This document describes how to enable the Bidirectional Forwarding Detection (BFD) protocol. BFD is a
detection protocol that is designed to provide fast forwarding path failure detection times for all media types,
encapsulations, topologies, and routing protocols.
BFD provides a consistent failure detection method for network administrators, in addition to fast forwarding
path failure detection. Because the network administrator can use BFD to detect forwarding path failures at
a uniform rate, rather than the variable rates for different routing protocol hello mechanisms, network profiling
and planning will be easier, and reconvergence time will be consistent and predictable.
Finding Feature Information
CHAPTER 1
Your software release may not support all the features documented in this module. For the latest caveats and
feature information, see Bug Search Tool and the release notes for your platform and software release. To
find information about the features documented in this module, and to see a list of the releases in which each
feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not
required.
Prerequisites for Bidirectional Forwarding Detection
Cisco Express Forwarding and IP routing must be enabled on all participating switches.
•
One of the IP routing protocols supported by BFD must be configured on the switches before BFD is
•
deployed. You should implement fast convergence for the routing protocol that you are using. See the
IP routing documentation for your version of Cisco IOS software for information on configuring fast
convergence. See the Restrictions for Bidirectional Forwarding Detection section for more information
on BFD routing protocol support in Cisco IOS software.
Restrictions for Bidirectional Forwarding Detection
Restrictions for Bidirectional Forwarding Detection
BFD works only for directly connected neighbors. BFD neighbors must be no more than one IP hop
•
away. Multihop configurations are not supported.
BFD support is not available for all platforms and interfaces. To confirm BFD support for a specific
•
platform or interface and obtain the most accurate platform and hardware restrictions, see the Cisco IOS
software release notes for your software version.
BFD packets are not matched in the QoS policy for self-generated packets.
•
BFD packets are matched in the class class-default command. So, the user must make sure of the
•
availability of appropriate bandwidth to prevent dropping of BFD packets due to oversubscription.
BFD HA support is not available starting Cisco Denali IOS XE 16.3.1
•
Information About Bidirectional Forwarding Detection
BFD Operation
BFD provides a low-overhead, short-duration method of detecting failures in the forwarding path between
two adjacent routers, including the interfaces, data links, and forwarding planes.
BFD is a detection protocol that you enable at the interface and routing protocol levels. Cisco supports BFD
asynchronous mode, which depends on the sending of BFD control packets between two systems to activate
and maintain BFD neighbor sessions between routers. Therefore, in order for a BFD session to be created,
you must configure BFD on both systems (or BFD peers). Once BFD has been enabled on the interfaces and
at the router level for the appropriate routing protocols, a BFD session is created, BFD timers are negotiated,
and the BFD peers will begin to send BFD control packets to each other at the negotiated interval.
Neighbor Relationships
BFD provides fast BFD peer failure detection times independently of all media types, encapsulations, topologies,
and routing protocols BGP, EIGRP, IS-IS, and OSPF. By sending rapid failure detection notices to the routing
protocols in the local router to initiate the routing table recalculation process, BFD contributes to greatly
reduced overall network convergence time. The figure below shows a simple network with two routers running
OSPF and BFD. When OSPF discovers a neighbor (1) it sends a request to the local BFD process to initiate
a BFD neighbor session with the OSPF neighbor router (2). The BFD neighbor session with the OSPF neighbor
router is established (3).
The figure below shows what happens when a failure occurs in the network (1). The BFD neighbor session
with the OSPF neighbor router is torn down (2). BFD notifies the local OSPF process that the BFD neighbor
is no longer reachable (3). The local OSPF process tears down the OSPF neighbor relationship (4). If an
alternative path is available, the routers will immediately start converging on it.
A routing protocol needs to register with BFD for every neighbor it acquires. Once a neighbor is registered,
BFD initiates a session with the neighbor if a session does not already exist.
OSPF registers with BFD when:
A neighbor finite state machine (FSM) transitions to full state.
•
Information About Bidirectional Forwarding Detection
Both OSPF BFD and BFD are enabled.
•
On broadcast interfaces, OSPF establishes a BFD session only with the designated router (DR) and backup
designated router (BDR), but not between any two routers in DROTHER state.
BFD Detection of Failures
Once a BFD session has been established and timer negations are complete, BFD peers send BFD control
packets that act in the same manner as an IGP hello protocol to detect liveliness, except at a more accelerated
rate. The following information should be noted:
BFD is a forwarding path failure detection protocol. BFD detects a failure, but the routing protocol must
•
take action to bypass a failed peer.
