bfd-liveness-detection
Syntax
bfd-liveness-detection {
authentication {
algorithm algorithm-name;
key-chain key-chain-name;
loose-check;
}
detection-time {
threshold milliseconds;
}
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
no-adaptation;
transmit-interval {
threshold milliseconds;
minimum-interval milliseconds;
}
multiplier number;
version (1 | automatic);
}
Hierarchy Level
[edit logical-systems logical-system-name protocols isis
interface
interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis
interface
interface-name],
[edit protocols isis
interface
interface-name],
[edit routing-instances routing-instance-name protocols isis
interface
interface-name]
Release Information
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
detection-time threshold
and
transmit-interval threshold
options added in Junos OS
Release 8.2.
Support for logical systems introduced in Junos OS Release 8.3.
no-adaptation
statement introduced in Junos OS Release 9.0.
authentication algorithm
,
authentication key-chain
, and
authentication loose-check
statements introduced in Junos OS Release 9.6.
Description
Configure bidirectional failure detection timers and authentication.
Options
authentication algorithm algorithm-name
—Configure the algorithm used to authenticate
the specified BFD session:
simple-password
,
keyed-md5
,
keyed-sha-1
,
meticulous-keyed-md5
,
meticulous-keyed-sha-1
.
authentication key-chain key-chain-name
—Associate a security key with the specified
BFD session using the name of the security keychain. The name you specify must
match one of the keychains configured in the
authentication-key-chains key-chain
statement at the
[edit security]
hierarchy level.
authentication loose-check
—(Optional) Configure loose authentication checking on the
BFD session. Use only for transitional periods when authentication may not be
configured at both ends of the BFD session.
1745
Copyright © 2010, Juniper Networks, Inc.
Chapter 73: Configuration Statements for Layer 3 Protocols
Summary of Contents for JUNOS OS 10.3 - SOFTWARE
Page 325: ...CHAPTER 17 Operational Mode Commands for System Setup 229 Copyright 2010 Juniper Networks Inc ...
Page 1323: ...CHAPTER 56 Operational Mode Commands for Interfaces 1227 Copyright 2010 Juniper Networks Inc ...
Page 2841: ...CHAPTER 86 Operational Commands for 802 1X 2745 Copyright 2010 Juniper Networks Inc ...
Page 3367: ...CHAPTER 113 Operational Mode Commands for CoS 3271 Copyright 2010 Juniper Networks Inc ...
Page 3435: ...CHAPTER 120 Operational Mode Commands for PoE 3339 Copyright 2010 Juniper Networks Inc ...
Page 3529: ...CHAPTER 126 Operational Mode Commands for MPLS 3433 Copyright 2010 Juniper Networks Inc ...