|
Contents
- Bidirectional Forwarding Detection MIB
- Finding Feature Information
- Restrictions for the Bidirectional Forwarding Detection MIB
- Information About the Bidirectional Forwarding Detection MIB
- BFD MIB Cisco Implementation
- Capabilities Supported by the BFD MIB
- Notification Generation Events
- Benefits of Bidirectional Forwarding Detection MIB
- Features and Technologies Related to BFD MIB
- Supported Objects in the BFD MIB
- BFD General Variables (scalars)
- BFD Session Table
- BFD Session Performance Table
- BFD Session Mapping Table
- BFD Notifications
- VPN Aware BFD MIB
- SNMP Contexts
- VPN Aware BFD MIB Sessions
- VPN Aware BFD MIB Notifications
- How to Configure the Bidirectional Forwarding Detection MIB
- Enabling the SNMP Agent for BFD MIB Notifications
- Verifying the Status of the SNMP Agent
- Configuration Examples for the Bidirectional Forwarding Detection MIB
- Enabling the SNMP Agent to Enable BFD Notifications Example
- Viewing BFD Sessions Example
- MIB Walk for BFD MIB Example
- Additional References
- Feature Information for the Bidirectional Forwarding Detection MIB
Bidirectional Forwarding Detection MIB
The Bidirectional Forwarding Detection (BFD) MIB, Version 2 feature enables Simple Network Management Protocol (SNMP) agent support in Cisco IOS software for BFD management, as implemented in the Bidirectional Forwarding Detection Management Information Base (draft-ietf-bfd-mib-02.txt). The SNMP agent code operating with the BFD MIB enables a standardized, SNMP-based approach to be used in managing the BFD features in Cisco IOS software. The BFD MIB feature introduces the CISCO-IETF-BFD-MIB. The BFD MIB is also VPN-aware, which allows SNMP to differentiate incoming packets from different VPNs.
- Finding Feature Information
- Restrictions for the Bidirectional Forwarding Detection MIB
- Information About the Bidirectional Forwarding Detection MIB
- How to Configure the Bidirectional Forwarding Detection MIB
- Configuration Examples for the Bidirectional Forwarding Detection MIB
- Additional References
- Feature Information for the Bidirectional Forwarding Detection MIB
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for the Bidirectional Forwarding Detection MIB
The following restrictions apply to the BFD MIB for Cisco IOS releases:
- This MIB supports read-only (RO) permission for MIB objects, except for ciscoBfdSessNotificationsEnable, which has read-write access to enable or disable BFD traps via SNMP set commands.
- The BFD Session Mapping Table (ciscoBfdSessMapTable) maps the complex indexing of the BFD sessions to the flat BFDIndex used in the ciscoBfdSessionTable.
- BFD does not support 64-bit counters. The session performance table (ciscoBfdSessionPerfTable) collects BFD performance counts on a per session basis. This table augments the ciscoBfdSessionTable.
- The VRF-Aware functionality of BFD MIB is not supported with IPv6 addresses.
Information About the Bidirectional Forwarding Detection MIB
- BFD MIB Cisco Implementation
- Capabilities Supported by the BFD MIB
- Notification Generation Events
- Benefits of Bidirectional Forwarding Detection MIB
- Features and Technologies Related to BFD MIB
- Supported Objects in the BFD MIB
- VPN Aware BFD MIB
BFD MIB Cisco Implementation
The BFD MIB is based on the Internet Engineering Task Force (IETF) draft MIB entitled draft-ietf-bfd-mib-02.txt which includes objects describing features that support BFD.
Slight differences between the IETF draft MIB and the implementation of the BFD capabilities within Cisco IOS software require some minor translations between the BFD MIB and the internal data structures of Cisco IOS software. These translations are made by the SNMP agent code that is installed and operating on various hosts within the network. This SNMP agent code, running in the background as a low priority process, provides a management interface to Cisco IOS software.
The SNMP objects defined in the BFD MIB can be displayed by any standard SNMP utility. All BFD MIB objects are based on the IETF draft MIB; thus, no specific Cisco SNMP application is required to support the functions and operations pertaining to the BFD MIB.
Capabilities Supported by the BFD MIB
The following functionality is supported in the BFD MIB:
- The ability to generate and queue notification messages that signal changes in the operational status of BFD sessions.
- The ability to make the BFD MIB VPN aware.
- Extensions to existing SNMP commands that provide the ability to enable, disable, and configure notification messages for BFD sessions.
- The ability to specify the name or the IP address of a network management station (NMS) in the operating environment to which notification messages are to be sent.
- The ability to write notification configurations into nonvolatile memory.
Notification Generation Events
When BFD notifications are enabled with the snmp-serverenabletrapsbfd command with the session-up and session-down keywords, notification messages relating to specific events within Cisco IOS software are generated and sent to a specified NMS in the network.
For example, a bfdSessUp notification is sent to an NMS when BFD is configured.
Conversely, a bfdSessDown notification is generated and sent to an NMS when BFD is disabled.
