Anda di halaman 1dari 65

3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Cisco Support English

Cisco Support Community


Register Login

Cisco Support Community / Service Providers / Service Providers Documents / BFD Support on Cisco ASR9000 Options

All community

Search the Community

BFD Support on Cisco ASR9000

BFD Support on Cisco ASR 9000


Introduction
The Problem With Convergence
BFD For Fast Failure Detection
BFD Protocl Overview
BFD Async Mode
BFD Echo Mode
BFD Session
"Static" and "Dynamic" BFD
ASR 9000 Distributed BFD Architecure
Con guring BFD
BFD on Static Routes
BFD On Directly Connected Static Host Routes
BFD With IGP Peers
Global BFD Parameters
BFD Echo And QoS
BFD And HSRP
BFD Scale
Monitoring BFD
Monitoring BFD Via CLI
State and Diag
Monitoring BFD Via SNMP
Multi-Hop And Multi-Path BFD
BFD Async Mode In Multi-Hop BFD Session
BFD Echo Mode In Multi-Hop BFD Session
Con uring A Multi-Hop BFD Session
QOS Considerations In A Multi-Hop BFD Session
Monitoring A Multi-Hop BFD Session
BFD HW O oad
BFD Over Bundle Member Interfaces
https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 1/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Introduction
"BFD Over VLAN Over Bundle" Feature Operation
"BFD Over Bundle (BoB)"" Feature Operation
Async Mode
Echo Mode
L2 Encapsulation
BFD Over Bundle (BoB) Con guration
Monitoring BFD Over Bundle (BoB)
Monitoring BoB Via CLI
Monitoring BoB Via SNMP
Native BFD Over VLAN Over Bundle Interfaces And Sub-Iinterfaces (BLB)
Con guring BLB
BLB QoS Considerations
Monitoring BLB
BoB-BLB Coexistence
BFD Session Inheritance In BFD Over Bundle Member Implementations
Troubleshooting BFD
BFD Session Not Coming Up
BFD Session Going Down
Essential Information To Collect Before Contacting TAC
BFD Packet Format
BFD V0 Control Packet
BFD V1 Control Packet
Relevant Header Field
BFD Support on Cisco ASR 9000

Introduction
In both Enterprise and Service Provider networks, the convergence of business-critical applications onto a
common IP infrastructure is becoming more common. Given the criticality of the data, these networks are typically
constructed with a high degree of redundancy. While such redundancy is desirable, its e ectiveness is dependant
upon the ability of individual network devices to quickly detect failures and reroute tra c to an alternate path.

This detection is now typically accomplished via hardware detection mechanisms. However, the signals from
these mechanisms are not always conveyed directly to the upper protocol layers. When the hardware
mechanisms do not exist (eg: Ethernet) or when the signaling does not reach the upper protocol layers, the
protocols must rely on their much slower strategies to detect failures. The detection times in existing protocols
are typically equal to or greater than one second, and sometimes much longer. For some applications, this is too
long to be useful.

Back to top
1. The Problem With Convergence
The process of network convergence can be broken up into a set of discreet events:

Failure detection: the speed with which a device on the network can detect and react to a failure of one of its
own components, or the failure of a component in a routing protocol peer.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 2/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Information dissemination: the speed with which the failure in the previous stage can be communicated to
other devices in the network.
Repair: the speed with which all devices on the network-having been noti ed of the failure-can calculate an
alternate path through which data can ow.

An improvement in any one of these stages provides an improvement in overall convergence.

The rst of these stages, failure detection can be the most problematic and inconsistent:

Di erent routing protocols use varying methods and timers to detect the loss of a routing adjacency with a
peer.
Link-layer failure detection times can vary widely depending on the physical media and the Layer 2
encapsulation used.
Intervening devices (eg: Ethernet switch) can hide link-layer failures from routing protocol peers.

Packet over SONET (POS) tends to have the best failure detection time amongst the di erent Layer 1/2 media
choices. It can typically detect and react to media or protocol failures in ~50 milliseconds. This has become the
benchmark against which other protocols are measured.

Back to top
2. BFD For Fast Failure Detection
Bi-directional Forwarding Detection (BFD) provides rapid failure detection times between forwarding engines,
while maintaining low overhead. It also provides a single, standardized method of link/device/protocol failure
detection at any protocol layer and over any media. BFD is a simple, light weight hello protocol and is targeted to
achieve a detection time as short as a few tenths of milliseconds.

A secondary bene t of BFD, in addition to fast failure detection, is that it provides network administrators with a
consistent method of detecting failures. Thus, one availability methodology could be used, irrespective of the
Interior Gateway Protocol (IGP) or the topology of the target network. This eases network pro ling and planning,
because re-convergence time should be consistent and predictable. BFD function is de ned in RFC 5880.

The Fundamental di erence between the BFD Hellos and the Protocol Hellos (OSPF, RSVP etc.) is that BFD
adjacencies do not go down on Control-Plane restarts (e.g. RSP failover) since the goal of BFD is to detect only
the forwarding plane failures. BFD is essentially a Control plane protocol designed to detect the forwarding path
failures.

Back to top
3. BFD Protocl Overview
BFD is a simple Hello protocol that, in many respects, is similar to the detection components of well-known
routing protocols. It is a UDP-based layer-3 protocol that provides very fast routing protocol independent
detection of layer-3 next hop failures.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 3/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

A pair of systems transmits BFD packets periodically over each path between the two systems, and if a system
stops receiving BFD packets for long enough, some component in that particular bidirectional path to the
neighboring system is assumed to have failed.

BFD runs on top of any data-link protocol that is in use between two adjacent systems.

BFD has two versions: Version 0 and Version 1. The ASR 9000 Router based on Cisco IOS XR software supports
BFD Version 1.

BFD has two operating modes that may be selected, as well as an additional function that can be used in
combination with the two modes.

The primary mode is known as Asynchronous mode. In this mode, the systems periodically send BFD Control
packets to one another, and if a number of those packets in a row are not received by the other system, the
session is declared to be down.

The second mode is known as Demand mode. In this mode, it is assumed that a system has an independent way
of verifying that it has connectivity to the other system. Once a BFD session is established, such a system may
ask the other system to stop sending BFD Control packets, except when the system feels the need to verify
connectivity explicitly, in which case a short sequence of BFD Control packets is exchanged, and then the far
system quiesces. Demand mode may operate independently in each direction, or simultaneously.

An adjunct to both modes is the Echo function. When the Echo function is active, a stream of BFD Echo packets
is transmitted in such a way as to have the other system loop them back through its forwarding path. If a number
of packets of the echoed data stream are not received, the session is declared to be down. The Echo function
may be used with either Asynchronous or Demand mode. Since the Echo function is handling the task of
detection, the rate of periodic transmission of Control packets may be reduced (in the case of Asynchronous
mode) or eliminated completely (in the case of Demand mode).

Cisco ASR 9000 only supports asynchronous mode and has echo enabled by default.

BFD Async Mode

Node running BFD in Async mode transmits periodically BFD Control packets. BFD control packets are
encapsulated into UDP, with Source port 49152 and Destination port 3784. The Source address of the IP packet
is the local interface address and the destination address is the remote interface address.

BFD control packets are unidirectional, i.e. they normally dont require a response. Their purpose is to con rm that
BFD control plane on the remote peer is operational.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 4/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

If a predetermined number of intervals passes without receiving a BFD control placket from the peer, the local
node will declare the BFD session down.

BFD Echo Mode

The Echo mode is designed to test only the forwarding path and not the host stack.

BFD Echo packets are transmitted over UDP with source and destination ports as 3785. The source address of
the BFD Echo packet is the router ID and the destination address is the local interface address.

BFD Echo packets do not require a response. Choice of destination IP address is such that it forces the remote
peer to route the original packet back via the same link, without punting to the BFD control plane. Thus, BFD
control plane on peer B is not even aware of BFD Echo packets originating from peer A.

If a predetermined number of intervals passes without receiving its own BFD Echo placket, the local node will
declare the BFD session down.

Source address selection of the BFD echo packet:

1. check for an echo source address con guration for the interface
2. check for a global echo source address con guration
3. use the RID as the echo source address
4. use the interface address

Default source/destination IP address and UDP port for BFD Asycn and Echo packets:

BFD Async BFD Echo


Source IP address Local Interface Router ID

Destination IP address Remote interface Local Interface

Source UDP Port 49152 3785

Destination UDP Port 3784 3785

BFD Session

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 5/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

The BFD session parameters are negotiated between the BFD peers in a three-way handshake. Each Peer
communicates its session state in the State (Sta) eld in the BFD Control packet, and that received state, in
combination with the local session state, drives the state machine. When the local peer wants to bring the session
up, it sends a control packet with Down state. Figure 3 shows the transition from Down to Up state. Circles
represent the state of the local peer and rectangles the received state of remote peer.

If this peer receives a BFD Control packet from the remote system with a Down state, it advances the session to
Init state. If it receives a BFD Control packet from the remote system with an Init state, it moves the session to Up
state.

The BFD peers continuously negotiate their desired transmit and receive rates. The peer that reports the slower
rate determines the transmission rate. The periodic transmission of BFD Control packets is jittered on a per-
packet basis by a random value of 0 to 25%, in order to avoid self-synchronization with other systems on the
same subnet. Thus, the average interval between packets is roughly 12.5% less than that negotiated.

In a BFD session, each system calculates its session down detection time independently. In each direction, this
calculation is based on the value of Detect Mult received from the remote system and the negotiated transmit
interval.

Negotiated_Transmit_Interval =

max (required minimum received interval, last received desired minimum transmit
interval)

Detection Time = Detection_Multiplier x Negotiated_Transmit_Interval

If the Detection Time is passed without receiving a control packet, the session is declared to be down.