Starting Cisco IOS XE Denali 16.3.1, Cisco devices will support BFD version 0, where devices will use
•
one BFD session for multiple client protocols in the implementation. For example, if a network is running
OSPF and EIGRP across the same link to the same peer, only one BFD session will be established, and
BFD will share session information with both routing protocols.
BFD Version Interoperability
All BFD sessions come up as Version 1 by default and will be interoperable with Version 0. The system
automatically performs BFD version detection, and BFD sessions between neighbors will run in the highest
common BFD version between neighbors. For example, if one BFD neighbor is running BFD Version 0 and
the other BFD neighbor is running Version 1, the session will run BFD Version 0. The output from the showbfd neighbors [details] command will verify which BFD version a BFD neighbor is running.
See the Example Configuring BFD in an EIGRP Network with Echo Mode Enabled by Default for an example
of BFD version detection.
Information About Bidirectional Forwarding Detection
BFD Session Limits
Starting Cisco IOS XE Denali 16.3.1, the number of BFD sessions that can be created has been increased to
100.
BFD Support for Nonbroadcast Media Interfaces
Starting Cisco IOS XE Denali 16.3.1, the BFD feature is supported on routed, SVI and L3 portchannels.
The bfd interval command must be configured on the interface to initiate BFD monitoring.
BFD Support for Nonstop Forwarding with Stateful Switchover
Typically, when a networking device restarts, all routing peers of that device detect that the device went down
and then came back up. This transition results in a routing flap, which could spread across multiple routing
domains. Routing flaps caused by routing restarts create routing instabilities, which are detrimental to the
overall network performance. Nonstop forwarding (NSF) helps to suppress routing flaps in devices that are
enabled with stateful switchover (SSO), thereby reducing network instability.
NSF allows for the forwarding of data packets to continue along known routes while the routing protocol
information is being restored after a switchover. With NSF, peer networking devices do not experience routing
flaps. Data traffic is forwarded through intelligent line cards or dual forwarding processors while the standby
RP assumes control from the failed active RP during a switchover. The ability of line cards and forwarding
processors to remain up through a switchover and to be kept current with the Forwarding Information Base
(FIB) on the active RP is key to NSF operation.
In devices that support dual RPs, SSO establishes one of the RPs as the active processor; the other RP is
designated as the standby processor, and then synchronizes information between them. A switchover from
the active to the standby processor occurs when the active RP fails, when it is removed from the networking
device, or when it is manually taken down for maintenance.
Configuring Bidirectional Forwarding Detection
BFD Support for Stateful Switchover
The BFD protocol provides short-duration detection of failures in the path between adjacent forwarding
engines. In network deployments that use dual RP routers or switches (to provide redundancy), the routers
have a graceful restart mechanism that protects the forwarding state during a switchover between the active
RP and the standby RP.
The dual RPs have variable switchover times that depend on the ability of the hardware to detect a
communication failure. When BFD is running on the RP, some platforms are not able to detect a switchover
before the BFD protocol times out; these platforms are referred to as slow switchover platforms.
BFD Support for Static Routing
Unlike dynamic routing protocols, such as OSPF and BGP, static routing has no method of peer discovery.
Therefore, when BFD is configured, the reachability of the gateway is completely dependent on the state of
the BFD session to the specified neighbor. Unless the BFD session is up, the gateway for the static route is
considered unreachable, and therefore the affected routes will not be installed in the appropriate Routing
Information Base (RIB).
For a BFD session to be successfully established, BFD must be configured on the interface on the peer and
there must be a BFD client registered on the peer for the address of the BFD neighbor. When an interface is
used by dynamic routing protocols, the latter requirement is usually met by configuring the routing protocol
instances on each neighbor for BFD. When an interface is used exclusively for static routing, this requirement
must be met by configuring static routes on the peers.
If a BFD configuration is removed from the remote peer while the BFD session is in the up state, the updated
state of the BFD session is not signaled to IPv4 static. This will cause the static route to remain in the RIB.
The only workaround is to remove the IPv4 static BFD neighbor configuration so that the static route no
longer tracks BFD session state. Also, if you change the encapsulation type on a serial interface to one that
is unsupported by BFD, BFD will be in a down state on that interface. The workaround is to shut down the
interface, change to a supported encapsulation type, and then reconfigure BFD.