Benefits of Bidirectional Forwarding Detection MIB
The BFD MIB provides the following benefits:
- Provides a standards-based SNMP interface for retrieving information about BFD.
- Forwards notification messages to a designated NMS for evaluation or action by network administrators.
Features and Technologies Related to BFD MIB
The BFD MIB feature is used in conjunction with the following features and technologies:
- Standards-based SNMP network management application
- BFD
Supported Objects in the BFD MIB
- BFD General Variables (scalars)
- BFD Session Table
The BFD Session Table specifies BFD session specific information. - BFD Session Performance Table
BFD Session Performance Table specifies BFD session performance counters and augments the BFD Session Table - BFD Session Mapping Table
The BFD Session Mapping Table maps the complex indexing of the BFD sessions to the flat BFDIndex used in the BFD Session Table. - BFD Notifications
BFD General Variables (scalars)
The following parameters apply globally to the router's BFD process:
- ciscoBfdAdminStatus is The global administrative status of BFD in this router. The value enabled denotes that the BFD Process is active on at least one interface; disabled means it is not enabled on any interface.
- ciscoBfdVersionNumber is the current default version number of the BFD protocol.
- ciscoBfdSessNotificationsEnable enables the emission of ciscoBfdSessUp and ciscoBfdSessDown notifications when set to true (1); otherwise these notifications are not emitted.
BFD Session Table
The BFD Session Table specifies BFD session specific information and contains the following entries:
- ciscoBfdSessTable describes the BFD sessions.
- ciscoBfdSessEntry describes BFD session.
- ciscoBfdSessIndex contains an index used to represent a unique BFD session on this device. This is an Index and it does not show up in the MIB walk as an object.
- ciscoBfdSessApplicationId contains an index used to indicate a local application which owns or maintains this BFD session. This application ID provides a convenient way to segregate sessions by the applications that maintain them. The value corresponds to the ClientID in the output of the showbfdclient command.
- ciscoBfdSessDiscriminator specifies the local discriminator for this BFD session, used to uniquely identify it.
- ciscoBfdSessRemoteDiscr specifies the session discriminator chosen by the remote system for this BFD session.
- ciscoBfdSessUdpPort specifies the UDP Port for BFD. The default value is the well-known value for this port.
- ciscoBfdSessState specifies he perceived state of the BFD session. Valid values are adminDown (1), down (2), init (3), and up (4).
- ciscoBfdSessRemoteHeardFlag specifies status of BFD packet reception from the remote system. The flag is set to true (1) if the local system is actively receiving BFD packets from the remote system. The flag is set to false (0) if the local system has not received BFD packets recently (within the detection time) or if the local system is attempting to tear down the BFD session. This object is applicable only if the the session is runing at version 0. If the session is running version 1, that value will return false.
- ciscoBfdSessDiag displays a diagnostic code specifying the local system's reason for the last transition of the session from up (1) to some other state. This object is accessible only for notifications and will not display in the MIB walk for the ciscoBfdSessTable. The codes are:
- ciscoBfdSessOperMode specifies the current operating mode of the BFD session. The supported values are:
- ciscoBfdSessDemandModeDesiredFlag indicates the local system's desire to use demand mode. It is set to true (1) if the local system wishes to use demand mode or false (0) if not. Demand Mode is not supported and therefore will always return a value of 0.
- ciscoBfdSessEchoFuncModeDesiredFlag indicates that the local system's desire to use echo mode. It is set to true (1) if the local system wishes to use Echo mode or false (0) if not.
- ciscoBfdSessControlPlanIndepFlag indicates if the local system's can function through a disruption of the control plane. It is set to true (1) if the local system BFD implementation is independent of the control plane. Otherwise, the value is set to false (0). This value will always return a value of 0.
- ciscoBfdSessAddrType specifies the IP address of the interface associated with this BFD session. Only values unknown (0), ipv4 (1) or ipv6 (2) are supported. A value of unknown (0) is allowed only when the outgoing interface is of type point-to-point, or when the BFD session is not associated with a specific interface.
- ciscoBfdSessAddr specifies the IP address of the interface associated with this BFD session. The value is set to zero when BFD session is not associated with a specific interface.
- ciscoBfdSessDesiredMinTxInterval specifies the minimum interval, in microseconds, that the local system would like to use when transmitting BFD control packets.
- ciscoBfdSessReqMinRxInterval specifies the minimum interval, in microseconds, between received BFD control packets the local system can support.
- ciscoBfdSessReqMinEchoRxInterval specifies the minimum interval, in microseconds, between received BFD Echo packets that this system can support. If echo mode is disabled for the configured interface for the session, this object will return value of 0.
- ciscoBfdSessDetectMult specifies the detect time multiplier.
- ciscoBfdSessStorType indicates the storage type for this object. The storage type for this entry is a read-only implementation that is always volatile.
- ciscoBfdSessRowStatus This object is a read-only implementation that is always active.
- ciscoBfdSessAuthPresFlag indicates the local system's desire to use Authentication. It is set to true (1) if the local system wishes the session to be authenticated or false (0) if not. Authentication is not supported and this object will always return a value of 0.