Back to top
4. Static and Dynamic BFD
Static BFD refers to a BFD session that protects a single static route. Dynamic BFD refers to a BFD session
between dynamic routing protocol peers, by which all of the routes having this peer as the next-hop are
protected by BFD.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 6/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Back to top
5. ASR 9000 Distributed BFD Architecure

In Cisco ASR 9000, BFD Functionality is implemented between RSP and Line card in a distributed architecture.
There is a BFD Server Process running on the RSP and a BFD Agent Process running on the Line card. The
Architecture is as shown in this gure:

BFD process on RSP:


Responsible for interacting with BFD clients and passing BFD session creation/deletion request to LC BFD
processes upon con guration request, and maintaining a adjacency database to track all BFD sessions on
the router.
Notify clients of BFD (OSPF, IS-IS or BGP) interface con guration change and session down events upon
receiving BFD event noti cation from LC.
Service show and con guration commands.

BFD process on LC:
Create and delete BFD sessions based on commands from BFD RSP process
Maintain a database for all BFD sessions on the LC. There is an instance of BFD adjacency per session on
the LC that owns the session.
Notify BFD RSP process in any event of transmit, receive failure or session down detection.
Maintain and update BFD session transmit and receive counters
Run BFD FSM for all BFD sessions on the LC, transmit and receive BFD control packets, update and check
BFD session detection timers.

BFD communication between RSP and LC is through reliable IPC messaging which is designed for communication
with minimal delay and being able to survive RSP switchover. In particular:

LC BFD event message to RSP is sent on a reserved IPC port;


On RSP, BFD event port is opened as an IPC reliable port and BFD event sent from LC gets received in RSP
IPC receive interrupt context. The BFD event port gets open and ready to receive BFD event on standby RSP in
case of a switchover and it becomes active RSP.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 7/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

During RSP switchover, BFD event from LC to RSP will not be sent. Instead, it is registered with switchover
call-backs and get sent after the RSP switchover.

The BFD packets have to be punted to the Line Card CPU and follow the slow path. Injected and punted BFD
packets have a preferential treatment on all line card architectures. In other words, following BFD packets have a
preferential treatment on all ASR9000 line cards:

BFD control packets


BFD Echo packets originated on the LC
Response to BFD Echo packets originated on the LC

Egress QoS policy map needs to be considered to ensure preferential treatment of BFD Echo packets originated
by the BFD peer.

Con guring BFD


NOTE: In IOS XR an application must terminate the BFD session.

Unlike IOS, direct peering without any application using the session is not allowed.

Back to top
6. BFD on Static Routes
Simplest application is router-static:

router static

address-family ipv4 unicast

172.16.1.1/32 10.1.1.1 bfd fast-detect minimum-interval 500 multiplier 3

interface GigabitEthernet0/0/0/0

ipv4 address 10.1.1.2 255.255.255.0

Back to top
7. BFD On Directly Connected Static Host Routes
This is a special case in IOS-XR, supported after 4.2.3 (through CSCua18314). This is a static BFD to a /32 pre x
in a directly attached network.

interface GigabitEthernet0/1/0/22

ipv4 address 10.52.61.1 255.255.255.0

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 8/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

router static

address-family ipv4 unicast

10.52.61.2/32 GigabitEthernet0/1/0/22 10.52.61.2 bfd fast-detect

Corresponding con guration on IOS device:

interface GigabitEthernet4/17

ip address 10.52.61.2 255.255.255.0

bfd interval 500 min_rx 500 multiplier 3

bfd neighbor ipv4 10.52.61.1

Back to top
8. BFD With IGP Peers
ISIS application sample:

router isis lab

net 49.0111.0111.0111.0111.00

address-family ipv4 unicast

redistribute connected

interface GigabitEthernet0/2/0/1

bfd minimum-interval 500

bfd multiplier 3

bfd fast-detect ipv4

Back to top
9. Global BFD Parameters
Top level BFD con guration mode is used to con gure global BFD parameters (dampening, global echo source
address, etc.) and interface speci c BFD paramaters (disable/enable echo mode per interface, set echo source
address, etc.):

bfd

interface GigabitEthernet0/2/0/1

echo disable

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 9/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

echo ipv4 source 10.0.0.21

dampening secondary-wait 7500

dampening initial-wait 3000

dampening maximum-wait 180000

In IOS-XR BFD Control and Echo packet intervals are not con gured independently. If Echo mode is enabled, user
can con gure the BFD Echo interval, and the BFD Control interval is set to 2 seconds. If BFD Echo is disabled,
user con gures the BFD Control interval. Same multiplier is applied to both values to calculate the dead timer.

If Echo mode is enabled, locally con gured multiplier will be used by remote peer to calculate detection time for
BFD Control packets sent by local peer. And for locally generated echo packets, locally con gured multiplier will
be used to calculate the detection time.

BFD Multiplier

(fat green arrow indicates where is the multiplier applied)

Back to top
10. BFD Echo And QoS
Injected and punted BFD packets have a preferential treatment on all line card architectures.

Egress QoS policy map needs to be considered to ensure preferential treatment of BFD Echo packets originated
by the BFD peer. Sample con guration:

ipv4 access-list BFD

5 permit udp any any eq 3785

class-map match-any BFDCLASS

match access-group ipv4 BFD

policy-map OUT

class BFDCLASS

priority level 1

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 10/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

police rate 10 kbps

interface GigabitEthernet0/2/0/1

service-policy output OUT

If the above still doesn't prevent BFD aps during sever congestions, create a parent shaper over this policy,
shape it to 100% and apply the parent policy to the interface.

Back to top
11. BFD And HSRP

HSRP has to learn what the physical addresses of the Active and Standby router are (from the HSRP control
packets). Once one of these routers change state, it's possible that another (third) router could take over as
Standby. HSRP cannot assume that the same router will come back (con gured the same way) following the
failure - it must wait for the Standby to be newly elected and discover its physical address to recreate the BFD
session to that address. As a consequence BFD session may ap when HSRP state changes.

Back to top
12. BFD Scale

NOTE: BFD scale limits di er per line card architecture and may change from one IOS-XR release to another.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 11/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

BFD scale is determined by rate of BFD packets that are allowed to be punted to LC CPU. Also, it depends on the
pps limit and max session limit per LC. Limits di er per line card architecture and may change from one IOS-XR
release to another. Exec command show bfd summary can be used to observe the limits on the router:

RP/0/RSP0/CPU0:ASR9K#show bfd summary

Node All PPS usage MP PPS usage Session number

% Used Max % Used Max Total MP Max

---------- --------------- --------------- ------------------

0/2/CPU0 0 2 16000 0 0 16000 1 0 8000

0/4/CPU0 0 0 9600 0 0 9600 0 0 4000

0/6/CPU0 0 0 16000 0 0 16000 0 0 8000

All PPS Usage indicates the PPS limit on all BFD sessions on a given slot, and Session number Max indicates
the maximum number of BFD sessions on a given slot.

For example, to calculate how many BFD sessions can be hosted presuming a 150ms Echo interval on slots 0/2
or 0/6 from the above sample:

BFD pps rate = 16000 pps


Echo packet interval = 150ms = 0.15s
==> 16000 * 0.15 = 2400 sessions

Received BFD packets are policed by the NP. To see the rate of received BFD packets and to check for any
drops, run the show controllers np counters <np|all> location <location> command and look
for BFD counters.

Monitoring BFD
Back to top
13. Monitoring BFD Via CLI

Essential commands for BFD monitoring are

show bfd session [detail]

show bfd counters packet

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 12/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Sample outputs for given con guration:

interface GigabitEthernet0/2/0/1

ipv4 address 10.0.9.2 255.255.255.0

router isis lab

net 49.0111.0111.0111.0111.00

address-family ipv4 unicast

redistribute connected

interface GigabitEthernet0/2/0/1

bfd minimum-interval 500

bfd multiplier 3

bfd fast-detect ipv4

RP/0/RSP0/CPU0:ASR9K-1#show bfd session

Interface Dest Addr Local det time(int*mult) State

Echo Async

--------------- --------------- ---------------- ---------------- ----------

Gi0/2/0/1 10.0.9.1 1500ms(500ms*3) 6s(2s*3) UP

RP/0/RSP0/CPU0:WEST-PE-ASR9K-1#show bfd counters packet

GigabitEthernet0/2/0/1 Recv Xmit Recv Xmit

Async: 44048 44182 Echo: 175384 175384

RP/0/RSP0/CPU0:ASR9K-1#show bfd session detail

I/f: GigabitEthernet0/2/0/1, Location: 0/2/CPU0

Dest: 10.0.9.1

Src: 10.0.9.2

State: UP for 0d:21h:4m:54s, number of times UP: 1

Session type: PR/V4/SH

Received parameters:

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 13/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Version: 1, desired tx interval: 2 s, required rx interval: 2 s

Required echo rx interval: 1 ms, multiplier: 3, diag: None

My discr: 2148335618, your discr: 2148073474, state UP, D/F/P/C/A: 0/0/0/1/0

Transmitted parameters:

Version: 1, desired tx interval: 2 s, required rx interval: 2 s

Required echo rx interval: 1 ms, multiplier: 3, diag: None

My discr: 2148073474, your discr: 2148335618, state UP, D/F/P/C/A: 0/0/0/1/0

Timer Values:

Local negotiated async tx interval: 2 s

Remote negotiated async tx interval: 2 s

Desired echo tx interval: 500 ms, local negotiated echo tx interval: 500 ms

Echo detection time: 1500 ms(500 ms*3), async detection time: 6 s(2 s*3)

Local Stats:

Intervals between async packets:

Tx: Number of intervals=100, min=1663 ms, max=1993 ms, avg=1834 ms

Last packet transmitted 876 ms ago

Rx: Number of intervals=100, min=1665 ms, max=2 s, avg=1832 ms

Last packet received 272 ms ago

Intervals between echo packets:

Tx: Number of intervals=50, min=25 s, max=25 s, avg=25 s

Last packet transmitted 142 ms ago

Rx: Number of intervals=50, min=25 s, max=25 s, avg=25 s

Last packet received 137 ms ago

Latency of echo packets (time between tx and rx):

Number of packets: 100, min=1 ms, max=5 ms, avg=3 ms

Session owner information:

