The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes how to enable the Bidirectional Forwarding Detection (BFD) protocol. BFD is a detection protocol that
is designed to provide fast forwarding path failure detection times for all media types, encapsulations, topologies, and routing
protocols.
BFD provides a consistent failure detection method for network administrators, in addition to fast forwarding path failure
detection. Because the network administrator can use BFD to detect forwarding path failures at a uniform rate, rather than
the variable rates for different routing protocol hello mechanisms, network profiling and planning will be easier, and reconvergence
time will be consistent and predictable.
Prerequisites for Bidirectional Forwarding Detection
All participating switches must enable Cisco Express Forwarding and IP routing.
Before BFD is deployed on a switch, it is necessary to configure one of the IP routing protocols that are supported by BFD.
You should implement fast convergence for the routing protocol that you are using. See IP routing documentation for your version
of Cisco IOS software for information on configuring fast convergence. See the "Restrictions for Bidirectional Forwarding
Detection" section for more information on BFD routing protocol support in Cisco IOS software.
Restrictions for Bidirectional Forwarding Detection
BFD works only for directly connected neighbors. BFD neighbors must be no more than one IP hop away. BFD does not support
Multihop configurations.
BFD support is not available for all platforms and interfaces. To confirm if a specific platform or interface has BFD support
and to obtain the most accurate platform and hardware restrictions, see the Cisco IOS software release notes for your software
version.
The QoS policy for self-generated packets does not match BFD packets.
The classclass-default command matches BFD packets. So, you must make sure of the availability of appropriate bandwidth to prevent dropping of BFD
packets due to oversubscription.
BFD HA is not supported.
Information About Bidirectional Forwarding Detection
The following sections provide information about bidirectional forwarding detection.
BFD Operation
BFD provides a low-overhead, short-duration method of detecting failures in the forwarding path between two adjacent devices.
These devices include the interfaces, data links, and forwarding planes.
BFD is a detection protocol that you enable at the interface and routing protocol levels. Cisco supports BFD asynchronous
mode. BFD asychronous mode depends on the sending of BFD control packets between two systems to activate and maintain BFD
neighbor sessions between devices. Therefore, in order to create a BFD session, you must configure BFD on both systems (or
BFD peers). A BFD session is created once BFD is enabled on the interfaces and at the device level for the appropriate routing
protocols. BFD timers are negotiated, and the BFD peers begin to send BFD control packets to each other at the negotiated
interval.
Starting with Cisco IOS XE Gibraltar 16.11.1 release, the BFD protocol can be configured between PE-CE (Provider Edge-Customer
Edge) and PE-P (Provider Edge- Provider) in an MPLS network.
Neighbor Relationships
BFD provides fast BFD peer failure detection times independently. This is independent of all media types, encapsulations,
topologies, and routing protocols such as BGP, EIGRP, IS-IS, and OSPF. BFD sends rapid failure detection notices to the routing
protocols in the local router to initiate the routing table recalculation process. In this way, BFD contributes to greatly
reduced overall network convergence time. The figure below shows a simple network with two routers running OSPF and BFD. When
OSPF discovers a neighbor (1), it sends a request to the local BFD process. It initiates a BFD neighbor session with the OSPF
neighbor router (2). The BFD neighbor session with the OSPF neighbor router is established (3).
The figure below shows what happens when a failure occurs in the network (1). The BFD neighbor session with the OSPF neighbor
router is torn down (2). BFD notifies the local OSPF process that the BFD neighbor is no longer reachable (3). The local OSPF
process tears down the OSPF neighbor relationship (4). If an alternative path is available, the routers immediately start
converging on it.
A routing protocol must register with BFD for every neighbor it acquires. Once a neighbor is registered, BFD initiates a
session with the neighbor if a session does not already exist.
OSPF registers with BFD when:
A neighbor finite state machine (FSM) transitions to full state.
Both OSPF BFD and BFD are enabled.
On broadcast interfaces, OSPF establishes a BFD session only with the designated router (DR) and backup designated router
(BDR). The session is not established between any two routers in a DROTHER state.