A single BFD session can be used by an IPv4 static client to track the reachability of next hops through a
specific interface. You can assign a BFD group for a set of BFD-tracked static routes. Each group must have
one active static BFD configuration, one or more passive BFD configurations, and the corresponding static
routes to be BFD-tracked. Nongroup entries are BFD-tracked static routes for which a BFD group is not
assigned. A BFD group must accommodate static BFD configurations that can be part of different VRFs.
Effectively, the passive static BFD configurations need not be in the same VRF as that of the active
configuration.
For each BFD group, there can be only one active static BFD session. You can configure the active BFD
session by adding a static BFD configuration and a corresponding static route that uses the BFD configuration.
The BFD session in a group is created only when there is an active static BFD configuration and the static
route that uses the static BFD configuration. When the active static BFD configuration or the active static
route is removed from a BFD group, all the passive static routes are withdrawn from the RIB. Effectively, all
the passive static routes are inactive until an active static BFD configuration and a static route to be tracked
by the active BFD session are configured in the group.
Similarly, for each BFD group, there can be one or more passive static BFD configurations and their
corresponding static routes to be BFD-tracked. Passive static session routes take effect only when the active
BFD session state is reachable. Though the active BFD session state of the group is reachable, the passive
static route is added to the RIB only if the corresponding interface state is up. When a passive BFD session
is removed from a group, it will not affect the active BFD session if one existed, or the BFD group reachability
status.
Information About Bidirectional Forwarding Detection
Benefits of Using BFD for Failure Detection
When you deploy any feature, it is important to consider all the alternatives and be aware of any trade-offs
being made.
The closest alternative to BFD in conventional EIGRP, IS-IS, and OSPF deployments is the use of modified
failure detection mechanisms for EIGRP, IS-IS, and OSPF routing protocols.
If you set EIGRP hello and hold timers to their absolute minimums, the failure detection rate for EIGRP falls
to within a one- to two-second range.
If you use fast hellos for either IS-IS or OSPF, these Interior Gateway Protocol (IGP) protocols reduce their
failure detection mechanisms to a minimum of one second.
There are several advantages to implementing BFD over reduced timer mechanisms for routing protocols:
Although reducing the EIGRP, IS-IS, and OSPF timers can result in minimum detection timer of one
•
to two seconds, BFD can provide failure detection in less than one second.
Because BFD is not tied to any particular routing protocol, it can be used as a generic and consistent
•
failure detection mechanism for EIGRP, IS-IS, and OSPF.
Because some parts of BFD can be distributed to the data plane, it can be less CPU-intensive than the
•
reduced EIGRP, IS-IS, and OSPF timers, which exist wholly at the control plane.
How to Configure Bidirectional Forwarding Detection
How to Configure Bidirectional Forwarding Detection
Configuring BFD Session Parameters on the Interface
To configure BFD on an interface, you need to set the baseline BFD session parameters on an interface. Repeat
the steps in this procedure for each interface over which you want to run BFD sessions to BFD neighbors.
The BFD interval configuration is not removed
when:
an IPv4 address is removed from an interface
•
an IPv6 address is removed from an interface
•
IPv6 is disabled from an interface
•
Configuring Bidirectional Forwarding Detection
How to Configure Bidirectional Forwarding Detection
PurposeCommand or Action
an interface is shutdown
•
IPv4 CEF is disabled globally or locally on
•
an interface
IPv6 CEF is disabled globally or locally on
•
an interface
Step 5
end
Example:
Device(config-if)# end
Configuring BFD Support for Dynamic Routing Protocols
Configuring BFD Support for eBGP
This section describes the procedure for configuring BFD support for BGP so that BGP is a registered protocol
with BFD and will receive forwarding path detection failure messages from BFD.
Before You Begin
e BGP must be running on all participating routers.
The baseline parameters for BFD sessions on the interfaces over which you want to run BFD sessions to BFD
neighbors must be configured. See the Configuring BFD Session Parameters on the Interface section for more
information.
Exits interface configuration mode and returns to
privileged EXEC mode.
Output from the show bfd neighbors details command shows the configured intervals.Note
How to Configure Bidirectional Forwarding Detection
Configuring Bidirectional Forwarding Detection
PurposeCommand or Action
Step 2
Step 3
Step 4
Step 5
Step 6
Example:
Device# configure terminal
router bgp as-tag
Example:
Device(config)# router bgp tag1
neighbor ip-addressfall-over bfd
Example:
Device(config-router)# neighbor
172.16.10.2 fall-over bfd
end
Example:
Device(config-router)# end
show bfd neighbors [details]
Example:
Enters global configuration mode.configure terminal
Specifies a BGP process and enters router
configuration mode.