Desired Adjusted

Client Interval Multiplier Interval Multiplier

-------------------- --------------------- ---------------------

isis-escalation 500 ms 3 2 s 3

Explanation of the relevant elds in the show bfd session detail command output:


https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 14/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Field Description
dest: 10.0.9.1 The Destination IP address in the BFD async control packet
src: 10.0.9.2 The source IP address used in the BFD async control packet
State: UP The current state of the BFD session at the local router
for 0d:21h:4m:54s Indicates the time in which this BFD session has maintained this State
number of times UP: Indicates the number of times this session has been UP since the last time of ap or
1 establishment
Received
Explanation of the received parameters is as below
parameters:
Version: 1 BFD protocol version running on the Remote router
desired tx interval: 2
The Async packet interval used by Remote router in sending
s
required rx interval:
The Async packet interval expected by Remote router of this Router
2s
Required echo rx
The echo interval that can be supported by the Remote router
interval: 1 ms
multiplier: 3 The multiplier that the Remote router chooses to use
The reason indicated by remote router if at all the BFD session is not in UP state at it's
diag: None
side
My discr:
The Discriminator used by the Remote Router for this BFD session
2148335618
your discr: The Discriminator belonging to this Router as understood by Remote router for this BFD
2148073474 session
state UP The state of BFD session at the Remote router
Bit settings as seen in the Async control packet sent by Remote router:
D - Set if Demand Mode is used by Remote router
F - Final bit in the BFD packet sent by remote router. Remote router is ACKing change in
D/F/P/C/A: BFD parameter sent by Local router
0/0/0/1/0 P - Poll bit in the BFD packet sent by remote router. Remote router has changed some
BFD parameters and waits for ACK from Local router
C - Is BFD independent of the Control plane on Remote Router
A - Is Authentication used by Remote router for this session
Transmitted
Explanation of the transmitted parameters
parameters:
Version: 1 BFD protocol version running on the Local router
desired tx interval: 2
The Async packet interval used by Local router in sending
s
required rx interval:
The Async packet interval expected of the Remote router by this Router
2s
Required echo rx
The echo interval that can be supported by the Local router
interval: 1 ms
multiplier: 3 The multiplier that the Local router chooses to use
diag: None The reason indicated by local router if at all the BFD session is not in UP state
My discr:
The Discriminator used by the local Router for this BFD session
2148073474

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 15/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

your discr: The Discriminator belonging to remote Router as understood by the local router for this
2148335618 BFD session
state UP The state of BFD session at the Local router
Bit settings as seen in the Async control packet sent by the local router:
D - Set if Demand Mode is used by local router
F - Final bit in the BFD packet sent by local router. Local Router is ACKing a change in
BFD parameter sent by Remote router
D/F/P/C/A:
P - Poll bit in the BFD packet sent by local router. Local Router is indicating a change in
0/0/0/1/0
BFD parameter to the Remote Router
C - Set if BFD is independent of the Control plane on the local Router. As per IOX
implementation, this will be set.
A - Set if Authentication used by local router for this session
Timer Values: Details of the timer values exchanged between Local and Remote routers
Local negotiated
The Async interval used by Local Router for transmit after negotiation
async tx interval: 2 s
Remote negotiated
The Async interval used by Local Router for reception after negotiation
async tx interval: 2 s
Desired echo tx
The con gured (or default) echo interval used by Local router.
interval: 500 ms
local negotiated Based on the upper value negotiated between Local (con gured minimum-interval or
echo tx interval: 500 default value) and Remote router (published capability for Echo receive interval). In case
ms of IOS-XR, the published interval is 1ms. Between (600ms, 1ms), 600ms is chosen.
Echo detection time:
The product of local negotiated echo tx interval and the multiplier con gured locally
1500 ms(500 ms*3)
async detection The product of Remote negotiated async tx interval and the multiplier sent by remote
time: 6 s (2 s*3) router/td>

State and Diag

In traces and show commands sometimes the state is provided in an enumeration. This table decodes the state
enum to the explanation and meaning of that state /Diag number.

STATE:

State Explanation
State = 0 Admin down (con gured)
State = 1 DOWN (loss reported)
State = 2 INIT (starting up)
State = 3 UP (Bfd session all running ne).

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 16/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

DIAG:

DIAG Explanation
Diag = 0 DIAG_NONE/reserved

Diag = 1 Control Expired

Diag = 2 Echo Failed


Diag = 3 Neighbor down
Diag = 4 Forward plane reset
Diag = 5 Path down
Diag = 6 Concatenated path down
Diag = 7 Admin down
Diag = 8 Reverse concath path down.

Back to top
14. Monitoring BFD Via SNMP

For SNMP monitoring use CISCO-IETF-BFD-MIB OIDs.

Multi-Hop And Multi-Path BFD


Multi-hop BFD session runs between two endpoints, across one or more layer 3 forwarding devices. Key aspect
of BFD multi-hop session is that the return path may be asymmetric, hence it is also a multi-path session by
de nition.

In asr9k nv edge solutions (aka cluster), BFD Multi-path sessions are supportedstarting with XR release 5.2.2.

Back to top
15. BFD Async Mode In Multi-Hop BFD Session
On ASR 9000 BFD instance may only run on a line card CPU. User must manually designate the line card CPU on
which the BFD session will run. If multiple line card CPUs are designated, multi-hop BFD sessions will be load-
balanced between them. There are no mechanisms to bind a speci c BFD session to a speci c LC CPU. The line
card hosting the BFD session doesn't have to be the one that owns the transport interfaces through which BFD
packets are exchanged.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 17/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

BFD Async packets pertaining to a single BFD session are always processed by the same LC CPU. The
discriminator eld in the BFD packet header is used to determine the destination LC CPU for received BFD
packets.

BFD packets are always originated with TTL=255. To e ectively impose a limit on the number of hops that a BFD
packet should traverse, TTL threshold can be applied on received BFD packets. If the TTL is less than the
con gured threshold, packet will be dropped. BFD TTL threshold is con gurable only in global BFD con guration
mode.

Back to top
16. BFD Echo Mode In Multi-Hop BFD Session

BFD Echo mode is not supported in multi-hop BFD.

Back to top
17. Con uring A Multi-Hop BFD Session

Sample multi-hop BFD con guration for BGP:

bfd

multihop ttl-drop-threshold 240 !<-- optional

multipath include location 0/1/CPU0 !<-- mandatory

router bgp 100

address-family ipv4 unicast

address-family vpnv4 unicast

neighbor 10.0.0.22

remote-as 100

bfd fast-detect

bfd multiplier 3

bfd minimum-interval 1000

Since echo mode is not supported, con gured timers are applied to the async mode.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 18/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Back to top
18. QOS Considerations In A Multi-Hop BFD Session

Multipath BFD session packets are not injected into high priority egress queue. If user desires to ensure that BFD
packets are treated as high priority, such a QoS policy must be created and applied not only on the source of the
BFD session, but also along the path.

ipv4 access-list BFD

5 permit udp any any eq 4784

class-map match-any BFDCLASS

match access-group ipv4 BFD

policy-map OUT

class BFDCLASS

priority level 1

police rate 10 kbps

interface GigabitEthernet0/2/0/1

service-policy output OUT

Back to top
19. Monitoring A Multi-Hop BFD Session

RP/0/RSP0/CPU0:ASR9K#show bfd session detail

Mon Apr 15 16:27:28.991 UTC

Location: 0/1/CPU0 ! <------ LC CPU hosting the BFD session

Dest: 10.0.0.22

Src: 10.0.0.52

VRF Name/ID: default/0x60000000

State: UP for 0d:0h:45m:14s, number of times UP: 1

Session type: SW/V4/MH ! <------ Multi-Hop

<...>

Timer Values:

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 19/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Local negotiated async tx interval: 1 s ! <------ min interval

Remote negotiated async tx interval: 1 s

async detection time: 3 s(1 s*3) ! <------ multiplier

<...>

MP download state: BFD_MP_DOWNLOAD_ACK ! <------ Multi-Path

State change time: Apr 15 15:40:16.123

Session owner information:

Desired Adjusted

Client Interval Multiplier Interval Multiplier

-------------------- --------------------- ---------------------

bgp-default 1 s 3 1 s 3

BFD Hardware O oad


Introduction
When BFD Hardware O oad is enabled, async packets are not generated and received any more by theLC CPU,
but by the Network Processor (NP), thus increasing the BFD scale. BFD HW O oad is supported on Enhanced
Ethernet line cards (aka "Typhoon"), onsingle-hop IPv4/IPv6 sessions over physical interfaces and sub-
interfaces, and onMPLS-TP LSP Single-Path sessions.

Con guring BFD HW O oad


Con gure"hw-module bfd-hw-o oad enable" in the admin con guration mode and reload the line card for the
command to take e ect.

RP/0/RSP1/CPU0:9K(admin-config)#hw-module bfd-hw-offload enable location 0/0/CPU0

RP/0/RSP1/CPU0:9K(admin-config)#commit
RP/0/RSP1/CPU0:9K(admin-config)#end
RP/0/RSP1/CPU0:9K#hw-module location 0/0/CPU0 reload

WARNING: This will take the requested node out of service.


Do you wish to continue?[confirm(y/n)]y

Scale and Restrictions


Refer to XR release 5.3 routing con guration guide.

