- Written by Julie Powell
- Posted on November 4, 2024
- Updated on November 4, 2024
- 1570 Views
CloudVision allows you to generate event notifications so that you can stay up to date on your network's status and performance. Notification configuration involves formatting notifications, configuring notification platforms, assigning notification receivers, and configuring notification rules.
- Written by Manuel Lai
- Posted on June 9, 2017
- Updated on August 2, 2022
- 2727 Views
The ability to monitor and react to Syslog messages provides a powerful and flexible tool that can be used to apply self
- Written by Julie Powell
- Posted on April 3, 2024
- Updated on April 3, 2024
- 3980 Views
Event Rollup allows you to manage the volume of identical events and can be used to flag when an event is recurring. Event Rollup groups together events that are identical except for their timestamps. It does so in two ways: dynamically via the Event List and according to a 24-hour window via the detailed event view. It can be enabled or disabled at will, using the Roll Up toggle.
- Written by Julie Powell
- Posted on July 25, 2024
- Updated on July 25, 2024
- 2496 Views
In order to minimize the volume of change control events, CloudVision has introduced a new event, Change Control Events. Change Control Events is generated when 2 or more of the following events are triggered for the same change control:
- Written by Julie Powell
- Posted on October 22, 2024
- Updated on October 22, 2024
- 1693 Views
CloudVision will generate a Disk Utilization on CloudVision Node Breached Threshold event when disk utilization for a CloudVision node has either exceeded the default threshold or breached the user-configured threshold set in event rules.
- Written by Alton Lo
- Posted on November 6, 2023
- Updated on March 5, 2025
- 6093 Views
RFC7432 defines the MAC/IP advertisement NLRI (route type 2) for exchanging EVPN overlay end-hosts’ MAC and IP address reachability information. When an EVPN MAC/IP route contains more than one path to the same destination, the EVPN MAC/IP best-path selection algorithm determines which of these paths should be considered as the best path.
- Written by Alton Lo
- Posted on March 18, 2020
- Updated on January 30, 2025
- 21159 Views
In the Centralized Anycast Gateway configuration, the Spines are configured with EVPN IRB and are used as the IP
- Written by Alton Lo
- Posted on July 13, 2018
- Updated on February 7, 2022
- 12536 Views
EVPN IRB interface supports both L2 switching and L3 Vxlan Routing on the same TOR switch. In a typical EVPN IRB
- Written by Aaron Bamberger
- Posted on April 23, 2020
- Updated on April 21, 2025
- 11934 Views
E-Tree is an L2 EVPN service (defined in RFC8317) in which each attachment circuit (AC) is assigned the role of Root or Leaf. In this implementation, ACs are configured at the VLAN level, and the forwarding rules are enforced using a combination of local configuration of leaf VLANs (for local hosts), and asymmetric route targets (for remote hosts).
- Written by Lavanya Conjeevaram
- Posted on March 31, 2017
- Updated on April 30, 2025
- 15134 Views
Ethernet VPN (EVPN) is an extension of the BGP protocol introducing a new address family: L2VPN (address family number 25) / EVPN (subsequent address family number 70). It is used to exchange overlay MAC and IP address reachability information between BGP peers within a tunnel
- Written by Lavanya Conjeevaram
- Posted on December 22, 2017
- Updated on August 16, 2024
- 11077 Views
In the traditional data center design, inter-subnet forwarding is provided by a centralized router, where traffic traverses across the network to a centralized routing node and back again to its final destination. In a large multi-tenant data center environment this operational model can lead to inefficient use of bandwidth and sub-optimal forwarding.
- Written by Jeffrey Nelson
- Posted on October 28, 2020
- Updated on January 24, 2025
- 24233 Views
This feature adds control plane support for inter subnet forwarding between EVPN networks. This support is achieved
- Written by Wade Carpenter
- Posted on April 24, 2020
- Updated on March 19, 2025
- 19039 Views
EVPN MPLS VPWS (RFC 8214) provides the ability to forward customer traffic to / from a given attachment circuit (AC) without any MAC lookup / learning. The basic advantage of VPWS over an L2 EVPN is the reduced control plane signalling due to not exchanging MAC address information. In contrast to LDP pseudowires, EVPN MPLS VPWS uses BGP for signalling. Port based and VLAN based services are supported.
