Bfd-Liveness-Detection - Juniper JUNOS OS 10.4 - FOR EX REV 1 Manual

For ex series ethernet switches
Table of Contents

Advertisement

Complete Software Guide for Junos

bfd-liveness-detection

Syntax
Hierarchy Level
Release Information
Description
Options
1984
®
OS for EX Series Ethernet Switches, Release 10.4
bfd-liveness-detection {
authentication {
algorithm algorithm-name;
key-chain key-chain-name;
<loose-check>;
}
detection-time {
threshold milliseconds;
}
minimum-interval milliseconds;
minimum-receive-interval milliseconds;
transmit-interval {
threshold milliseconds;
minimum-interval milliseconds;
}
multiplier number;
no-adaptation;
version (1 | automatic);
}
[edit logical-systems logical-system-name protocols rip group group-name],
[edit logical-systems logical-system-name routing-instances routing-instance-name protocols
rip group group-name neighbor neighbor-name]
[edit protocols rip group group-name],
[edit routing-instances routing-instance-name protocols rip group group-name neighbor
neighbor-name]
Statement introduced in Junos OS Release 8.0.
and
detection-time threshold
Release 8.2.
Support for logical systems introduced in Junos OS Release 8.3.
statement introduced in Junos OS Release 9.0.
no-adaptation
Statement introduced in Junos OS Release 9.0 for EX Series switches.
,
authentication algorithm
authentication key-chain
statements introduced in Junos OS Release 9.6.
,
authentication algorithm
authentication key-chain
statements introduced in Junos OS Release 9.6 for EX Series switches.
Configure bidirectional failure detection timers and authentication.
authentication algorithm algorithm-name
the specified BFD session:
meticulous-keyed-md5
authentication key-chain key-chain-name
BFD session using the name of the security keychain. The name you specify must
match one of the keychains configured in the
statement at the
[edit security]
transmit-interval threshold
, and
, and
—Configure the algorithm used to authenticate
simple-password
,
keyed-md5
, or
meticulous-keyed-sha-1
—Associate a security key with the specified
authentication-key-chains key-chain
hierarchy level.
options introduced in Junos OS
authentication loose-check
authentication loose-check
,
keyed-sha-1
,
.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junos os 10.4

Table of Contents