BFD Detection of Failures
Once a BFD session is established and timer negations are complete, BFD peers send BFD control packets. The packets act in
the same manner as an IGP hello protocol to detect liveliness, except at a more accelerated rate. The following information
should be noted:
BFD is a forwarding path failure detection protocol. BFD detects a failure, but the routing protocol must act to bypass a
failed peer.
Starting with Cisco IOS XE Denali 16.3.1, Cisco devices support BFD version 0. Devices use one BFD session for multiple client
protocols in the implementation. For example, if a network is running OSPF and EIGRP across the same link to the same peer,
only one BFD session is established. BFD shares session information with both routing protocols.
BFD Version Interoperability
All BFD sessions come up as Version 1 by default and are interoperable with Version 0. The system automatically performs BFD
version detection, and BFD sessions between neighbors run in the highest common BFD version between neighbors. For example,
if one BFD neighbor is running BFD Version 0 and the other BFD neighbor is running Version 1, the session runs BFD Version
0. The output from the showbfdneighbors [details] command verifies which BFD version a BFD neighbor is running.
See the "Example Configuring BFD in an EIGRP Network with Echo Mode Enabled by Default" for an example of BFD version detection.
BFD Support for Nonbroadcast Media Interfaces
Starting from Cisco IOS XE Denali 16.3.1, the BFD feature is supported on routed, SVI, and L3 port channels. The bfdinterval command must be configured on the interface to initiate BFD monitoring.
BFD Support for Nonstop Forwarding with Stateful Switchover
Typically, when a networking device restarts, all routing peers of that device detect that the device went down and then came
back up. This transition results in a routing flap, which could spread across multiple routing domains. Routing flaps that
are caused by routing restarts create routing instabilities, which are detrimental to the overall network performance. Nonstop
forwarding (NSF) helps to suppress routing flaps in devices enabled with stateful switchover (SSO), thus reducing network
instability.
NSF allows for the forwarding of data packets to continue along known routes while the routing protocol information is restored
after a switchover. With NSF, peer networking devices do not experience routing flaps. Data traffic is forwarded through intelligent
line cards or dual forwarding processors while the standby RP assumes control from the failed active RP during a switchover.
One key to NSF operation is the ability of line cards and forwarding processors to remain up through a switchover. They remain
current with the Forwarding Information Base (FIB) on the active RP.
In devices that support dual RPs, SSO establishes one of the RPs as the active processor; the other RP is designated as the
standby processor. SSO synchronizes information between the active and standby processor. A switchover from the active to
the standby processor occurs when the active RP fails, it is removed from the networking device, or it is manually taken down
for maintenance.
BFD Intervals Based on Interface
The following table displays the relationship between interfaces, BFD intervals and the Timeout values that must be configured
on the interfaces:
Types of Interface
Minimum Supported Values for BFD Timer
Standalone
Redundant Systems
Physical Interface
50ms * 3
250ms * 3
L3 Subinterface
50ms * 3
750ms * 3
Switch Virtual Interface (SVI)
100ms * 3
750ms * 3
Layer 3 Portchannel
250ms * 3
750ms * 3
Layer 3 Portchannel Subinterface
250ms * 3
750ms * 3
How to Configure Bidirectional Forwarding Detection
The following sections provide configurational information about bidirectional forwarding detection.
Configuring BFD Session Parameters on the Interface
To configure BFD on an interface, you must set the baseline BFD session parameters. Repeat the steps in this procedure for
each interface over which you want to run BFD sessions to BFD neighbors.
The following procedure shows BFD configuration steps for a physical interface. Please use the corresponding BFD timer values
for SVIs and ether-channels respectively.
The BFD interval configuration is removed when the subinterface on which it is configured is removed.
The BFD interval configuration is not removed when:
An interface removes an IPv4 address.
An interface removes an IPv6 address is removed from an interface.
An interface disables IPv6.
An interface is shutdown
An interface globally or locally disables IPv4 CEF.
An interface globally or locally disables IPv6 CEF.
Step 5
end
Example:
Device(config-if)#end
Exits interface configuration mode and returns to privileged EXEC mode.
