Bfd-Liveness-Detection - Juniper JUNOS OS 10.4 - FOR EX REV 1 Manual

For ex series ethernet switches
Table of Contents

Advertisement

Complete Software Guide for Junos

bfd-liveness-detection

Syntax
Hierarchy Level
Release Information
Description
Options
1978
®
OS for EX Series Ethernet Switches, Release 10.4
bfd-liveness-detection {
authentication {
algorithm algorithm-name;
key-chain key-chain-name;
loose-check;
}
detection-time {
threshold milliseconds;
}
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
no-adaptation;
transmit-interval {
threshold milliseconds;
minimum-interval milliseconds;
}
multiplier number;
version (1 | automatic);
}
[edit logical-systems logical-system-name protocols isis interface interface-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
isis interface interface-name],
[edit protocols isis interface interface-name],
[edit routing-instances routing-instance-name protocols isis interface interface-name]
Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
and
detection-time threshold
Release 8.2.
Support for logical systems introduced in Junos OS Release 8.3.
statement introduced in Junos OS Release 9.0.
no-adaptation
,
authentication algorithm
authentication key-chain
statements introduced in Junos OS Release 9.6.
Configure bidirectional failure detection timers and authentication.
authentication algorithm algorithm-name
the specified BFD session:
meticulous-keyed-md5
authentication key-chain key-chain-name
BFD session using the name of the security keychain. The name you specify must
match one of the keychains configured in the
statement at the
[edit security]
authentication loose-check
BFD session. Use only for transitional periods when authentication may not be
configured at both ends of the BFD session.
transmit-interval threshold
, and
—Configure the algorithm used to authenticate
simple-password
,
keyed-md5
,
.
meticulous-keyed-sha-1
—Associate a security key with the specified
authentication-key-chains key-chain
hierarchy level.
—(Optional) Configure loose authentication checking on the
options added in Junos OS
authentication loose-check
,
keyed-sha-1
,
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junos os 10.4

Table of Contents