Monitoring BFD HW O oad

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 20/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

RP/0/RSP1/CPU0:9K#sh bfd session detail


I/f: TenGigE0/0/0/12.1, Location: 0/0/CPU0
Dest: 201.1.1.1
Src: 201.1.1.2
State: UP for 0d:0h:0m:14s, number of times UP: 1
Session type: PR/V4/SH
Received parameters:
Version: 1, desired tx interval: 150 ms, required rx interval: 150 ms
Required echo rx interval: 1 ms, multiplier: 3, diag: None
My discr: 2148335618, your discr: 2147549186, state UP, D/F/P/C/A: 0/0/0/1/0
Transmitted parameters:
Version: 1, desired tx interval: 300 ms, required rx interval: 300 ms
Required echo rx interval: 0 us, multiplier: 3, diag: None
My discr: 2147549186, your discr: 2148335618, state UP, D/F/P/C/A: 0/1/0/1/0
Timer Values:
Local negotiated async tx interval: 300 ms
Remote negotiated async tx interval: 300 ms

Desired echo tx interval: 0 s, local negotiated echo tx interval: 0 us


Echo detection time: 0 us(0 us*3), async detection time: 900 ms(300 ms*3)
Local Stats:
Intervals between async packets:
Tx: Number of intervals=2, min=5 ms, max=3469 ms, avg=1737 ms
Last packet transmitted 14 s ago
Rx: Number of intervals=6, min=5 ms, max=1865 ms, avg=444 ms
Last packet received 13 s ago
Intervals between echo packets:
Tx: Number of intervals=0, min=0 s, max=0 s, avg=0 s
Last packet transmitted 0 s ago
Rx: Number of intervals=0, min=0 s, max=0 s, avg=0 s
Last packet received 0 s ago
Latency of echo packets (time between tx and rx):
Number of packets: 0, min=0 us, max=0 us, avg=0 us
Session owner information:
Desired Adjusted
Client Interval Multiplier Interval Multiplier
-------------------- --------------------- ---------------------
isis-Escalation 150 ms 3 300 ms 3

H/W Offload Info:


H/W Offload capability : Y, Hosted NPU : 0/0/CPU0/NPU4
Async Offloaded : Y, Echo Offloaded : N
Async rx/tx : 7/3

Platform Info:
NPU ID: 4
Async RTC ID : 1 Echo RTC ID : 0
Async Feature Mask : 0x8 Echo Feature Mask : 0x0
https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 21/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Async Session ID : 0x0 Echo Session ID : 0x0


Async Tx Key : 0x801 Echo Tx Key : 0x0
Async Tx Stats addr : 0x205ee800 Echo Tx Stats addr : 0x0
Async Rx Stats addr : 0x215ee800 Echo Rx Stats addr : 0x0

BFD Over Bundle Member Interfaces


Back to top
20. Introduction

Implementation of various BFD avours over bundle interfaces in IOS XR was carried out in 3 phases:

1. IPv4 BFD session over individual bundle sub-interfaces. This feature was called BFD over VLAN over bundle.
2. IOS XR releases 4.0.1 and beyond: BFD Over Bundle (BoB) feature was introduced.
3. IOS XR releases 4.3.0 and beyond: full support for IPv4 and IPv6 BFD sessions over bundle interfaces and
sub-interfaces. For disambiguation from the BoB feature, this implementation is called BLB, and sessions are
often referred to as native BFD sessions over bundle interfaces and/or sub-interfaces. BFD multipath must be
enabled for any of these BFD avours to work.

Back to top
21. BFD Over VLAN Over Bundle Feature Operation

BFD Over VLAN Over Bundle refers to a static or dynamic IPv4 BFD session over bundle-ethernet sub-
interface. No other avours of BFD over bundle interfaces or sub-interfaces were supported.

From con guration and monitoring aspect this feature was identical to BFD over physical interface or sub-
interafce.

Example of a BFD over VLAN over bundle protecting a static route:

interface Bundle-Ether1.10

ipv4 address 10.0.10.1 255.255.255.0

encapsulation dot1q 10

router static

address-family ipv4 unicast

172.16.1.1/32 Bundle-Ether1.10 10.0.10.2 bfd fast-detect minimum-interval 500


multiplier 3

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 22/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Example of a BFD over VLAN over bundle session with IGP peer:

interface Bundle-Ether1.20

ipv4 address 10.0.20.1 255.255.255.0

encapsulation dot1q 10

router isis lab

net 49.0111.0111.0111.0111.00

address-family ipv4 unicast

redistribute connected

interface Bundle-Ether1.20

bfd minimum-interval 500

bfd multiplier 3

bfd fast-detect ipv4

Back to top
22. BFD Over Bundle (BoB) Feature Operation

In BFD Over Bundle (BoB) feature IPv4 BFD session runs over every active bundle member.

Bundlemgr considers BFD states, in addition to existing L1/L2 states, to determine member link usability. Bundle
member state is a function of :

1. L1 state (physical link)


2. L2 state (LACP)
3. L3 state (BFD)

BFD Agent still runs on the line card. BFD states of bundle member links are consolidated on RP.

Member links must be connected back-to-back, without any L2 switches inbetween.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 23/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Async Mode

BoB supports both async mode and echo mode. Async mode is very similar to BFD over physical interface, as
sync packets are running over each individual bundle member.

Echo Mode

Echo mode is also very similar to BFD over physical interface, with some special considerations for the TX/RX
path. One member link per line card is designated to be the Echo Active member. Echo Active member is
simultaneously sending a su cient number of Echo packets to ensure that at least one will be returned over each
active member link. BoB Echo packet header contains a discriminator eld identifying the originating rack&slot and
a sequence number which is used by the peer for hashing the Echo packets on the return path. Returned Echo
packets are punted to LC CPU only if they were originated by the local Echo Active member.

By default, BFD Over Bundle member link runs in echo mode.

L2 Encapsulation

Ethernet frames carrying BoB packets are sent with CDP destination MAC address 0100.0CCC.CCCC.

On POS bundles, only the cHDLC encapsulation is supported.

BFD Over Bundle (BoB) Con guration

Con guration for enabling/disabling BFD per member link is under bundle interface submode.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 24/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

interface Bundle-Ether1

bfd address-family ipv4 timers start 60

bfd address-family ipv4 timers nbr-unconfig 3600

bfd address-family ipv4 multiplier 3

bfd address-family ipv4 destination 1.2.3.4

bfd address-family ipv4 fast-detect

bfd address-family ipv4 minimum-interval 300

There is no need to con gure BFD in each IGP, as all users of BoB enabled bundle interface will automatically be
associated with the BFD session.

The fast-detect and destination are mandatory for bringing the session up.

The nbr-uncon g option was created to allow disabling BFD per member link without interrupting the bundle
interface.

Async mode can be forced by disabling the echo mode at following sub-modes:

global BFD con guration applies to all sessions.


bundle interface con guration applies to all member link sessions for this bundle interface.
Member link con guration applies only to member link session.

Echo packet source IP address is con gurable with same granularity.

Monitoring BFD Over Bundle (BoB)


Monitoring BoB Via CLI

In example below output BFD runs on Bundle-Ether1, with members being Gi0/0/0/2 and Gi0/0/0/3:

RP/0/RP0/CPU0:ASR9K#show bfd session

Interface Dest Addr Local det time(int*mult) State

Echo Async

----------- --------------- ---------------- ---------------- -----

Gi0/0/0/2 192.168.1.2 1350ms(450ms*3) 450ms(150ms*3) UP

Gi0/0/0/3 192.168.1.2 1350ms(450ms*3) 450ms(150ms*3) UP

BE1 192.168.1.2 n/a n/a UP

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 25/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

RP/0/RP0/CPU0:ASR9K#sh bfd count packet private detail location 0/0/CPU0

Bundle-Ether1 Recv Rx Invalid Xmit Delta

Async: 0 0 0

Echo: 0 0 0 0

GigabitEthernet0/0/0/2 Recv Rx Invalid Xmit Delta

Async: 1533 0 1528

Echo: (14976 ) 0 29952 14976

GigabitEthernet0/0/0/3 Recv Rx Invalid Xmit Delta

Async: 1533 0 1529

Echo: (14976 ) 0 0 14976


Monitoring BoB Via SNMP

Since the BFD session states are consolidated on the RP, SNMP get works only for basic CISCO-IETF-BFD-MIB
OIDs. OIDs that can be used for monitoring BoB are:

ciscoBfdSessIndex
ciscoBfdSessDiscriminator
ciscoBfdSessState
ciscoBfdSessAddrType
ciscoBfdSessAddr
ciscoBfdSessVersionNumber
ciscoBfdSessType
ciscoBfdSessInterface
coBfdSessUpTime
ciscoBfdSessPerfLastSessDownTime
ciscoBfdSessPerfSessUpCount

Back to top
23. Native BFD Over VLAN Over Bundle Interfaces And Sub-Iinterfaces (BLB)

IOS XR releases 4.3.0 has introduced full support for IPv4 and IPv6 BFD sessions over bundle interfaces and sub-
interfaces. For disambiguation from the BoB feature, this implementation is called BLB, and sessions are often
referred to as native BFD sessions over bundle interfaces and/or sub-interfaces.

BLB operation relies on BFD multipath. Hence, echo mode is not supported.

Con guring BLB

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 26/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

BFD multipath must be enabled for any of these BFD avours to work. All other con guration aspects are identical
to BFD over VLAN over bundle con guration.

bfd

multipath include location 0/1/CPU0

interface Bundle-Ether1.10

ipv4 address 10.52.61.1 255.255.255.0

encapsulation dot1q 10

router static

address-family ipv4 unicast

10.52.61.2/32 Bundle-Ether1.10 10.52.61.2 bfd fast-detect minimum-interval 900


multiplier 3

BLB QoS Considerations

As in any multipath BFD session, egress BFD packets are not injected into high priority egress queue. If user
desires to ensure that BFD packets are treated as high priority, such a QoS policy must be created and applied to
the bundle (sub)interface.

Monitoring BLB

RP/0/RSP0/CPU0:ASR9K#sh bfd session interface bundle-e1.10 detail

Fri Apr 19 12:19:34.330 UTC

I/f: Bundle-Ether1.10, Location: 0/1/CPU0 ! <------ LC CPU hosting the BFD session

Dest: 10.52.61.2

Src: 10.52.61.1

State: UP for 0d:2h:6m:58s, number of times UP: 1

Session type: SW/V4/SH/BL ! <------ BLB session

< ... >

Timer Values:

Local negotiated async tx interval: 900 ms ! <--- configured timers applied to async

Remote negotiated async tx interval: 900 ms

Desired echo tx interval: 0 s, local negotiated echo tx interval: 0 s

Echo detection time: 0 s(0 s*3), async detection time: 2700 ms(900 ms*3)

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 27/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

< ... >

MP download state: BFD_MP_DOWNLOAD_ACK ! <------ Multi-Path

State change time: Apr 19 10:12:32.593

Session owner information:

Desired Adjusted

Client Interval Multiplier Interval Multiplier

-------------------- --------------------- ---------------------

ipv4_static 900 ms 3 900 ms 3

Back to top
24. BoB-BLB Coexistence

BoB-BLB coexistence is enabled using the bundle coexistence bob-blb logical global BFD con guration
command:

bfd

multipath include location 0/1/CPU0

bundle coexistence bob-blb logical

Back to top
25. BFD Session Inheritance In BFD Over Bundle Member Implementations

Due to scaling considerations, only IPv4 BFD sessions runs over member links. Application IPv6 sessions are
inheriting the states from the IPv4 BFD session for the same bundle.