Configuring BFD Support for Dynamic Routing Protocols
The following sections provide configurational information about BFD support for dynamic routing protocols.
Configuring BFD Support for IS-IS
This section describes the procedures for configuring BFD support for IS-IS so that IS-IS is a registered protocol with BFD
and will receive forwarding path detection failure messages from BFD. There are two methods for enabling BFD support for IS-IS:
You can enable BFD for all of the interfaces on which IS-IS is supporting IPv4 routing by using the bfdall-interfaces command in router configuration mode. You can then disable BFD for one or more of those interfaces using the isisbfddisable command in interface configuration mode.
You can enable BFD for a subset of the interfaces for which IS-IS is routing by using the isisbfd command in interface configuration mode.
To configure BFD support for IS-IS, perform the steps in one of the following sections:
Prerequisites
IS-IS must be running on all participating devices.
The baseline parameters for BFD sessions on the interfaces that you want to run BFD sessions to BFD neighbors over must be
configured. See the "Configuring BFD Session Parameters on the Interface" section for more information.
Configuring BFD Support for IS-IS for All Interfaces
To configure BFD on all IS-IS interfaces that support IPv4 routing, perform the steps in this section.
SUMMARY STEPS
enable
configureterminal
routerisisarea-tag
bfdall-interfaces
exit
interfacetypenumber
iprouterisis [tag]
isisbfd[disable]
end
showbfdneighbors[details]
showclnsinterface
DETAILED STEPS
Command or Action
Purpose
Step 1
enable
Example:
Device>enable
Enables privileged EXEC mode.
Enter your password if prompted.
Step 2
configureterminal
Example:
Device#configure terminal
Enters global configuration mode.
Step 3
routerisisarea-tag
Example:
Device(config)#router isis tag1
Specifies an IS-IS process and enters router configuration mode.
Step 4
bfdall-interfaces
Example:
Device(config-router)#bfd all-interfaces
Enables BFD globally on all interfaces that are associated with the IS-IS routing process.
Step 5
exit
Example:
Device(config-router)#exit
(Optional) Returns the device to global configuration mode.
Step 6
interfacetypenumber
Example:
Device(config)#interface fastethernet 6/0
(Optional) Enters interface configuration mode.
Step 7
iprouterisis [tag]
Example:
Device(config-if)#ip router isis tag1
(Optional) Enables support for IPv4 routing on the interface.
Step 8
isisbfd[disable]
Example:
Device(config-if)#isis bfd
(Optional) Enables or disables BFD on a per-interface basis for one or more interfaces that are associated with the IS-IS
routing process.
Note
You should use the disable keyword only if you had earlier enabled BFD on all the interfaces that IS-IS is associated with, using the bfdall-interfaces command in configuration mode.
Step 9
end
Example:
Device(config-if)#end
Exits interface configuration mode and returns the device to privileged EXEC mode.
Step 10
showbfdneighbors[details]
Example:
Device#show bfd neighbors details
(Optional) Displays information that can be used to verify if the BFD neighbor is active and displays the routing protocols
that BFD has registered.
Step 11
showclnsinterface
Example:
Device#show clns interface
(Optional) Displays information that can be used to verify if BFD for IS-IS has been enabled for a specific IS-IS interface
that is associated.
Configuring BFD Support for IS-IS for One or More Interfaces
To configure BFD for only one or more IS-IS interfaces, perform the steps in this section.
SUMMARY STEPS
enable
configureterminal
interfacetypenumber
iprouterisis [tag]
isisbfd[disable]
end
showbfdneighbors[details]
showclnsinterface
DETAILED STEPS
Command or Action
Purpose
Step 1
enable
Example:
Device>enable
Enables privileged EXEC mode.
Enter your password if prompted.
Step 2
configureterminal
Example:
Device#configure terminal
Enters global configuration mode.
Step 3
interfacetypenumber
Example:
Device(config)#interface fastethernet 6/0
Enters interface configuration mode.
Step 4
iprouterisis [tag]
Example:
Device(config-if)#ip router isis tag1
Enables support for IPv4 routing on the interface.