- Written by Alton Lo
- Posted on December 24, 2024
- Updated on December 24, 2024
- 1641 Views
Multihoming in EVPN allows a single customer edge (CE) to connect to multiple provider edges (PE or tunnel endpoint). These PE devices are all connected to the same Ethernet-Segment (ES). Multihoming is activated by assigning a unique Ethernet Segment Identifier (ESI) and ES-Import Route Target (RT) which enables all the PEs connected to the same multihomed site to import the Type 4 ES routes
- Written by Xuan Qi
- Posted on March 13, 2020
- Updated on March 13, 2020
- 12694 Views
In EOS 4.22.0F, EVPN VXLAN all active multi homing L2 support is available. A customer edge (CE) device can connect to
- Written by Chris Hydon
- Posted on June 17, 2019
- Updated on December 19, 2024
- 25608 Views
Ethernet VPN (EVPN) networks normally require some measure of redundancy to reduce or eliminate the impact of outages and maintenance. RFC7432 describes four types of route to be exchanged through EVPN, with a built-in multihoming mechanism for redundancy. Prior to EOS 4.22.0F, MLAG was available as a redundancy option for EVPN with VXLAN, but not multihoming. EVPN multihoming is a multi-vendor standards-based redundancy solution that does not require a dedicated peer link and allows for more flexible configurations than MLAG, supporting peering on a per interface level rather than a per device level. It also supports a mass withdrawal mechanism to minimize traffic loss when a link goes down.
- Written by Xuan Qi
- Posted on October 20, 2022
- Updated on September 19, 2024
- 9538 Views
EVPN gateway support for all-active (A-A) multihoming adds a new redundancy model to our multi-domain EVPN solution introduced in [1]. This deployment model introduces the concept of a WAN Interconnect Ethernet Segment identifier (WAN I-ESI). The WAN I-ESI allows the gateway’s EVPN neighbors to form L2 and L3 overlay ECMP on routes re-exported by the gateways. The identifier is shared by gateway nodes within the same domain (site) and set in MAC-IP routes that cross domain boundaries.
- Written by Gokhan Tanisik
- Posted on April 25, 2025
- Updated on April 25, 2025
- 192 Views
This feature adds the ability for an L3 default gateway TEP in a Centralized Gateway topology to advertise its SVI virtual IP addresses to VARP MAC bindings and primary addresses to System MAC bindings using EVPN type-2 routes for EVPN VXLAN overlays. Two new commands, redistribute router-mac virtual-ip[next-hop vtep primary] and redistribute router-mac system ip are introduced to enable the redistributions. This would help the L2 TEP on the network to learn the default gateway IP without flooding an ARP request for the gateway IP. This feature is only intended for Centralized Gateway Topologies.
- Written by Deva Pandian
- Posted on February 8, 2017
- Updated on February 5, 2022
- 8439 Views
This enhancement is to display the number of packets that were ECN (Explicit Congestion Notification) marked by the
- Written by Pauric Ward
- Posted on March 13, 2024
- Updated on March 10, 2025
- 4532 Views
Administrative Groups (AG) provide a way to associate certain attributes or policies with links, enabling network administrators to control the routing decisions based on specific criteria. Extended Administrative Groups (EAG) are an extension of AG which allow a larger range of admin groups to be utilized for various Traffic Engineering (TE) purposes within a network. EAGs are defined in a new sub-TLV for IS-IS link attributes, separate to AGs, however they are considered as one within EOS. The EAG feature in EOS allows the range of administrative color to be increased from 0-31 to 0-127.
- Written by Julie Powell
- Posted on July 25, 2024
- Updated on July 25, 2024
- 2596 Views
Use an External Certification Authority (ECA) to ensure secure communication and authentication with CloudVision..By default, Streaming Agent and other applications communicate with CloudVision using mutual-TLS certificates signed by a local certificate authority (CA). You now have the option to integrate CloudVision with Venafi, an external CA, to sign and verify these certificates.
- Written by Venkatesh Janakiraman
- Posted on April 10, 2015
- Updated on February 5, 2022
- 7625 Views
Starting EOS 4.15.0F, EOS can monitor (for long durations) low error rate errors on all fabric links. It
- Written by Anoop Dawani
- Posted on September 30, 2015
- Updated on September 30, 2015
- 7880 Views
The 7250X and 7300 series use an optimized internal CLOS design with multiple port ASICs interconnected via Fabric
- Written by Dhruba Jyoti Pokhrel
- Posted on December 16, 2024
- Updated on December 16, 2024
- 1237 Views
With the 18.0 release, Access Points (AP) can also use LAN2 as the Uplink Port. If both the LAN Ports are available as Uplink, the AP monitors both ports equally. Only on the first AP boot will AP consider LAN1 as the default Uplink, and LAN2 will be the failover. If LAN1 and LAN2 are connected and LAN1 fails to receive any packets, the AP can fail over to LAN2 as the Uplink Port and will continue to operate on the same uplink even if LAN1 is active again.