When BoB feature is enabled, BFD over VLAN over bundle sessions (i.e. sessions on bundle sub-interfaces) of
all address families are also inheriting the states from IPv4 BFD session for corresponding bundle interface.

BFD Session state


Up to IOS XR release 4.2.3 Starting with IOS XR release 4.3.0
BFD Session Type
Without BoB-BLB
With BoB Without BoB With BoB
BoB coexistence
IPv4 over bundle interface Active Dormant Active Native Active
IPv4 over bundle sub- Inherits "BFD Over VLAN Over Inherits
Native Native
interface state Bundle" state

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 28/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Inherits Inherits
IPv6 over bundle interface Dormant Native Native
state state
IPv6 over bundle sub- Inherits Inherits
Dormant Native Native
interface state state

Troubleshooting BFD
Back to top
26. BFD Session Not Coming Up

Was the session created by the application?

Use the "show bfd all session" command to see if the session has been created. If the session is not visible
using the bfd show command, check that the adjacency for which the BFD session is being created exists in
the application.

Can you ping the destination address for which the BFD session is to be created?

The BFD session will only be created by an application for which the application adjacency/neighbour exists.

Has BFD been con gured on both sides?

Has BFD been con gured with correct destination address?

Using non-default IP addresses with BFD requires special attention. The source IP address being used for BFD
sessions can be veri ed with "show bfd all session detail" command.

If the session is visible using the BFD show commands but is not UP and the destination ip address of the BFD
peer is reachable by pinging:

execute the "show bfd all session detail" command and check whether the "Local Stats" from that show
command indicate that packets are being transmitted and received?
If not, check which NP corresponds to the interface in question and whether that NP is receiving BFD packets
by running:

sh controllers np ports all location <location>

sh controllers np counters <np> location <location> | inc "Rate|BFD"

sh uidb data location <location> <interface> ingress

sh uidb data location <location> <interface> ing-extension

If the MAX-PPS LIMIT is reached BFD session will be kept in ADMIN_DOWN state. In this scenario message BFD-
6-SESSION_NO_RESOURCES will be reported in the syslog, e.g.:

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 29/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

RP/0/RP1/CPU0:Mar 13 09:51:06.556 : bfd[143]: %L2-BFD-6-SESSION_NO_RESOURCES : No


resources for session to neighbor 10.10.10.2 on interface TenGigE0/1/0/2, interval=300
ms

Is the allowed policer rate for BFD packets reached?

Run show controllers np counters <np|all> location <location> and look for BFD packet and
drop counters.

Does this BFD session require BFD multi-path?

Look for %L2-BFD-6-SESSION_NO_RESOURCES message in the syslog


Run 'show bfd session detail | inc ^(Location|MP) to con rm that a line card CPU was
designated to host the BFD session.

Back to top
27. BFD Session Going Down
Determine if there really is a connectivity issue that BFD has rightly discovered.

Run a continuous ping to local i/f address (which is used by local echo and remote async) and remote i/f
address (used by remote echo and local async) with a timeout of 1s and repeat the test.

Determine if the application adjacency has apped (for example after RSP failover), which would cause the BFD
session to be removed by the application.

Examine the "show logging | inc bfd_agent" output on the neighbour to con rm whether the session
was removed by the application.

Determine if the outgoing interface for a next-hop IP address changed (for example after APS link switch), which
would cause the BFD session to be removed by the application, followed by creation of the BFD session with new
outgoing interface.

Examine the "show logging | inc bfd_agent" output on the neighbour to con rm whether the session
was removed by the application.

If the log says "Nbor signalled down", check the logs on the peer to verify if the application has removed the
session or if the routing adj has apped.

If BFD is apping continuously because of echo failure, it can be due to:

The link is over-subscribed. Async and echo packets are sent to high priority queue by the sender but on the
remote router which is switching back the echo packets, these echo packets are regular data packets. So with
over-subscription, they can be dropped. Work-around is to add qos policy at each end to send UDP port 3785
packets to high priority queue.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 30/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

uRPF is con gured on the interface. Need self-ping and remote routerid to be reachable.
There could be timing issues where (e.g. because of SPF delay in IGPs) the remote router-id is installed in CEF
after the BFD session comes up. This also causes aps due to echo packet drops. Good practice is to
con gure BFD dampening (delay of the BFD session initialisation):

bfd

dampening secondary-wait 7500

dampening initial-wait 3000

dampening maximum-wait 180000

BFD apping due to echo failure but no echo packet loss. This is usually due to delay in the echo packets and
one of the possible causes is tra c shaping. To check whether echo packets are delayed or dropped, run
"show bfd counters packet private location <location>". If tx and rx count di er this means there's echo packet
drops. If the tx and rx are the same but the "Rx Invalid" count is non-zero, this means echo packets are being
delayed or coming back on wrong interface.
BFD apping after con guration change related to the BFD session. Clear the stale data by executing clear
bfd persistent-data unassociated location <location>.

BFD aps on a clear route.

This is expected behaviour since "clear route" command clears all FIB entries in s/w and h/w, so it is expected
that BFD will fail (since there is an expected forwarding outage). This can be con rmed by doing continuous
local and remote ping. See TRG 17921. Similar issue is when b_mgr is crashed which can cause forwarding
disruption due to shmem init

Back to top
28. Essential Information To Collect Before Contacting TAC

Collect the following on both peers terminating the BFD session:

show tech-support routing bfd file

show logging

BFD Packet Format


BFD has two versions: Version 0 and Version 1. The Di erence in Version 1 is the STA bits replacing the H bit
in Version 0.

Back to top
29. BFD V0 Control Packet

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 31/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Back to top
30. BFD V1 Control Packet

Back to top
31. Relevant Header Field
Vers: Version of BFD control header. XR runs version 1 as default, but can run version 0 as well.
Diag: A diagnostic code specifying the local system's reason for the last change in session state, detection
time expired, echo failed, etc.
Sta: The current BFD session state as seen by the transmitting system.
P: Poll bit, if set, the transmitting system is requesting veri cation of connectivity, or of a parameter change,
and is expecting a packet with the Final (F) bit in reply.
F: Final bit, if set, the transmitting system is responding to a received BFD Control packet that had the Poll (P)
bit set.
C: Set if BFD is independent of the Control plane. In Cisco implementation this bit is set.
A: - Set if Authentication used. In Cisco implementation authentication is not supported.
D: Set if Demand Mode is used.
Detect Mult: Detection time multiplier. The negotiated transmit interval, multiplied by this value, provides the
Detection Time for the transmitting system in Asynchronous mode.
My Discriminator: A unique, nonzero discriminator value generated by the transmitting system, used to
demultiplex multiple BFD sessions between the same pair of systems. Rack, Slot, Instance is encoded as
upper 16bits:

RRRR RRRR SSSS SSII XXXX XXXX XXXX XXXX

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 32/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Your Discriminator: The discriminator received from the corresponding remote system. This eld re ects back
the received value of My Discriminator, or is zero if that value is unknown.
Desired Min TX Interval: This is the minimum interval, in microseconds, that the local system would like to use
when transmitting BFD Control packets.
Desired Min RX Interval: This is the minimum interval, in microseconds, between received BFD Control
packets that this system is capable of supporting.
Required Min Echo RX Interval: This is the minimum interval, in microseconds, between received BFD Echo
packets that this system is capable of supporting.
Back to top

Version history

Revision #: 2 of 2
Last update: 11-07-2017 06:26 AM
Updated by: Aleksandar Vidakovic

View article history

Labels (1)

XR OS and Platforms

Contributors

Aleksandar Vidakovic

Everyone's tags (3)

asr9000 asr9k bfd

30 Helpful

Share

COMMENTS

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 33/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

12-09-2013 02:29
Olev Vallaste New Member

Hi Alexander!

Thanks a lot for your articles about ASR9k platform.

May be you know about multihop BFD support over pseudowires on ASR9k?

I`m trying to establish multihop BFD session between ASR9001 and ASR901 over AC PW.

On ASR901 it is possible and seems just like that:

bfd map ipv4 10.0.39.1/32 0.0.0.0/0 PW-BFD

bfd-template multi-hop PW-BFD

interval min-tx 100 min-rx 100 multiplier 3

pseudowire-class PW-BFD

encapsulation mpls

monitor peer bfd local interface Loopback0

Int G0/0

service instance 3911 ethernet

encapsulation untagged

xconnect 10.0.39.1 3911 encapsulation mpls pw-class PW-BFD

backup peer 10.0.39.2 3911 pw-class PW-BFD

mtu 1500

But in ASR 9001, 4.3.1 I cant nd something similar in con g and guides....

The BFD session need for fast switchover on standby PW when fails one of two P-router which ASR 901 connected Fast
switchover means "subsecond" resilency. I have 2 second recilency, it is too long time ).

Cisco Employee
12-09-2013 08:4
xthuijs

hey uncle! thank you! but this doc is on the courtesy of Aleks, I can't take full credit for that one

say as for your problem you need to run xr.4.3.1 at minimum for bfd over pw-he and then you may have forgotten to
de ne a service location?

bfd
multihop ttl-drop-threshold 64 -< remove this
multipath include location 0/x/CPU0

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 34/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

regards

xander

12-10-2013 12:5
Olev Vallaste New Member

Hi Xander!

This command is present in my ASR9k con g:

<code>bfd

multipath include location 0/0/CPU0</code>

And I trying simple AC-PW from l2vpn bridge-group, not PW-HE

bridge group BGP-L2VPN

bridge-domain BGP-L2VPN-PMI-KNG

mac

withdraw optimize

<b>neighbor 10.39.0.1 pw-id 3911</b>

v VFI-3910-KNG

vpn-id 3910

autodiscovery bgp

rd 10.0.39.1:3910

route-target 65100:3910

route-target import 65100:3910

route-target export 65100:3910

signaling-protocol ldp

vpls-id 65100:3910

May be just in some PW-circumstances BFD not supported on ASR9k? For example I trying connect two ASR901
by multihop BFD over pseudowire and its work ne...

regards,

Olev

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 35/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Cisco Employee
12-10-2013 02:0
Aleksandar Vidakovic

Hi Olev,

I would like to understand better the requirement. I understand correctly you would like to con gure the BFD peering in the PW
de nition, or in other words you would like the targetted LDP session to be the application that terminates the BFD session. Is my

understanding correct?

