Professional Documents
Culture Documents
BFD
Version 3.0
260-668256-010
Copyright & Terms of Use
July 2015
This documentation incorporates features and functions provided with CTR 8540 and CTR 8300 for software
release 3.0
Copyright © 2015 by Aviat Networks, Inc.
All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a
retrieval system, or translated into any language or computer language, in any form or by any means, elec-
tronic, magnetic, optical, chemical, manual or otherwise, without the prior written permission of Aviat Net-
works Inc. To request permission, contact techpubs@aviatnet.com.
Warranty
Aviat Networks makes no representation or warranties with respect to the contents hereof and specifically dis-
claims any implied warranties or merchantability or fitness for any particular purpose. Further, Aviat Net-
works reserves the right to revise this publication and to make changes from time to time in the content
hereof without obligation of Aviat Networks to notify any person of such revision or changes.
Safety Recommendations
The following safety recommendations must be considered to avoid injuries to persons and/or damage to the
equipment:
1. Installation and Service Personnel: Installation and service must be carried out by authorized personnel who
have the technical training and experience necessary to be aware of any hazardous operations during install-
ation and service, and of measures to avoid any danger to themselves, to any other personnel, and to the equip-
ment.
2. Access to the Equipment: Access to the equipment in use must be restricted to service personnel only.
3. Safety Norms: Recommended safety norms are detailed in the Health and Safety sections of this guide.
Local safety regulations must be used if mandatory. Safety instructions in this guide should be used in addi-
tion to the local safety regulations. In the case of conflict between safety instructions stated in this guide and
those indicated in local regulations, mandatory local norms will prevail. Should local regulations not be man-
datory, then the safety norms in this guide will prevail.
4. Service Personnel Skill: Service personnel must have received adequate technical training on tele-
communications and in particular on the equipment this guide refers to.
Trademarks
All trademarks are the property of their respective owners.
End User License Agreement and Open Source
By using this product you agree to the terms of the CTR 8540 End User License Agreement; to view this, log
into a CTR 8540 or CTR 8300 using the CLI command window and enter the CLI command “show EULA”.
The CTR 8540 and CTR 8300 use free and open source software components, which can be viewed by using
the CLI command “show system acknowledgments”. This command also details the licenses associated with
each component and describes the methods available to acquire the open source software.
II AVIAT NETWORKS
LA CONFIGURATION CTR 8300 AND 8500
WEEE Directive
In accordance with the WEEE Directive (2002/96/EC), CTR 8540, CTR 8312, and CTR 8311 are marked with the
following symbol:
This symbol indicates that this equipment should be collected separately for the purposes of recovery and/or
recycling.
For information about collection and recycling of Aviat Networks equipment please contact your local Aviat
Networks sales office. If you purchased your product via a distributor please contact the distributor for inform-
ation regarding collection and recovery/recycling.
More information on the WEEE Directive is available at our website:
http://www.aviatnetworks.com/products/compliance/weee/.
(WEEE is the acronym for Waste Electrical and Electronic Equipment)
RoHS Directive
CTR 8540, CTR 8312, and CTR 8311 meet the requirements of ROHS directive 2011/65/EU.
IV AVIAT NETWORKS
LA CONFIGURATION CTR 8300 AND 8500
The CTR 8540, CTR 8312, or CTR 8311 with an ODU 600, ODU 600sp, or ODU 300hp radio is classified under the
R&TTE Directive 99/5/EC as a class 2.8 radio (microwave fixed link) product.
Point-to-point radio relay equipment is intended to be used for:
- Interconnecting private and public networks.
- Interconnecting mobile base stations back to the PSTN point of presence (POP).
For details of where the equipment is intended to be used, see the country matrix below.
- AVIAT NETWORKS intends to market this equipment where a cross (X) is shown in the table below.
- The information contained in this table has been gathered from the relevant government authorities and
relates only to European countries participating in the R&TTE directive.
It s h ou l d b e n oted th at a l i c en s e to op er ate th i s eq u i p men t i s l i kel y to b e n ec es s ar y, an d
th e ap p r op r i ate r eg u l ator y ad mi n i s tr ati on s h ou l d b e c on tac ted .