Step 5
isisbfd[disable]
Example:
Device(config-if)#isis bfd
Enables or disables BFD on a per-interface basis for one or more interfaces that are associated with the IS-IS routing process.
Note
You should use the disable keyword only if you enabled BFD on all the interfaces that IS-IS is associated with using the bfdall-interfaces command in router configuration mode.
Step 6
end
Example:
Device(config-if)#end
Exits interface configuration mode and returns the device to privileged EXEC mode.
Step 7
showbfdneighbors[details]
Example:
Device#show bfd neighbors details
(Optional) Displays information that can help verify if the BFD neighbor is active and displays the routing protocols that
BFD has registered.
Step 8
showclnsinterface
Example:
Device#show clns interface
(Optional) Displays information that can help verify if BFD for IS-IS has been enabled for a specific IS-IS interface that
is associated.
Configuring BFD Support for OSPF
This section describes the procedures for configuring BFD support for OSPF so that OSPF is a registered protocol with BFD
and will receive forwarding path detection failure messages from BFD. You can either configure BFD support for OSPF globally
on all interfaces or configure it selectively on one or more interfaces.
There are two methods for enabling BFD support for OSPF:
You can enable BFD for all the interfaces for which OSPF is routing by using the bfdall-interfaces command in router configuration mode. You can disable BFD support on individual interfaces using the ipospfbfd [disable] command in interface configuration mode.
You can enable BFD for a subset of the interfaces for which OSPF is routing by using the ipospfbfd command in interface configuration mode.
See the following sections for tasks for configuring BFD support for OSPF:
Configuring BFD Support for OSPF for All Interfaces
To configure BFD for all OSPF interfaces, perform the steps in this section.
If you do not want to configure BFD on all OSPF interfaces and would rather configure BFD support specifically for one or
more interfaces, see the "Configuring BFD Support for OSPF for One or More Interfaces" section.
Before you begin
OSPF must be running on all participating devices.
The baseline parameters for BFD sessions on the interfaces over which you want to run BFD sessions to BFD neighbors must be
configured. See the "Configuring BFD Session Parameters on the Interface" section for more information.
Procedure
Command or Action
Purpose
Step 1
enable
Example:
Device>enable
Enables privileged EXEC mode.
Enter your password if prompted.
Step 2
configureterminal
Example:
Device#configure terminal
Enters global configuration mode.
Step 3
routerospfprocess-id
Example:
Device(config)#router ospf 4
Specifies an OSPF process and enters router configuration mode.
Step 4
bfdall-interfaces
Example:
Device(config-router)#bfd all-interfaces
Enables BFD globally on all interfaces that are associated with the OSPF routing process.
Step 5
exit
Example:
Device(config-router)#exit
(Optional) Returns the device to global configuration mode. Enter this command only if you want to perform Step 7 to disable
BFD for one or more interfaces.
Step 6
interfacetypenumber
Example:
Device(config)#interface fastethernet 6/0
(Optional) Enters interface configuration mode. Enter this command only if you want to perform Step 7 to disable BFD for one
or more interfaces.
Step 7
ipospfbfd[disable]
Example:
Device(config-if)#ip ospf bfd disable
(Optional) Disables BFD on a per-interface basis for one or more interfaces that are associated with the OSPF routing process.
Note
You should use the disable keyword only if you enabled BFD on all the interfaces that OSPF is associated with using the bfdall-interfaces command in router configuration mode.
Step 8
end
Example:
Device(config-if)#end
Exits interface configuration mode and returns the router to privileged EXEC mode.
Step 9
showbfdneighbors[details]
Example:
Device#show bfd neighbors detail
(Optional) Displays information that can help verify if the BFD neighbor is active and displays the routing protocols that
BFD has registered.
Step 10
showipospf
Example:
Device#show ip ospf
(Optional) Displays information that can help verify if BFD for OSPF has been enabled.
Configuring OSPF Support for BFD over IPv4 for One or More Interfaces
To configure BFD on one or more OSPF interfaces, perform the steps in this section.
