual IP (Internet Protocol) address as an IPsec ( Internet Protocol Security) tunnel source or destination address. This allows for configurations that offer both security (provided by IPsec tunnels) and redundancy (provided by VRRP).
- Written by Sandeep Kopuri
- Posted on October 7, 2019
- Updated on May 17, 2024
- 8492 Views
Topology Independent Fast Reroute, or TI-LFA, uses IS-IS SR to build loop-free alternate paths along the post-convergence path. These loop-free alternates provide fast convergence.
- Written by Isidor Kouvelas
- Posted on February 28, 2022
- Updated on May 17, 2024
- 11725 Views
Virtual Private LAN Service (VPLS) appears in (almost) all respects as an Ethernet type service to customers of a Service Provider (SP). A VPLS glues together several individual LANs across a packet switched network to appear and function as a single bridged LAN.
- Written by Ronish Kalia
- Posted on June 12, 2019
- Updated on April 18, 2024
- 6058 Views
This feature enables policer (using policy-map) on a VTEP to rate limit traffic per VLAN/VNI. The policer can be applied in both input and output directions to rate limit decapsulated and encapsulated VXLAN traffic, respectively. Prior to EOS-4.32.0F, the policers are not applicable on multicast traffic through the VTEP. For platforms supporting rate limiting of both bridged and routed encapsulated traffic, the rate limiting would be done on common policer limits.
- Written by Simon Liang
- Posted on September 5, 2021
- Updated on April 23, 2024
- 6730 Views
This document describes the VRF selection policy and VRF fallback feature. A VRF selection policy contains match rules that specify certain criteria (e.g. DSCP, IP protocol) as well as a resulting action to select a VRF in which to do the FIB lookup.
- Written by Navlok Mishra
- Posted on February 8, 2017
- Updated on May 17, 2024
- 5707 Views
WRED ( Weighted Random Early Detection ) is one of the congestion management techniques.