Regards,

Aleksandar

Cisco Employee
12-10-2013 06:0
xthuijs

One more thought, could it be you are running echo? pwhe would only support async.

If the problem persists, maybe for this one a tac case would be easier, because we likely need to start making some
captures and see a full con g which I undestand is not easy to share on here...

regards

xander

12-10-2013 12:0
Olev Vallaste New Member

Hi Aleksandar,

Yes, your understand is correct. If I understand you correct from my side)

I can establish such sessions (BFD and targeted LDP between two ASR901, but not between ASR9001 and
ASR901)

Xander, thanks for tip about async BFD mode.. will thinking in that direction or will open case in Cisco TAC.

Anyway, I dont nd yet where on ASR9001 it is possible to con gure, if we talk about Attachment Circuits PWs.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 36/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Cisco Employee
12-11-2013 06:0
Aleksandar Vidakovic

Hi Olev,

in today's implementation of BFD over PW HE, eBGP must terminate the BFD session:

http://www.cisco.com/en/US/docs/routers/asr9000/software/asr9k_r4.3/routing/con guration/guide/b_routing_
cg43xasr9k_chapter_011.html#concept_4E1AC21BA6D041D5ACAD2209A7D5BD79

"The Bidirectional Forwarding Detection over Pseudowire Headend (BFDoPWHE) feature enables BFD support over the customer edge

(CE) to pseudowire headend (S-PE) links for fast failure detection along the path between the eBGP neighbors."

I hope this will be a workable solution for you. If you need something more than this, please work through your
account team at Cisco to get the request evaluated.

Aleksandar

12-19-2013 02:3
Olev Vallaste New Member

Hi all!

It seem that I found how to connect ASRk and ASR901 PW.

Con g for topology:

VPLS cloud <-- >10.0.39.1 (P-router, ASR9K)

AC PW (Active)

10.39.0.1 ASR901

AC PW (Standby)

VPLS cloud <--> 10.0.39.2 (P-router, ASR9K)

ASR 901:

bfd map ipv4 10.0.39.1/32 BFD


bfd map ipv4 10.0.39.2/32 BACKUP-PW-BFD

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 37/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community
bfd-template multi-hop BACKUP-PW-BFD
interval min-tx 70 min-rx 70 multiplier 3
!
bfd-template multi-hop PW-BFD
interval min-tx 70 min-rx 70 multiplier 3

pseudowire-class PW-BFD
encapsulation mpls
monitor peer bfd local interface Loopback0
!
pseudowire-class BACKUP-PW-BFD
encapsulation mpls
monitor peer bfd local interface Loopback0

interface GigabitEthernet0/0
no ip address
negotiation auto
no keepalive
service instance 3911 ethernet
encapsulation untagged
xconnect 10.0.39.1 3911 encapsulation mpls pw-class PW-BFD
backup peer 10.0.39.2 3911 pw-class BACKUP-PW-BFD
mtu 1500
ASR9K:

bfd
multipath include location 0/0/CPU0

router bgp 65100

neighbor 10.39.0.1
use neighbor-group RAN
bfd fast-detect
bfd multiplier 3
bfd minimum-interval 70

We have bgp session between ASR901 and each ASR9k, where each ASR9k is inline RR for ASR901 in rings.
So bfd on ASR9k attaches to BGP, and BFD on ASR901 atteched to xconnect
And we see that:

ASR901#sho mpls l2transport vc 3911 detail

Local interface: Gi0/0 down, line protocol down, Ethernet:3911 down

Destination address: 10.0.39.1, VC ID: 3911, VC status: down

........

Fast failure detection (BFD): up

ASR901# sho bfd neighbors

....

IPv4 Multihop Sessions

NeighAddr[vrf] LD/RD RH/RS State

10.0.39.1 14/65537 Up Up
https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 38/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

10.0.39.2 15/65537 Up Up

ASR901#

ASR901# sho bfd neighbors multihop-ipv4 details

IPv4 Multihop Sessions

NeighAddr[vrf] LD/RD RH/RS State

10.0.39.1 14/65537 Up Up

Session state is UP and not using echo function.

Session Host: Software

OurAddr: 10.39.0.1

.............

Registered protocols: Xconnect

ASR9K#sho bfd session destination 10.39.0.1 detail

Location: 0/0/CPU0

Dest: 10.39.0.1

Src: 10.0.39.1

VRF Name/ID: default/0x60000000

State: UP for 2d:23h:31m:39s, number of times UP: 1

Session type: SW/V4/MH

....

Session owner information:

Desired Adjusted

Client Interval Multiplier Interval Multiplier

-------------------- --------------------- ---------------------

bgp-default 70 ms 3 70 ms 3

Cisco Employee
12-19-2013 03:00
Aleksandar Vidakovic

Hi Olev,

very neat! Thanks for sharing.

Please do check the detailed session stats to see how well can both systems cope with 70ms async interval. on asr9k
async packets are generated by the LC CPU. Soon we will have a possibility to o oad async packets to NP.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 39/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

regards,

Aleksandar

02-04-2014 02:12
Pavel Vrastiak New Member

Hi everyone,

can anyone help me why am I seeing this in the log?

%L2-BFD-6-ADJACENCY_DELETE : Adjacency to neighbor fe80::222:56ff:abcd:413f on interface


TenGigE0/7/0/3.70 was deleted

yet I do not see BFD session down nor IGP neighbor down.

State: UP for 0d:19h:45m:55s, number of times UP: 1


Session type: PR/V6/SH
Received parameters:
Version: 1, desired tx interval: 70 ms, required rx interval: 70 ms
Required echo rx interval: 0 us, multiplier: 3, diag: None
My discr: 68, your discr: 2149908486, state UP, D/F/P/C/A: 0/0/0/0/0
Transmitted parameters:
Version: 1, desired tx interval: 50 ms, required rx interval: 50 ms
Required echo rx interval: 0 us, multiplier: 3, diag: None
My discr: 2149908486, your discr: 68, state UP, D/F/P/C/A: 0/0/0/1/0
Timer Values:
Local negotiated async tx interval: 70 ms
Remote negotiated async tx interval: 70 ms
Desired echo tx interval: 0 s, local negotiated echo tx interval: 0 s
Echo detection time: 0 s(0 s*3), async detection time: 210 ms(70 ms*3)
Local Stats:
Intervals between async packets:
Tx: Number of intervals=100, min=62 ms, max=72 ms, avg=66 ms
Last packet transmitted 22 ms ago
Rx: Number of intervals=100, min=54 ms, max=74 ms, avg=62 ms
Last packet received 1 ms ago
Intervals between echo packets:
Tx: Number of intervals=0, min=0 s, max=0 s, avg=0 s
Last packet transmitted 0 s ago
Rx: Number of intervals=0, min=0 s, max=0 s, avg=0 s
Last packet received 0 s ago
Latency of echo packets (time between tx and rx):
Number of packets: 0, min=0 us, max=0 us, avg=0 us
Session owner information:

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 40/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Desired Adjusted
Client Interval Multiplier Interval Multiplier
-------------------- --------------------- ---------------------
ospfv3-6 50 ms 3 50 ms 3

Also, what does Session type: PR/V6/SH and SW/V6/SH/BL mean?

V6 means IPv6

BL means BLB

Paul

Cisco Employee
02-04-2014 04:52
xthuijs

Hi Pavel,

Above message means BFD deleted it's adjacency information

because AIB noticed delete of adjacency info of IPv4/IPv6.


Because this is not a bfd failure itself, the application that is
registered to it will not be informed.
So what you see is what should be expected.

cheers!
xander

Cisco Employee
04-22-2014 12:30
Arun Habbu

We've always known V4/V6 signi es a v4/v6 session, SH = Single Hop, MH = Multi Hopand BL = BLB session.Now
coming to that elusive PR/SW bit.

PR = Pre-routed session (eg: sessions bound to an interface like pos, serial, etc)

SW = Switched session (eg: BLB, BFD over TE, Multi-hop sessions)

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 41/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

03-17-2015 03:00
e.nieuwstad New Member

We are trying to establish BFD on a E-BGP neighbor betweer a ASR9K and a Juniper SRX rewall. But can't seem to get
it up and running. Should we also con gure something on the interface regarding BFD.

We don't use multihop BGP. The neighbourship is built over a L3 subinterface on a Bundle interface. Are tehre any
limitatations in this?

Cisco Employee
03-17-2015 12:37
Aleksandar Vidakovic

Hi,

to run BFD over Bundle with other vendors, please deploy the "BLB" solution explained in the document. "BoB" is
Cisco proprietary.

Regards,

Aleksandar

03-17-2015 12:57
Jon Berres New Member

Thanks for the detailed article on 9k BFD.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 42/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

I have one point I wanted to clarify, If I am trying to runBFD Over VLAN Over Bundle Sub-Iinterfaces (or BLB) this
requires multipath con guration to add each member line card under the global BFD. Also required for this is Typhoon LC
to support the multipath con guration?

If all that above is correct, what would happen if a mix of trident and typhoon LC are used for bundle members with BFD
enabled through ISIS on a sub-interface. Would this revert back to the original "non-enhanced" BFD over bundle scenario
with hellos just going across one member?

Also, of note this con guration is running on an ASR9k running 4.3.4 so that is not a limitation.

Thanks,

Jon

Cisco Employee
03-18-2015 03:22
Aleksandar Vidakovic

Hi Jon,

thank you for the feedback.

There is no automatic fallbackfrom "BLB" to "BoB". Both have to be explicitly con gured. BoB is proprietary, it will
work only if the remote end if an ASR9k or CRS.