VI AVIAT NETWORKS
LA CONFIGURATION CTR 8300 AND 8500
Acronyms
Acronyms
Acronym Explanation
BFD Bi-directional Forwarding Detection
CC Continuity Check
CV Connection Verification
FRR Fast-Re-Route
GACH Generic Associated Channel Header
GAL Generalized Alert Label
LER Label Edge Router
LSP Label Switched Path
LSR Label Switch Router
ME Maintenance Entity
MEG Maintenance Entity Group
MEP Maintenance Entity Group End Point
MIP Maintenance Entity Group Intermediate Point
MPLS-OAM MPLS Operations, Administration and Maintenance
MPLS-TP MPLS Transport Profile
References
1. RFC 5654 – Requirements of an MPLS Transport Profile
2. draft-ietf-mpls-tp-framework-12 – A framework for MPLS in Transport Networks
3. draft-ietf-mpls-tp-oam-framework-06 – MPLS-TP OAM Framework
4. draft-ietf-mpls-tp-framework-12 – A Framework for MPLS in Transport Network
5. rfc5586 - G-ACh and GAL
6. RFC 5881 - BFD for IPv4 and IPv6 (Single Hop)
7. RFC 5880 - Generic Application of Bidirectional Forwarding
8. RFC 5883 - BFD for Multihop Paths
9. RFC 5885 - Bidirectional Forwarding Detection (BFD) for the Pseudowire Virtual
Circuit Connectivity Verification (VCCV)
10. PICS document for Aviat Networks BFD
Document Conventions
Table 1-1. Conventions Used in this Document
Convention Usage
Code text CLI (Command Line Interface) Com-
mands
Code Italics User Inputs to Command
Blue code CLI Command output
General Configurations
VIII AVIAT NETWORKS
LA CONFIGURATION CTR 8300 AND 8500
The Aviat Networks BFD is configurable and managed by CLI anterfaces. This section describes
the preliminary configurations of Aviat Networks BFD.
mode.
Default Configurations
Table 1-3. Default Configurations
Parameter Default Setting
BFD Administrative System Control Status start
BFD Global Operational Mode Asynchronous Mode without Echo func-
tion.
BFD Global Minimum Tranmit Interval 1 second
BFD Global Minimum Reception Interval 1 second
BFD Global Detection Time Multiplier 3 seconds
BFD Global Slow Transmaosion Interval 1 second
BFD Session Role Active
BFD Session Mode CC (Continuity Check)
BFD Session Timer Negotiation Enabled
BFD Session Offloading Disabled
BFD Trap Notifications Session UP and DOWN notifications
enabled
BFD Session Admin Status Enabled
BFD Version Number BFD Version 1 (RFC5880)
BFD Session State DOWN
BFD Demand Mode Disabled
BFD Control Plane Independency Disabled
BFD Generalized TTL Security Mechanism Disabled
(GTSM)
BFD Session Authentication Disabled
X AVIAT NETWORKS
LA CONFIGURATION CTR 8300 AND 8500
Protocol Description
Aviat Networks BFD implements the Bi-directional Forwarding Detection described in the RFC
5880. BFD is a detection protocol designed to provide fast forwarding-path failure detection
times for media types, encapsulations, topologies and routing protocols. BFD can be used to
detect forwarding path failures at a uniform rate, rather than the variable rates for different pro-
tocol hello mechanisms.
BFD makes network profiling and planning easier and reconvergence time consistent and pre-
dictable. BFD provides subsecond failure detection between two adjacent devices and can be less
CPU-intensive than protocol hello messages because some of the BFD load can be distributed
onto the data plane on supported modules.
Aviat Networks BFD supports path monitoring for the following protocols:
l Static IPv4
l BGP
l OSPF
l MPLS
BFD Configurations
The Aviat Networks BFD software has been designed in accordance with the FSAP2 (Flexible
Software Architecture for Portability) to ensure a high level of portability
This section describes the configuration of the following Aviat Networks BFD features using CLI
interfaces.
l Configuring BFD over Static IPv4 path
l Configuring BFD over OSPF
l Configuring BFD over BGP
Preliminary Configurations
This section describes the preliminary configurations and the configurations for the topologies
of Aviat Networks BFD. Configuration of Aviat Networks BFD feature is done by accessing the
Global configuration mode or the Interface configuration mode. The configuration steps
described in this document begin with accessing one or both of these modes. The following
points are part of the preliminary configurations.