Enables BFD support for fallover.
Exits router configuration mode and returns the
router to privileged EXEC mode.
(Optional) Verifies that the BFD neighbor is
active and displays the routing protocols that
BFD has registered.
Device# show bfd neighbors detail
Step 7
show ip bgp neighbor
Example:
Device# show ip bgp neighbor
Configuring BFD Support for EIGRP
This section describes the procedure for configuring BFD support for EIGRP so that EIGRP is a registered
protocol with BFD and will receive forwarding path detection failure messages from BFD. There are two
methods for enabling BFD support for EIGRP:
You can enable BFD for all of the interfaces for which EIGRP is routing by using the bfd all-interfaces
•
command in router configuration mode.
You can enable BFD for a subset of the interfaces for which EIGRP is routing by using the bfd interface
•
type number command in router configuration mode.
(Optional) Displays information about BGP and
TCP connections to neighbors.
EIGRP must be running on all participating routers.
The baseline parameters for BFD sessions on the interfaces over which you want to run BFD sessions to BFD
neighbors must be configured. See the Configuring BFD Session Parameters on the Interface section for more
information.
Output from the show bfd neighbors details command shows the configured intervals.Note
Procedure
How to Configure Bidirectional Forwarding Detection
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
Example:
Device> enable
Example:
Device# configure terminal
router eigrp as-number
Example:
Device(config)# router eigrp 123
Do one of the following:
bfd all-interfaces
•
bfd interface type number
•
Example:
Enables privileged EXEC mode.enable
Enter your password if prompted.
•
Enters global configuration mode.configure terminal
Configures the EIGRP routing process and enters
router configuration mode.
Enables BFD globally on all interfaces associated
with the EIGRP routing process.
or
Enables BFD on a per-interface basis for one or
more interfaces associated with the EIGRP routing
process.
How to Configure Bidirectional Forwarding Detection
Configuring Bidirectional Forwarding Detection
PurposeCommand or Action
Step 5
Step 6
Step 7
end
Example:
Device(config-router) end
show bfd neighbors [details]
Example:
Device# show bfd neighbors details
show ip eigrp interfaces [type number]
[as-number] [detail]
Example:
Device# show ip eigrp interfaces
detail
Configuring BFD Support for IS-IS
This section describes the procedures for configuring BFD support for IS-IS so that IS-IS is a registered
protocol with BFD and will receive forwarding path detection failure messages from BFD. There are two
methods for enabling BFD support for IS-IS:
Exits router configuration mode and returns the
router to privileged EXEC mode.
(Optional) Verifies that the BFD neighbor is active
and displays the routing protocols that BFD has
registered.
(Optional) Displays the interfaces for which BFD
support for EIGRP has been enabled.
Prerequisites
Note
You can enable BFD for all of the interfaces on which IS-IS is supporting IPv4 routing by using the bfd
•
all-interfaces command in router configuration mode. You can then disable BFD for one or more of
those interfaces using the isis bfd disable command in interface configuration mode.
You can enable BFD for a subset of the interfaces for which IS-IS is routing by using the isis bfd
•
command in interface configuration mode.
To configure BFD support for IS-IS, perform the steps in one of the following sections:
IS-IS must be running on all participating routers.
The baseline parameters for BFD sessions on the interfaces that you want to run BFD sessions to BFD neighbors
over must be configured. See the Configuring BFD Session Parameters on the Interface section for more
information.
Output from the show bfd neighbors details command shows the configured intervals. The output does
not show intervals that were changed because hardware-offloaded BFD sessions were configured with
Tx and Rx intervals that are not multiples of 50 ms.
(Optional) Enables support for IPv4 routing on the
interface.
11
How to Configure Bidirectional Forwarding Detection
Configuring Bidirectional Forwarding Detection
PurposeCommand or Action
Step 8
Step 9
Step 10
Step 11
isis bfd [disable]
Example:
Device(config-if)# isis bfd
end
Example:
Device(config-if)# end
show bfd neighbors [details]
Example:
Device# show bfd neighbors details
show clns interface
Example:
Device# show clns interface
(Optional) Enables or disables BFD on a per-interface
basis for one or more interfaces associated with the
IS-IS routing process.
Note
You should use the disable keyword only if
you had earlier enabled BFD on all of the
interfaces that IS-IS is associated with, using
the bfd all-interfaces command in
configuration mode.