SUMMARY STEPS
enable
configureterminal
interfacetypenumber
ipospfbfd[disable]
end
showbfdneighbors[details]
showipospf
DETAILED STEPS
Command or Action
Purpose
Step 1
enable
Example:
Device>enable
Enables privileged EXEC mode.
Enter your password if prompted.
Step 2
configureterminal
Example:
Device#configure terminal
Enters global configuration mode.
Step 3
interfacetypenumber
Example:
Device(config)#interface fastethernet 6/0
Enters interface configuration mode.
Step 4
ipospfbfd[disable]
Example:
Device(config-if)#ip ospf bfd
Enables or disables BFD on a per-interface basis for one or more interfaces that are associated with the OSPF routing process.
Note
Use the disable keyword only if you enable BFD on all the interfaces that OSPF is associated with using the bfdall-interfaces command in router configuration mode.
Step 5
end
Example:
Device(config-if)#end
Exits interface configuration mode and returns the device to privileged EXEC mode.
Step 6
showbfdneighbors[details]
Example:
Device#show bfd neighbors details
(Optional) Displays information that can help verify if the BFD neighbor is active and displays the routing protocols that
BFD has registered.
Note
If hardware-offloaded BFD sessions are configured with Tx and Rx intervals that are not multiples of 50 ms, the hardware intervals
are changed. However, output from the showbfdneighborsdetails command displays only the configured intervals, not the interval values that change.
Step 7
showipospf
Example:
Device#show ip ospf
(Optional) Displays information that can help verify if BFD support for OSPF has been enabled.
Configuring BFD Support for HSRP
Perform this task to enable BFD support for Hot Standby Router Protocol (HSRP.) Repeat the steps in this procedure for each
interface over which you want to run BFD sessions to HSRP peers.
HSRP supports BFD by default. If HSRP support for BFD has been manually disabled, you can reenable it at the device level
to enable BFD support globally for all interfaces or on a per-interface basis at the interface level.
Before you begin
HSRP must be running on all participating devices.
Cisco Express Forwarding must be enabled.
Procedure
Command or Action
Purpose
Step 1
enable
Example:
Device>enable
Enables privileged EXEC mode.
Enter your password if prompted.
Step 2
configureterminal
Example:
Device#configure terminal
Enters global configuration mode.
Step 3
ipcef[distributed]
Example:
Device(config)#ip cef
Enables Cisco Express Forwarding or distributed Cisco Express Forwarding.
standby [group-number] ip [ip-address [secondary]]
Example:
Device(config-if)#standby 1 ip 10.0.0.11
Activates HSRP.
Step 7
standbybfd
Example:
Device(config-if)#standby bfd
(Optional) Enables HSRP support for BFD on the interface.
Step 8
exit
Example:
Device(config-if)#exit
Exits interface configuration mode.
Step 9
standbybfdall-interfaces
Example:
Device(config)#standby bfd all-interfaces
(Optional) Enables HSRP support for BFD on all interfaces.
Step 10
exit
Example:
Device(config)#exit
Exits global configuration mode.
Step 11
showstandbyneighbors
Example:
Device#show standby neighbors
(Optional) Displays information about HSRP support for BFD.
Configuring BFD Support for Static Routing
Perform this task to configure BFD support for static routing. Repeat the steps in this procedure on each BFD neighbor. For
more information, see the "Example: Configuring BFD Support for Static Routing" section.
Procedure
Command or Action
Purpose
Step 1
enable
Example:
Device>enable
Enables privileged EXEC mode.
Enter your password if prompted.
Step 2
configureterminal
Example:
Device#configure terminal
Enters global configuration mode.
Step 3
interfacetypenumber
Example:
Device(config)#interface TenGigabitEthernet1/0/1
Configures an interface and enters interface configuration mode.
(Optional) Displays information about the static BFD configuration from the configured BFD groups and nongroup entries.
Step 12
exit
Example:
Device#exit
Exits privileged EXEC mode and returns to user EXEC mode.
Configuring BFD Echo Mode
BFD echo mode is enabled by default, but you can disable it such that it can run independently in each direction.