XV AVIAT NETWORKS
LA CONFIGURATION CTR 8300 AND 8500
CLI Configurations
AOS can be configured with BFD over both singlehop and multihop static IP path.
Execute the following commands at R1:
Adding a static route at R1 to reach R3 via R2
aos# configure terminal
aos(config)# ip route 30.0.0.0 255.0.0.0
20.0.0.2
aos(config)# exit
aos#
Configuring BFD Session:
aos# configure terminal
aos(config)# bfd session 1
aos(config-bfdsess)# bfd ipv4 20.0.0.2 vlan 2
aos(config-bfdsess)# bfd enable
aos(config-bfdsess)# end
aos# configure terminal
aos(config)# bfd session 2
aos(config-bfdsess)# bfd enable
aos(config-bfdsess)# end
Execute the following commands at R2:
Configuring BFD session:
aos# configure terminal
aos(config)# bfd session 1
aos(config-bfdsess)# bfd ipv4 20.0.0.1 vlan 2
aos(config-bfdsess)# bfd enable
aos(config-bfdsess)# end
aos# configure terminal
aos(config)# bfd session 2
aos(config-bfdsess)# bfd enable
aos(config-bfdsess)# end
Execute the following commands at R3:
Switch default
Session Index:2
Session Status : enabled, Session Admin Status :
start
Version:1, desired tx interval:1s , required rx
interval:1s
Multiplier:3, diag:0, My discr:2, your discr:2,
state UP, D/C/M/A:0/0/0/0
Role: Active, Sess Mode: CC, Exp: 0
Switch default
Session Index:2
Session Status : enabled, Session Admin Status :
start
Version:1, desired tx interval:1s , required rx
interval:1s
Multiplier:3, diag:0, My discr:2, your discr:2,
state DOWN, D/C/M/A:0/0/0/0
Role: Active, Sess Mode: CC, Exp: 0
Oper Mode:Asynchronous Without Echo Function
Sess Type: Single hop
Timer Negotiation:Enabled
Local negotiated async tx interval:1s , Negotiated
Detect Multiplier:3
Dest UDP port: 0, Src UDP port: 0
Remote Heard Flag: True
Authentication : disabled, Authentication
Type:None
Authentication Key:None
Authentication Key ID:None
Offload:Disabled, Card Number:0, Slot Number:0
Admin Ctrl Required:Disabled,Admin Ctrl Err
Reason:None
CLI Configurations
BFD can be used to monitor the IP path between OSPFv2 neighbors.
Execute the following commands at R1:
Configuring OSPF router
aos# configure terminal
aos(config)# router ospf
Session Index:1
Session Status : enabled, Session Admin Status :
start
Version:1, desired tx interval:1s , required rx
interval:1s
Multiplier:3, diag:1, My discr:1, your discr:0,
state DOWN, D/C/M/A:0/0/0/0
Role: Active, Sess Mode: CC, Exp: 0
Oper Mode:Asynchronous Without Echo Function
Sess Type: Single hop
Timer Negotiation:Enabled
Local negotiated async tx interval:0s, Negotiated
Detect Multiplier:0
Dest UDP port: 0, Src UDP port: 0
Remote Heard Flag: False
Authentication : disabled, Authentication
Type:None
Authentication Key:None
Authentication Key ID:None
Offload:Disabled, Card Number:0, Slot Number:0
Src Ip Addr:20.0.0.1, Dest Ip Addr:20.0.0.2
Registered Protocols: OSPF
Admin Ctrl Required:Disabled,Admin Ctrl Err
Reason:None
CLI Configuration
Execute the following commands to configure BGP routing.
Configuring BGP neighbor in R1 and enabling BFD for it
aos# configure terminal
aos(config)# router bgp 100
aos(config-router)# neighbor 20.0.0.2 remote-as
200
View the output using the show command mentioned below at R2;
aos# show ip bgp neighbor
Context Name : default
------------