Bfd-Liveness-Detection - Juniper JUNOS OS 10.3 - SOFTWARE Manual

For ex series ethernet switches
Hide thumbs Also See for JUNOS OS 10.3 - SOFTWARE:
Table of Contents

Advertisement

bfd-liveness-detection

Syntax
Hierarchy Level
Release Information
Description
Options
Copyright © 2010, Juniper Networks, Inc.
bfd-liveness-detection {
authentication {
algorithm algorithm-name;
key-chain key-chain-name;
<loose-check>;
}
detection-time {
threshold milliseconds;
}
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
transmit-interval {
threshold milliseconds;
minimum-interval milliseconds;
}
multiplier number;
no-adaptation;
version (1 | automatic);
}
[edit logical-systems logical-system-name protocols rip group group-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
rip group group-name neighbor neighbor-name]
[edit protocols rip group group-name],
[edit routing-instances routing-instance-name protocols rip group group-name neighbor
neighbor-name]
Statement introduced in Junos OS Release 8.0.
detection-time threshold
OS Release 8.2.
Support for logical systems introduced in Junos OS Release 8.3.
statement introduced in Junos OS Release 9.0.
no-adaptation
Statement introduced in Junos OS Release 9.0 for EX Series switches.
,
authentication algorithm
statements introduced in Junos OS Release 9.6.
,
authentication algorithm
statements introduced in Junos OS Release 9.6 for EX Series switches.
Configure bidirectional failure detection timers and authentication.
authentication algorithm algorithm-name
the specified BFD session:
meticulous-keyed-md5
authentication key-chain key-chain-name
BFD session using the name of the security keychain. The name you specify must
match one of the keychains configured in the
statement at the
[edit security]
Chapter 73: Configuration Statements for Layer 3 Protocols
and
transmit-interval threshold
, and
authentication key-chain
, and
authentication key-chain
—Configure the algorithm used to authenticate
simple-password
,
keyed-md5
, or
meticulous-keyed-sha-1
—Associate a security key with the specified
authentication-key-chains key-chain
hierarchy level.
options introduced in Junos
authentication loose-check
authentication loose-check
,
keyed-sha-1
,
.
1751

Advertisement

Table of Contents
loading

Table of Contents