- Written by Muhammad Yousuf
- Posted on April 18, 2015
- Updated on February 5, 2022
- 8122 Views
The 7280E and 7500E series are Virtual Output Queues (VOQs) based multi chip systems where there is a VOQ for all the
- Written by Prasanth Sasidharan
- Posted on September 30, 2015
- Updated on February 8, 2022
- 7686 Views
Fallback PBR policy enables an alternate policy to be active when PBR policy attached to an interface is being
- Written by Evelyn Wang
- Posted on March 5, 2020
- Updated on December 20, 2024
- 11139 Views
The FEC (Forward Error Correction) traffic analyzer is designed to estimate the performance of the FEC layer, identify error statistics, and the source of correlated errors on physical interfaces.
- Written by Bobby Dhillon
- Posted on April 5, 2024
- Updated on July 30, 2024
- 3512 Views
FIPS is a US federal standard for computer systems and data security that mandates only compliant cryptographic algorithms and their implementations be used in a product’s cryptographic operations. A product is considered FIPS compliant if it uses verified crypto modules that have been certified by a laboratory approved by the National Institute of Standards and Technology (NIST). CloudVision has completed the FIPS certification process to allow users with both single-node and multi-node clusters to operate in FIPS mode. Intra-node communication is not yet certified and will follow in Phase 2.
- Written by Prachi Modi
- Posted on July 16, 2024
- Updated on July 16, 2024
- 2488 Views
In the 17.0 release, CV-CUE introduces FEED. FEED is a network dashboard that presents a timeline view of all the detected anomalies in the network. CV-CUE curates the FEED by continuously monitoring and proactively detecting anomalies in the network. It also analyzes the cause of the anomaly and provides dynamic suggestions to mitigate the issue. The administrator can analyze the issue, the AI-based recommended action, and then decide on the best approach to mitigate the issue. Feed also lets administrators go back in time and understand anomalies that occurred in the past.
- Written by Gaofeng Yue
- Posted on January 23, 2019
- Updated on March 26, 2025
- 10766 Views
FIB compression allows us to program routes into the hardware more efficiently. Routes are programmed in the route
- Written by Lavanya Conjeevaram
- Posted on June 6, 2017
- Updated on December 22, 2017
- 9052 Views
MPLSoGRE Filtered Mirroring is a specialized version of Mirroring to GRE Tunnel and Filtered Mirroring in which
- Written by Dhruba Jyoti Pokhrel
- Posted on July 16, 2024
- Updated on July 16, 2024
- 2511 Views
Organizations may have multiple access points (APs) of different models operating with various firmware versions. As an organization, you may want to designate a specific version as a compliant firmware version for a certain model. Assigning a compliant firmware version helps network administrators identify non-compliant AP models by generating notification alerts.
- Written by Mattar Amith Kini
- Posted on December 27, 2024
- Updated on December 27, 2024
- 1224 Views
This document describes the CLI introduced to reallocate ECMP FEC banks on different levels in a hierarchical FEC configuration. Users may run out of entries on a certain level with other levels having little to no usage, and this CLI reconfigures the ECMP FEC entries to meet the requirements of the user.
- Written by Prachi Modi
- Posted on January 17, 2024
- Updated on January 17, 2024
- 4369 Views
With the 16.0 release, CloudVision Cognitive Unified Edge (CV-CUE) introduces the following enhancements to Floor Plans:
- Written by Harry Dhillon
- Posted on April 29, 2025
- Updated on April 29, 2025
- 73 Views
Latency and drop information help determine if there is a loss in a particular flow and where the loss occurred. A Service Node action configured as a DANZ Monitoring Fabric (DMF) managed service has multiple separate taps or spans in the production network and can measure the latency of a flow traversing through any pair of these points. It can also detect packet drops between any two points in the network if the packet only appears on one point within a specified time frame, currently set to 200ms.
- Written by Chris Pearson
- Posted on September 24, 2024
- Updated on September 24, 2024
- 1965 Views
This feature provides a way to distinguish groups of flows within encrypted GRE tunnels. That enables downstream forwarding devices to process multiple flows in parallel while maintaining packet order within individual flows. Parallel processing offers the opportunity for significant aggregate throughput improvement.
- Written by Marc Pawlowsky
- Posted on March 7, 2025
- Updated on March 7, 2025
- 630 Views
The agent DmaQueueMonitor provides visibility into packets coming up to the CPU via CPU queues. Packets are continuously sampled on monitored queues and kept available for reporting when a CPU congestion event occurs. When a queue that leads to CPU processing is congested a PCAP file may be created from the sampled packets that were captured from before and after the congestion event. The PCAP file is written to the file system for off-line examination.