If a bundle member is a Trident, the restriction from BFD Con guration Guideapplies: "The bfd multipath include
location node-id command is not supported on ASR 9000 Ethernet Line Card. BFD features that require the bfd
multipath include location node-id command do not work on ASR 9000 Ethernet Line Card". Trident NP wouldn't know
how to direct the received BFD async packet to a CPU on another line card.

Please check with you account team what programmes exist for Trident for Typhoon swap. That may be the best long
term solution.

Hope this helps,

Aleksandar

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 43/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

05-04-2015 06:37
chandrakirankona1 New Member

HelloAleksandar Vidakovic

thanks for the very useful information, can you please help me in understanding this issue related BFD.

i am apping the BFD session on the remote node that is connected to ASR9k and i am apping the link after it reached
the max threshold what will be outcome of the BFD session, because i am seeing 2 di erent outputs

in vrf related routes

my max BFD threhold is reached at this point 13.33.10.293 even though i am apping the BFD session i haven't seen the
BFD came up but after stopping the link ap around 16.38 i saw the BFD status as up.

LC/0/1/CPU0:Apr 20 13:32:33.886 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor


192.168.6.15 on interface TenGigE0/1/0/4.716 is up
LC/0/1/CPU0:Apr 20 13:33:10.293 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.6.15 on interface TenGigE0/1/0/4.716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 16:38:23.692 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.6.15 on interface TenGigE0/1/0/4.716 is up

where as in default vrf i am seeing this

LC/0/1/CPU0:Apr 20 13:33:10.308 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor


192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 13:41:00.982 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 13:41:02.198 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 13:52:17.535 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 13:52:18.751 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 13:54:20.477 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 13:54:21.693 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 14:04:14.693 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 14:04:15.909 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 14:07:39.855 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 44/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

LC/0/1/CPU0:Apr 20 14:08:53.816 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor


192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 14:25:46.207 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 14:25:47.423 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 14:37:23.295 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 14:42:06.259 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 15:00:17.051 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 15:00:18.267 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 15:06:46.290 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 15:06:47.506 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 15:11:33.508 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 15:11:34.724 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 15:24:32.197 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 15:24:33.413 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 15:31:42.692 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 15:31:43.908 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 15:49:28.899 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 15:49:30.115 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 15:58:42.300 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 16:01:34.566 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 16:06:54.360 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 16:06:55.576 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 16:09:38.622 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 16:09:39.838 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 16:15:06.926 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 45/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

LC/0/1/CPU0:Apr 20 16:15:08.142 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor


192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 16:26:02.933 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 16:26:04.149 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 16:33:13.528 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up
LC/0/1/CPU0:Apr 20 16:33:14.744 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_DOWN : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 has gone down. Reason: Control timer expired
LC/0/1/CPU0:Apr 20 16:38:22.177 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
192.168.2.15 on interface TenGigE0/1/0/4.1716 is up

not sure which one is the desired situation after reaching the max threshold, can you please help me with this

Cisco Employee
05-05-2015 05:44
Aleksandar Vidakovic

Hi,

I'm afraid I can't answer with the available information. You should check rst what parameters of the BFD session
were negotiated by running the "sh bfd session ... detail". Then repeat the aps andlook into the BFD traces to get
more information on the exact sequence of events. That should explain the observed behaviour. If you still need help,
please put this all into a le (together with running con g) and upload here.

Regards,

Aleksandar

Cisco Employee
05-28-2015 05:21
crdiego

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 46/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Hi Aleksandar

Thanks for the useful info here. I have one question regarding how is the behaviour when bfd and nsf are both con gures
for ospf in a 9k.

router ospf 1
log adjacency changes
vrf FZ
log adjacency changes
router-id 0.0.1.1
bfd minimum-interval 2500
bfd multiplier 5
nsf ietf
default-information originate
distance 240
capability vrf-lite
redistribute connected
area 0.0.0.1
interface Bundle-Ether10.2399
bfd fast-detect
cost 200
network broadcast
!

Since we have 2 di erent bfd processes running in RSP and LC respectively I was expecting the bfd session to stay up
during the switchover.Is it expected behaviour for the bfd session to go down/ app during the switchover if the timer
expires?

Thanks

05-28-2015 06:24
Aleksandar Vidakovic Cisco Employee

Hi,

thank you for the feedback.

Ifthe XR release in question is 4.3.x or later, this would be aBLB scenario.The BFD session is maintained on the LC
CPU, one of those that were con gured as eligible to host the BFD session. "sh bfd session detail" will con rm where
is the session hosted.RP FO should have no impact on the BFD session.

If this happens to be a cluster,we support BLB on cluster starting with 5.2.2.

Hope this helps,

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 47/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Aleksandar

07-22-2015 09:57
sajid.iftikhar1 New Member

Hi Aleksandar

Can you con rm following restrictionstill exist in 4.3.4 and above?

BFD under BGP with IPv4 over Ethernet VLAN bundle subinterfaces is not supported.

Regards,

Cisco Employee
07-23-2015 01:39
Aleksandar Vidakovic

Hi Sajid,

this is supported in 4.3.x and above because in 4.3.x we support multi-hop BFD sessions and BLB is also a multi-hop
session.

Aleksandar

09-08-2015 09:4
Xing Cheng Hou Cisco Employee

HI Sir

May I know how to lter BFD session?

When trying to use ACL to block udp 3784, but it does not work.

ipv4 access-list BFD


10 deny udp any any eq 3784
15 deny udp any any eq 3785
16 deny udp any any eq 4784

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 48/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

20 deny udp any eq 3784 any


25 deny udp any eq 3785 any
26 deny udp any eq 4784 any

30 permit ipv4 any any

Would you please share how to block bfd between two neighbor?

Cisco Employee
09-08-2015 09:5
xthuijs

An ingress ACL for this will work.

For egress it will not since BFD is injected to wire which means that all features egress are bypassed.

xander

Cisco Employee
09-08-2015 09:56
Xing Cheng Hou

Hi Eddie

yes, both Egress and Ingress. BFD neighbor will be ap after puting acl .

Can you share the con gurations about punted?

I made a punt, like following

lpts punt police location 0/0/CPU0


protocol bfd rate 0
!

but this con guration doesn't work either.

10-26-2015 09:10
kimarumansour New Member

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 49/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Hi,

Thank you for this detailed article. Perhaps I've missed this, but I am wondering if HW o oad is supported for ether-
bundles? I've disabled echo mode on the bundle interface and set interval to 300ms and enabled HW o oad for the
enhanced LC in admin mode, reloaded the LC, but it doesn't seem to be working. The bundle members are all on the
enhanced LC. Can you con rm if it is supported please?

Regards,

Kimaru

10-26-2015 04:19
Aleksandar Vidakovic Cisco Employee

Hi Kimaru,

HW o oad is applicable to physical (sub)interfaces. BoB and all multipath sessions are supported only in SW mode. If
the remote end of the bundle is also a router running IOS XR, you can take advantage of the BLB and BoB
coexistence. The echo functionality provided by BoB will help you achieve shorter fault detection times compared to
BLB alone (which runs only in async mode).

hth,

Aleksandar

Cisco Employee
11-30-2015 02:05
Dmitry Smirnov

Hello, Aleksandar
Thanks you for the clear description of BFD. I have a question about instruction multipath include location. Im going to
use the BLB con guration on backbone routers.
Will I get any impact on routers (on active Bundle-Eth interfaces with BFD) when I use multipath include location?
Now I havent this instruction on a running con guration, but I have to get BFD session with IOS platform 7600.

Thank you in advice!

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 50/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Cisco Employee
11-30-2015 02:05
Aleksandar Vidakovic

Hi Dmitry,

con guring multipath include location will not have any impact on the already established BFD sessions. If I
misunderstood your question, please do let me know.

Regards,

Aleksandar

11-30-2015 02:2
Dmitry Smirnov Cisco Employee

Thanks Aleksandar, thats right, my question was about impact on the active BFD sessions.

Cisco Employee
11-30-2015 02:4
Aleksandar Vidakovic

hi Dmitry,

it just occurred to me: do you have BoB currently running on any bundle interfaces? If yes, it would be the best to
con rm the behaviour in the lab before deploying. You would have to enable BLB and BoB coexistence, which may
ap the BoB.

All the single-hop BFD sessions are always hosted on the local LC CPU. Con guring multipath include location
doesn't change the allocation of single-hop sessions.

Regards,

Aleksandar

11-30-2015 05:5
Dmitry Smirnov Cisco Employee

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 51/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

You are right. Now I have four interfaces BE to other backbone routers. These routers are asr9k and I have only
BOB on these interfaces:

interface Bundle-Ether1
bfd address-family ipv4 destination 1.1.1.2
bfd address-family ipv4 fast-detect
ipv4 address 1.1.1.1 255.255.255.252
!
router ospf 1
area 0
interface Bundle-Ether1
bfd fast-detect

I will have to make new BFD session from this asr9k to 7600 router (OSPF will be client of BFD), so in my opinion
theres only one variant BLB. After this changings, the con guration of backbone router will have two variant types
of BFD sessions: BOB and BLB. The BOB and BLB will be on the same LC (0/6/0) and Im going to use this LC for a
hosting of BLB. I plane use this template to make BFD between asr9k and 7600.

Asr9k:

bfd
multipath include location 0/6/CPU0
echo disable

interface Bundle-Ether1
ipv4 address 1.1.1.1 255.255.255.252

router ospf 1
area 0
interface Bundle-Ether1
bfd minimum-interval 750
bfd fast-detect
bfd multiplier 3

7600:

interface Port-channel1
ipv4 address 1.1.1.2 255.255.255.252
bfd interval 750 min_rx 750 multiplier 3
no bfd echo
!
router ospf 1
bfd all-interfaces

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 52/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

11-30-2015 07:5
Aleksandar Vidakovic Cisco Employee

hi Dmitry,

the template con g for BFD between asr9k and c7600 should work.

The existing BoB sessions shouldn't ap because BoB sessions are not converted to multi-hop. If both are
con gured, BoB takes precedence (BLB inherits state from BoB if the next-hop interface happens to be the bundle
on which BoB is running).