BFD echo mode works with asynchronous BFD. Echo packets are sent by the forwarding engine and forwarded back along the same
path in order to perform detection--the BFD session at the other end does not participate in the actual forwarding of the
echo packets. The echo function and the forwarding engine are responsible for the detection process; therefore, the number
of BFD control packets that are sent out between two BFD neighbors is reduced. In addition, because the forwarding engine
is testing the forwarding path on the remote (neighbor) system without involving the remote system, there is an opportunity
to improve the interpacket delay variance, thereby achieving quicker failure detection times than when using BFD Version 0
with BFD control packets for the BFD session.
Echo mode is described as without asymmetry when it is running on both sides (both BFD neighbors are running echo mode).
Prerequisites
BFD must be running on all participating devices.
Before using BFD echo mode, you must disable the sending of Internet Control Message Protocol (ICMP) redirect messages by
entering the noipredirects command, in order to avoid high CPU utilization.
The baseline parameters for BFD sessions on the interfaces over which you want to run BFD sessions to BFD neighbors must be
configured. See the Configuring BFD Session Parameters on the Interface section for more information.
Restrictions
BFD echo mode does not work in conjunction with Unicast Reverse Path Forwarding (uRPF) configuration. If BFD echo mode and
uRPF configurations are enabled, then the sessions will flap.
Disabling BFD Echo Mode Without Asymmetry
The steps in this procedure show how to disable BFD echo mode without asymmetry—no echo packets will be sent by the device,
and the device will not forward BFD echo packets that are received from any neighbor devices.
Repeat the steps in this procedure for each BFD Device.
Procedure
Command or Action
Purpose
Step 1
enable
Example:
Device>enable
Enables privileged EXEC mode.
Enter your password if prompted.
Step 2
configureterminal
Example:
Device#configure terminal
Enters global configuration mode.
Step 3
nobfdecho
Example:
Device(config)#no bfd echo
Disables BFD echo mode.
Use the no form to disable BFD echo mode.
Step 4
end
Example:
Device(config)#end
Exits global configuration mode and returns to privileged EXEC mode.
Creating and Configuring BFD Templates
You can configure a single-hop template to specify a set of BFD interval values. BFD interval values specified as part of
the BFD template are not specific to a single interface.
Note
Configuring BFD-template will disable echo mode.
Configuring a Single-Hop Template
Perform this task to create a BFD single-hop template and configure BFD interval timers.
Configures the transmit and receive intervals between BFD packets, and specifies the number of consecutive BFD control packets
that must be missed before BFD declares that a peer is unavailable.
Step 5
end
Example:
Device(bfd-config)#end
Exits BFD configuration mode and returns the device to privileged EXEC mode.
Monitoring and Troubleshooting BFD
This section describes how to retrieve BFD information for maintenance and troubleshooting. The commands in these tasks can
be entered in any order as needed.
This section contains information for monitoring and troubleshooting BFD for the following Cisco platforms:
Monitoring and Troubleshooting BFD
To monitor or troubleshoot BFD, perform one or more of the steps in this section.
SUMMARY STEPS
enable
showbfdneighbors[details]
debugbfd[packet | event]
DETAILED STEPS
Command or Action
Purpose
Step 1
enable
Example:
Device>enable
Enables privileged EXEC mode.
Enter your password if prompted.
Step 2
showbfdneighbors[details]
Example:
Device#show bfd neighbors details
(Optional) Displays the BFD adjacency database.
The details keyword shows all BFD protocol parameters and timers per neighbor.
Step 3
debugbfd[packet | event]
Example:
Device#debug bfd packet
(Optional) Displays debugging information about BFD packets.
Feature History for Configuring Bidirectional Forwarding Detection
This table provides release and related information for the features explained in
this module.
These features are available in all the releases subsequent to the one they were
introduced in, unless noted otherwise.
Release
Feature
Feature Information
Cisco IOS XE Gibraltar 16.11.1
Bidirectional Forwarding Detection
BFD is a detection protocol that is designed to provide fast
forwarding path failure detection times for all media types,
encapsulations, topologies, and routing protocols.
Use the Cisco Feature Navigator to find information about platform and software image support. To access Cisco Feature Navigator,
go to https://cfnng.cisco.com/.