- Written by Mihyar Baroudi
- Posted on December 8, 2015
- Updated on December 21, 2015
- 7550 Views
This feature enables detection of abnormal system flows (total in vs. out packet counters) by showing packet loss
- Written by Surapaneni Venkata Gopi Krishna
- Posted on June 16, 2022
- Updated on October 11, 2024
- 10720 Views
Flow control is a data transmission option that temporarily stops a device from sending data because of a peer data overflow condition. If a device sends data faster than the receiver can accept it, the receiver's buffer can overflow. The receiving device then sends a PAUSE frame, instructing the sending device to halt transmission for a specified period.
- Written by Canberk Akcali
- Posted on September 12, 2024
- Updated on September 12, 2024
- 2192 Views
Forced periodic ARP refresh adds support for a mechanism that allows forcing ARP/NDP refresh requests to be sent in periodic intervals independently of ARP/NDP entries' confirmed time in the kernel. By default, when a neighbor entry gets confirmed by various processes such as ARP synchronization between MLAG peers, an ARP refresh request is not sent for at least another duration of ARP aging timeout (or ND cache expiry time for the IPv6 case). This feature provides support for a configuration to force sending refresh requests at the configured ARP/ND aging timeout regardless of the last confirmed time.
- Written by Dhruba Jyoti Pokhrel
- Posted on December 16, 2024
- Updated on December 16, 2024
- 1243 Views
With the 18.0 release, you can send a copy of DHCP Packets from Access Points (AP) to Network Access Control (NAC) solutions for profiling clients and assigning appropriate network segments. When you enable the packet forwarding option on the UI, the AP forwards a copy of the DHCP packets to Port 67 of the destination server.
- Written by Dhruba Jyoti Pokhrel
- Posted on April 1, 2024
- Updated on April 1, 2024
- 3602 Views
This feature lets you freeze the channel and transmit power in the Auto mode to operate a specific radio at a specific channel number and transmit power. To switch to other channels, unfreeze the settings and select a custom channel and power, or enable the Auto mode to select the optimum channel and transmit power. Freeze and unfreeze Auto Channel Selection (ACS) and Transmit Power Control (TPC) configurations are configured for each radio. You can select multiple radios and freeze the ACS and TPC settings.
- Written by David Joseph
- Posted on December 24, 2024
- Updated on December 24, 2024
- 1246 Views
This feature adds support for the front panel Ethernet (Et) interface counters on the platforms listed below and enables the Et interfaces to dynamically adopt the counter values (packet and error)1 of interfaces (Switch, App interfaces etc.) related to the currently running FPGA application, based on user or default configuration. All Arista FPGA applications are supported. Both the receive and transmit packet counters can be independently configured for each interface, as desired. Counters are supported for interfaces of any speed including agile ports.
- Written by Kaushik Kumar Ram
- Posted on August 21, 2020
- Updated on October 17, 2024
- 11071 Views
Generic UDP Encapsulation (GUE) is a general method for encapsulating packets of arbitrary IP protocols within a UDP tunnel. GUE provides an extensible header format with optional data. In this release, decap capability of GUE packets of variant 1 header format has been added. This variant allows direct encapsulation using the UDP header without the GUE header. The inner payload could be one of IPv4, IPv6, or MPLS.
- Written by Syed Rahi
- Posted on September 30, 2015
- Updated on February 7, 2022
- 7462 Views
When a user configures IPv6 ACLs, by default, the system automatically includes two additional rules : a default
- Written by Pankaj Srivastava
- Posted on December 20, 2024
- Updated on December 20, 2024
- 1348 Views
This feature provides a CLI to disable storm control policing on known multicast streams. By default, known multicast streams are policed by storm control policers and the behavior is consistent across all platforms supporting storm control feature. With the new CLI we can change the default policing behavior for known multicast streams.
- Written by Nathan Wolfe
- Posted on June 29, 2016
- Updated on June 29, 2016
- 9165 Views
Users can now define a global LAG hashing profile. The global LAG hashing profile will be applied to all linecards
- Written by Ajanthasingam Jegasingam
- Posted on January 2, 2025
- Updated on January 2, 2025
- 1192 Views
This is an implementation of the gNOI Healthz RPCs (version 1.3.0). Note that RPC elements of the Healthz service are supported, and as of 4.33.1F, only the agent information is exposed in healthz yang component containers outlined as in the healthz service.
- Written by Prachi Modi
- Posted on December 16, 2024
- Updated on December 16, 2024
- 1232 Views
In the 18.0 release, along with Slack, you can also subscribe to Google Chat and Microsoft Teams webhooks to receive alerts in your conversation channels whenever a network issue or anomaly is detected. Note: This is a BETA feature. Reach out to your Arista account manager to enable it.
- Written by Shubhangi Singh
- Posted on October 24, 2024
- Updated on October 24, 2024
- 1668 Views
This is an extension to the IKE policy and SA policy configuration options available in EOS. The key lifetimes for IKE policies and SA policies are specifiable in hours. This feature allows specifying the key lifetimes in minutes as well.