Regards,

Aleksandar

12-02-2015 03:4
Dmitry Smirnov Cisco Employee

Hi Aleksandar, could you check my understanding about choosing LC for hosting of MP BFD sessions?
1. LC must be Typhoon;
2. If an interface Bundle 012 includes ports of LCs slots 0,1,2. I must con gure bfd multipath include location for each LCs slots 0,1,2;
3. I cant use only one LC slot 3 for hosting MP BFD session that has to work over Bundle 012 (that consists of ports LCs slots 0,1,2).
Thanks a lot!

Cisco Employee
12-02-2015 03:5
Aleksandar Vidakovic

hi Dmitry,

the LC hosting the MP BFD session must be Typhoon, that's correct. The line card that hosts the MP BFD session
doesn't have to be the one where the transport interface towards BFD peer is located. You can use slot 3 to host
the MP BFD session even if the bundle members are on other line cards.

Regards,

Aleksandar

PS. If you happen to have a cluster, you need XR release 5.2.2 or later to have MP BFD.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 53/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Cisco Employee
12-02-2015 04:0
Dmitry Smirnov

Thanks a lot for useful infomation!

12-04-2015 02:1
Dmitry Smirnov Cisco Employee

Hi, Aleksandar. I would like to share the information about my completed work. I added these instructions:

bfd
multipath include location 0/6/CPU0
multipath include location 0/7/CPU0
bundle coexistence bob-blb logical

There wasnt any impact on active BFD session (there were only BOB). Now I have (all session BOB/BLB has state UP):

sh bfd summary
Node All PPS usage MP PPS usage Session number
% Used Max % Used Max Total MP Max
---------- --------------- --------------- ------------------
0/0/CPU0 0 148 28000 0 0 9600 1 0 8000
0/1/CPU0 0 148 28000 0 0 9600 1 0 8000
0/2/CPU0 0 155 28000 0 0 9600 2 0 8000
0/6/CPU0 0 195 28000 0 0 9600 8 0 8000
0/7/CPU0 0 6 28000 0 6 9600 1 1 8000
In addition, I made explicit con guration for coexistence bob-blb. I think it may guard from switching on the inherit mode. If somebody switch on the
inherit mode, so BLB session change to down status, because there isnt BOB session to support BLB session.
Thanks, Dmitry

12-04-2015 03:3
Aleksandar Vidakovic Cisco Employee

hi Dmitry,

thank you for shairng the nal outcome!

Your observation about the BLB-BoB coexistence is correct.

Regards,

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 54/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Aleksandar

Cisco Employee
01-03-2016 04:24
deleung

Section 18 "QOS Considerations In A Multi-Hop BFD Session" has ACL matching on UDP port 3784.

BFD multi-hop uses port 4784.

Section 5 of BFD Multi-hop RFC.

http://www.faqs.org/rfcs/rfc5883.html

The encapsulation of BFD Control packets for multihop application in


IPv4 and IPv6 is identical to that defined in [BFD-1HOP], except that
the UDP destination port MUST have a value of 4784. This can aid in
the demultiplexing and internal routing of incoming BFD packets.

01-08-2016 12:42
y New Member

Does BFD support process interface status, it means BFD can directly a tect interface status, for example, if BFD detect
down event, it change interface status to bfd down status?

Cisco Employee
01-08-2016 02:02
Eddie Chami

Yes bfd is in sync with interface manager and will bring down sessions when the intf status goes to down. Try it, pull a
ber or shut an interface down.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 55/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

01-11-2016 06:3
y New Member

thank you!

no, i mean if bfd sesson down and then can direct interface status change to some kind of bfd down status. if you
show interface you can nd interface status is bfd down status.

because i saw other inventor support this feature.

01-22-2016 06:03
mduchemin New Member

Hello Aleksandar,

Great document. One thing I am not able to nd in it is the default DSCP / ToS / IP Precedence marking applied to the
di erent BFD packet type. I have read elsewhere CS6?

Would that be the case on ASR1K too ?

And can we change the default marking on the device creating the packet using the usual policy-map mechanism at the
interface level?

Would that be the case on ASR1K too ?

Topology is multiple ASR1K connected to an ASR9K through a L2 network where congestion can occur. During
congestion, BFD aps, bringing down routing adjacencies.

01-27-2016 02:48
Aleksandar Vidakovic Cisco Employee

hi,

sorry for the delay. I'm glad you liked the document.

BFD packets are generated with IP Precedence 6 in IOS and IOS-XR.

You can't apply egress marking because BFD packets are injected as high priority, meaning they bypass egress ACL
and egress QoS. You could change the marking of received BFD packets using a policy map, but I think you were
referring to egress direction.

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 56/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

To prevent IGP peering to drop due to intermittent BFD drops, you may want to consider bfd dampening.

Regards,

Aleksandar

02-02-2016 02:3
mduchemin New Member

Hi Aleksandar,

Thanks for taking the time to replying and for the explanation.

We are actually running BGP and so BGP is apping in that setup. We have tried implementing BFD dampening (and
BGP fall-over bfd) but it is not working for us (or we are just misunderstanding the feature ;) ).

When BFD aps, the ASR1K brings down the BGP session but then brings it back up and advertise routes to the
neighbor even though the neighbor is dampened as far as BFD is concerned.

Thanks

Mat

Cisco Employee
02-02-2016 05:2
Aleksandar Vidakovic

hi Mat,

Did the asr9k also declare the BFD session down? Or only the asr1k?

It's been a long time since I did any troubleshooting on asr1k, but I'm sure IOS XE must have some tracing facility
akin to 'show bfd trace location ...' on IOS XR platforms. If asr1k supports BFD dampening, the traces should give a
clue as to why the session went down. Can you look for that kind of info?

Regards,

Aleksandar

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 57/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

02-03-2016 06:21
Marco Lolischkies New Member

Hi,

i have problem with apping BFD session on a bundle-interface. have the following con g.

###

bfd
multipath include location 0/0/CPU0
multipath include location 0/1/CPU0
bundle coexistence bob-blb logical
!
router isis TEST
interface bundle-ether 105
bfd minimum-interval 20
bfd multiplier 3
bfd fast-detect ipv4
bfd fast-detect ipv6
!

RP/0/RSP1/CPU0:Feb 3 15:12:45.823 : isis[1006]: %ROUTING-ISIS-5-ADJCHANGE : Adjacency to x-x-x-x (Bundle-


Ether105) (L2) Down, BFD session DOWN
LC/0/1/CPU0:Feb 3 15:12:45.825 : bfd_agent[125]: %L2-BFD-6-SESSION_REMOVED : BFD session to neighbor 1.1.1.1
on interface Bundle-Ether105 has been removed
RP/0/RSP1/CPU0:Feb 3 15:12:50.325 : isis[1006]: %ROUTING-ISIS-5-ADJCHANGE : Adjacency to x-x-x-x (Bundle-
Ether105) (L2) Up, New adjacency
LC/0/1/CPU0:Feb 3 15:12:52.608 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
1.1.1.1 on interface Bundle-Ether105 is up
LC/0/2/CPU0:Feb 3 15:12:55.293 : bfd_agent[125]: %L2-BFD-6-SESSION_STATE_UP : BFD session to neighbor
fe80::b615:1111:1111:1111 on interface Bundle-Ether105 is up

sh bfd counters packet private interface bundle-ether 105


Wed Feb 3 15:16:27.356 CET
Bundle-Ether105 Recv Rx Invalid Xmit Delta
Async: 10179863 15190 12910224
Echo: 0 0 0 0

sh bfd session interface bundle-ether 105


Wed Feb 3 15:16:51.777 CET
Interface Dest Addr Local det time(int*mult) State
Echo Async H/W NPU
------------------- --------------- ---------------- ---------------- ----------
BE105 1.1.1.1 0s(0s*0) 60ms(20ms*3) UP
No n/a

###

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 58/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

Problem is not clear to me, because ap are only happening every one or two hours. there are some interface that are
working with same con g, some interface are not. i'm using typhoon linecard and version 5.1.2. I also had not that
aggressive timers, but it's still the same problem.

regards

02-03-2016 07:54
Aleksandar Vidakovic Cisco Employee

hi Marco,

on BoB we support 50ms interval, with multiplier 3.

Please refer to this CCO doc:

http://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k_r5-
3/routing/con guration/guide/b_routing_cg53xasr9k/b_routing_cg53xasr9k_chapter_0100.html#ID1712

Does the session still ap after increasing the interval?

regards,

Aleksandar

02-03-2016 11:1
Marco Lolischkies New Member

Hi Aleksander,

yes, we have that problem also when con guring 50ms. I also tried QoS, but when i understand it correctly, BFD
packets were sent into prio level 1 by default.

that bundle in my example is is bundle-ether with only one interface, sound strange, but we use it cause future
extensions are more easy. on the other hand, we have the sameproblem also on physical interfaces.

we also have one bundle with 6x10G between two ASR9k running some software and apping BFD session. From
my understanding all six interface must have a problem in that case, because the BFD packet are sent over all six
interface in parallel. Also those routers are connected only with patch cable (no leased line or DWDM), i would
assume that not all six interface can have a problem at the same time.

regards

Marco

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 59/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

02-04-2016 06:0
Aleksandar Vidakovic Cisco Employee

hi Marco,

that doesn't sound right. To look into this further I would have to look into the BFD session details and traces to
gure out what's going on. For that type of interaction I hope you won't mind if I asked you to open a TAC service
request.

Regards,

Aleksandar

Previous 1 2 Next

Top Tags VIEW ALL

ios-xr asr9000 asr9k mpls con guration vds-tc bng troubleshoot troubleshooting xr webcast crs

ios_xr pgw2200 dcm te upgrade cgn crs-1 crs-3 iox live_webcast ospf sce vpn bgp cgnat

cgv6 cmts l3vpn

Top


Facebook
Twitter
+
Google
YouTube
LinkedIn
Instagram
Contacts Privacy Statement
Feedback Cookie Policy
Site Map Trademarks
Terms & Conditions Help

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 60/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 61/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 62/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 63/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 64/65
3/12/2017 BFD Support on Cisco ASR9000 - Cisco Support Community

https://supportforums.cisco.com/t5/service-providers-documents/bfd-support-on-cisco-asr9000/ta-p/3153191 65/65

Anda mungkin juga menyukai