Exits interface configuration mode and returns the
router to privileged EXEC mode.
(Optional) Displays information that can be used to
verify if the BFD neighbor is active and displays the
routing protocols that BFD has registered.
(Optional) Displays information that can be used to
verify if BFD for IS-IS has been enabled for a specific
IS-IS interface that is associated.
Configuring BFD Support for IS-IS for One or More Interfaces
To configure BFD for only one or more IS-IS interfaces, perform the steps in this section.
Procedure
Step 1
Example:
Device> enable
Step 2
Example:
Device# configure terminal
PurposeCommand or Action
Enables privileged EXEC mode.enable
Enter your password if prompted.
•
Enters global configuration mode.configure terminal
How to Configure Bidirectional Forwarding Detection
PurposeCommand or Action
Step 3
Step 4
Step 5
Step 6
interface type number
Example:
Device(config)# interface
fastethernet 6/0
ip router isis [ tag ]
Example:
Device(config-if)# ip router isis
tag1
isis bfd [disable]
Example:
Device(config-if)# isis bfd
end
Example:
Enters interface configuration mode.
Enables support for IPv4 routing on the interface.
Enables or disables BFD on a per-interface basis for
one or more interfaces associated with the IS-IS routing
process.
Note
You should use the disable keyword only if
you enabled BFD on all of the interfaces that
IS-IS is associated with using the bfdall-interfaces command in router
configuration mode.
Exits interface configuration mode and returns the
router to privileged EXEC mode.
Device(config-if)# end
Step 7
show bfd neighbors [details]
Example:
Device# show bfd neighbors
details
Step 8
show clns interface
Example:
Device# show clns interface
Configuring BFD Support for OSPF
This section describes the procedures for configuring BFD support for OSPF so that OSPF is a registered
protocol with BFD and will receive forwarding path detection failure messages from BFD. You can either
configure BFD support for OSPF globally on all interfaces or configure it selectively on one or more interfaces.
There are two methods for enabling BFD support for OSPF:
(Optional) Displays information that can help verify if
the BFD neighbor is active and displays the routing
protocols that BFD has registered.
(Optional) Displays information that can help verify if
BFD for IS-IS has been enabled for a specific IS-IS
interface that is associated.
How to Configure Bidirectional Forwarding Detection
You can enable BFD for all of the interfaces for which OSPF is routing by using the bfd all-interfaces
•
command in router configuration mode. You can disable BFD support on individual interfaces using
the ip ospf bfd [disable] command in interface configuration mode.
You can enable BFD for a subset of the interfaces for which OSPF is routing by using the ip ospf bfd
•
command in interface configuration mode.
See the following sections for tasks for configuring BFD support for OSPF:
Configuring BFD Support for OSPF for All Interfaces
To configure BFD for all OSPF interfaces, perform the steps in this section.
If you do not want to configure BFD on all OSPF interfaces and would rather configure BFD support specifically
for one or more interfaces, see the Configuring BFD Support for OSPF for One or More Interfaces section.
Before You Begin
OSPF must be running on all participating routers.
The baseline parameters for BFD sessions on the interfaces over which you want to run BFD sessions to BFD
neighbors must be configured. See the Configuring BFD Session Parameters on the Interface section for more
information.
Configuring Bidirectional Forwarding Detection
Procedure
Step 1
Step 2
Step 3
Step 4
Example:
Device> enable
Example:
Device# configure terminal
router ospf process-id
Example:
Device(config)# router ospf 4
bfd all-interfaces
Example:
Device(config-router)# bfd
all-interfaces
PurposeCommand or Action
Enables privileged EXEC mode.enable
Enter your password if prompted.
•
Enters global configuration mode.configure terminal
Specifies an OSPF process and enters router
configuration mode.
Enables BFD globally on all interfaces associated with
the OSPF routing process.
How to Configure Bidirectional Forwarding Detection
PurposeCommand or Action
Step 5
Step 6
Step 7
Step 8
exit
Example:
Device(config-router)# exit
interface type number
Example:
Device(config)# interface
fastethernet 6/0
ip ospf bfd [disable]
Example:
Device(config-if)# ip ospf bfd
disable
end
Example:
Device(config-if)# end
(Optional) Returns the device to global configuration
mode. Enter this command only if you want to perform
Step 7 to disable BFD for one or more interfaces.
(Optional) Enters interface configuration mode. Enter
this command only if you want to perform Step 7 to
disable BFD for one or more interfaces.
