Supported Platforms
Related Documentation
- ACX, EX, J, M, MX, PTX, QFX, SRX, T Series
- Example: Configuring BFD for Static Routes
- Example: Configuring BFD Authentication for Static Routes
- ACX, M, MX, PTX, QFX, T Series
- Example: Configuring BFD on Internal BGP Peer Sessions
- Understanding BFD for BGP
- ACX, M, PTX, QFX, T Series
- Example: Configuring BFD Authentication for BGP
bfd-liveness-detection (Protocols BGP)
Syntax
Hierarchy Level
Release Information
Statement introduced in Junos OS Release 8.1.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
detection-time threshold and transmit-interval threshold options introduced in Junos OS Release 8.2
Support for logical routers introduced in Junos OS Release 8.3.
Support for IBGP and multihop EBGP sessions introduced in Junos OS Release 8.3.
holddown-interval statement introduced in Junos OS Release 8.5. You can configure this statement only for EBGP peers at the [edit protocols bgp group group-name neighbor address] hierarchy level.
no-adaptation statement introduced in Junos OS Release 9.0.
Support for BFD authentication introduced in Junos OS Release 9.6.
Support for BFD on IPv6 interfaces with BGP introduced in Junos OS Release 11.2.
Statement introduced in Junos OS Release 12.1 for the QFX Series.
Description
Configure bidirectional failure detection (BFD) timers and authentication for BGP.
For IBGP and multihop EBGP support, configure the bfd-liveness-detection statement at the global [edit bgp protocols] hierarchy level. You can also configure IBGP and multihop support for a routing instance or a logical system.
Options
authentication algorithm algorithm-name (Optional)—Configure the algorithm used to authenticate the specified BFD session: simple-password, keyed-md5, keyed-sha-1, meticulous-keyed-md5, meticulous-keyed-sha-1.
authentication key-chain key-chain-name (Optional)—Associate a security key with the specified BFD session using the name of the security keychain. The keychain name must match one of the keychains configured in the authentication-key-chains key-chain statement at the [edit security] hierarchy level.
authentication loose-check—(Optional) Configure loose authentication checking on the BFD session. Use only for transitional periods when authentication may not be configured at both ends of the BFD session.
detection-time threshold milliseconds (Optional)—Configure a threshold. When the BFD session detection time adapts to a value equal to or greater than the threshold, a single trap and a single system log message are sent.
holddown-interval milliseconds (Optional)—Configure an interval specifying how long a BFD session must remain up before a state change notification is sent. When you configure the hold-down interval for the BFD protocol for EBGP, the BFD session is unaware of the BGP session during this time. In this case, if the BGP session goes down during the configured hold-down interval, BFD already assumes it is down and does not send a state change notification. The holddown-interval statement is supported only for EBGP peers at the [edit protocols bgp group group-name neighbor address] hierarchy level. If the BFD session goes down and then comes back up during the configured hold-down interval, the timer is restarted. You must configure the hold-down interval on both EBGP peers. If you configure the hold-down interval for a multihop EBGP session, you must also configure a local IP address by including the local-address statement at the [edit protocols bgp group group-name] hierarchy level.
Range: 0 through 255,000
Default: 0
minimum-interval milliseconds (Required)—Configure the minimum intervals at which the local routing device transmits hello packets and then expects to receive a reply from a neighbor with which it has established a BFD session. This value represents the minimum interval at which the local routing device transmits hello packets as well as the minimum interval that the routing device expects to receive a reply from a neighbor with which it has established a BFD session. You can configure a value in the range from 1 through 255,000 milliseconds. Optionally, instead of using this statement, you can specify the minimum transmit and receive intervals separately (using the minimum-receive-interval and transmit-interval minimal-interval statements).
Range: 1 through 255,000
minimum-receive-interval milliseconds (Optional)— Configure only the minimum interval at which the local routing device expects to receive a reply from a neighbor with which it has established a BFD session.
Range: 1 through 255,000
multiplier number (Optional)—Configure the number of hello packets not received by a neighbor that causes the originating interface to be declared down.
Range: 1 through 255
Default: 3
no-adaptation (Optional)—Configure BFD sessions not to adapt to changing network conditions. We recommend that you not disable BFD adaptation unless it is preferable to not to have BFD adaptation enabled in your network.
transmit-interval threshold milliseconds (Optional)—Configure a threshold. When the BFD session transmit interval adapts to a value greater than the threshold, a single trap and a single system message are sent. The interval threshold must be greater than the minimum transmit interval.
Range: 0 through 4,294,967,295 (232 – 1)
transmit-interval minimum-interval milliseconds (Optional)—Configure only the minimum interval at which the local routing device transmits hello packets to a neighbor with which it has established a BFD session.
Range: 1 through 255,000
version (Optional)—Configure the BFD version to detect.
Range: 1 or automatic (autodetect the BFD version)
Default: automatic
The remaining statements are explained separately.
Required Privilege Level
routing—To view this statement in the configuration.
routing-control—To add this statement to the configuration.
Related Documentation
- ACX, EX, J, M, MX, PTX, QFX, SRX, T Series
- Example: Configuring BFD for Static Routes
- Example: Configuring BFD Authentication for Static Routes
- ACX, M, MX, PTX, QFX, T Series
- Example: Configuring BFD on Internal BGP Peer Sessions
- Understanding BFD for BGP
- ACX, M, PTX, QFX, T Series
- Example: Configuring BFD Authentication for BGP
Published: 2013-04-03
Supported Platforms
Related Documentation
- ACX, EX, J, M, MX, PTX, QFX, SRX, T Series
- Example: Configuring BFD for Static Routes
- Example: Configuring BFD Authentication for Static Routes
- ACX, M, MX, PTX, QFX, T Series
- Example: Configuring BFD on Internal BGP Peer Sessions
- Understanding BFD for BGP
- ACX, M, PTX, QFX, T Series
- Example: Configuring BFD Authentication for BGP