(Optional) Disables BFD on a per-interface basis for one
or more interfaces associated with the OSPF routing
process.
Note
You should use the disable keyword only if you
enabled BFD on all of the interfaces that OSPF
is associated with using the bfd all-interfaces
command in router configuration mode.
Exits interface configuration mode and returns the router
to privileged EXEC mode.
Step 9
Step 10
show bfd neighbors [details]
Example:
Device# show bfd neighbors
detail
show ip ospf
Example:
Device# show ip ospf
Configuring BFD Support for OSPF for One or More Interfaces
To configure BFD on one or more OSPF interfaces, perform the steps in this section.
Before You Begin
OSPF must be running on all participating routers.
The baseline parameters for BFD sessions on the interfaces over which you want to run BFD sessions to BFD
neighbors must be configured. See the Configuring BFD Session Parameters on the Interface section for more
information.
(Optional) Displays information that can help verify if
the BFD neighbor is active and displays the routing
protocols that BFD has registered.
(Optional) Displays information that can help verify if
BFD for OSPF has been enabled.
How to Configure Bidirectional Forwarding Detection
Procedure
Configuring Bidirectional Forwarding Detection
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
Example:
Device> enable
Example:
Device# configure terminal
interface type number
Example:
Device(config)# interface
fastethernet 6/0
ip ospf bfd [disable]
Example:
Device(config-if)# ip ospf bfd
Enables privileged EXEC mode.enable
Enter your password if prompted.
•
Enters global configuration mode.configure terminal
Enters interface configuration mode.
Enables or disables BFD on a per-interface basis for one
or more interfaces associated with the OSPF routing
process.
Note
You should use the disable keyword only if
you enabled BFD on all of the interfaces that
OSPF is associated with using the bfdall-interfaces command in router configuration
mode.
Step 5
Step 6
Step 7
end
Example:
Device(config-if)# end
show bfd neighbors [details]
Example:
Device# show bfd neighbors
details
show ip ospf
Example:
Device# show ip ospf
Exits interface configuration mode and returns the router
to privileged EXEC mode.
(Optional) Displays information that can help verify if
the BFD neighbor is active and displays the routing
protocols that BFD has registered.
(Optional) Displays information that can help verify if
BFD support for OSPF has been enabled.
Perform this task to enable BFD support for Hot Standby Router Protocol (HSRP.) Repeat the steps in this
procedure for each interface over which you want to run BFD sessions to HSRP peers.
HSRP supports BFD by default. If HSRP support for BFD has been manually disabled, you can reenable it
at the router level to enable BFD support globally for all interfaces or on a per-interface basis at the interface
level.
Before You Begin
HSRP must be running on all participating routers.
•
Cisco Express Forwarding must be enabled.
•
Procedure
How to Configure Bidirectional Forwarding Detection
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
Step 5
Example:
Device> enable
Example:
Device# configure terminal
ip cef [distributed]
Example:
Device(config)# ip cef
interface type number
Example:
Device(config)# interface FastEthernet
6/0
ip address ip-address mask
Enables privileged EXEC mode.enable
Enter your password if prompted.
•
Enters global configuration mode.configure terminal
Enables Cisco Express Forwarding or
distributed Cisco Express Forwarding.
Enters interface configuration mode.
Configures an IP address for the interface.
Step 6
Example:
Device(config-if)# ip address 10.1.0.22
255.255.0.0
standby [group-number] ip [ip-address
[secondary]]
How to Configure Bidirectional Forwarding Detection
Example:
Device(config-if)# standby 1 ip 10.0.0.11
Configuring Bidirectional Forwarding Detection
PurposeCommand or Action
Step 7
Step 8
Step 9
Step 10
Step 11
standby bfd
Example:
Device(config-if)# standby bfd
Example:
Device(config-if)# exit
standby bfd all-interfaces
Example:
Device(config)# standby bfd
all-interfaces
Example:
Device(config)# exit
show standby neighbors
Example:
(Optional) Enables HSRP support for BFD
on the interface.
Exits interface configuration mode.exit
(Optional) Enables HSRP support for BFD
on all interfaces.
Exits global configuration mode.exit
(Optional) Displays information about
HSRP support for BFD.
Device# show standby neighbors
Configuring BFD Support for Static Routing
Perform this task to configure BFD support for static routing. Repeat the steps in this procedure on each BFD
neighbor. For more information, see the "Example: Configuring BFD Support for Static Routing" section.