- ciscoBfdSessAuthenticationType specifies the authentication type used for this BFD session. This field is valid only when the authentication present bit is set. This object is not valid in BFD in Cisco IOS.
BFD Session Performance Table
ciscoBfdSessPerfTable specifies BFD session performance counters and augments the ciscoBfdSessionTable. This table contains the following entries:
- ciscoBfdSessPerfEntry includes an entry created by a BFD-enabled node for every BFD session. ciscoBfdCounterDiscontinuityTime is used to indicate potential discontinuity for all counter objects in this table.
- ciscoBfdSessPerfPktIn specifies the total number of BFD messages received for this BFD session.
- ciscoBfdSessPerfPktOut specifies the total number of BFD messages sent for this BFD session.
- ciscoBfdSessUpTime specifies the value of sysUpTime on the most recent occasion at which the session came up. If no such up event exists, the value is zero.
- ciscoBfdSessPerfLastSessDownTime specifies the value of sysUpTime on the most recent occasion at which the last time communication was lost with the neighbor. If no such down event exists, the value is zero.
- ciscoBfdSessPerfLastCommLostDiag specifies the BFD diag code for the last time communication was lost with the neighbor. This object is not supported.
- ciscoBfdSessPerfSessUpCount specifies the number of times this session has gone into the up state since the router last rebooted.
- ciscoBfdSessPerfDiscTime indicates the value of sysUpTime on the most recent occasion at which any one or more of the session counters suffered a discontinuity. The relevant counters are the specific instances associated with this BFD session of any Counter32 object contained in the BfdSessPerfTable. If no such discontinuities have occurred since the last re-initialization of the local management subsystem, then the value is zero. This object is not supported.
- ciscoBfdSessPerfPktInHC represents the total number of BFD messages received for this BFD session. It must be equal to the least significant 32 bits of ciscoBfdSessPerfPktIn if ciscoBfdSessPerfPktInHC is supported according to the rules spelled out in RFC2863.
- ciscoBfdSessPerfPktOutHC represents the total number of BFD messages transmitted for this BFD session. It must be equal to the least significant 32 bits of ciscoBfdSessPerfPktIn if ciscoBfdSessPerfPktOutHC is supported according to the rules spelled out in RFC2863.
BFD Session Mapping Table
The BFD Session Mapping Table maps the complex indexing of the BFD sessions to the flat BFDIndex used in the ciscoBfdSessionTable. If the value of the ciscoBfdSessAddr (an OID) has more that 111 sub-identifiers, then OIDs of column instances in this table have more than 128 sub-identifiers and cannot be accessed using SNMPv1, SNMPv2c, or SNMPv3. The BFD Session Mapping table contains the following entries:
- ciscoBfdSessMapEntry describes BFD session that is mapped to this index. If the value of the mplsInSegmentMapLabelPtrIndex (an OID) has more that 111 sub-identifiers, then OIDs of column instances in this table have more than 128 sub-identifiers and cannot be accessed using SNMPv1, SNMPv2c, or SNMPv3.
- ciscoBfdSessMapBfdIndex specifies the BfdIndex referred to by the indexes of this row. In essence, a mapping is provided between these indexes and the ciscoBfdSessTable. This is Index and does not show up in the MIB walk as an object.
See the MIB Walk for BFD MIB: Example in the configuration example section for an example of the mapping.
BFD Notifications
Notification contains the following entries. The range mode for this notification is not supported. Therefore, only a single notification is sent for one of the ciscoBfdSessTable entries representing this session.
- ciscoBfdSessUp generates a notfication when the ciscoBfdSessState object for one or more entries in ciscoBfdSessTable is about to enter the up (4) state from some other state. The value of ciscoBfdSessDiag is set equal to noDiagnostic(0).
- ciscoBfdSessDown generates a notification when the ciscoBfdSessState object for one or more entries in ciscoBfdSessTable is about to enter the down (2) or adminDown (1) states from some other state. The values of ciscoBfdSessDiag returns the Diag code providing the reason for this new state (that is, pathDown (5) or administrativelyDown (7)).
VPN Aware BFD MIB
The VPN Aware BFD MIB feature enables the BFD MIB to get VPN context information. The feature adds support for different contexts for different MPLS VPNs. Users of the MIB can display BFD processes for a given MPLS VPN. The VPN Aware BFD MIB feature does not change the syntax of the BFD MIB. It changes the number and types of entries within the tables.
The BFD MIB can show information about only one context at a time. With Cisco IOS Release 12.2(33)SRE, you can specify a context using an SNMP security name.
For information about making the BFD MIB VPN-aware, see the SNMP Support over VPNs--Context-Based Access document.
SNMP Contexts
SNMP contexts provide VPN users with a secure way of accessing MIB data. When a VPN is associated with a context, that VPN's specific MIB data exists in that context. Associating a VPN with a context enables service providers to manage networks with multiple VPNs. Creating and associating a context with a VPN enables a provider to prevent the users of one VPN from accessing information about users of other VPNs on the same networking device.
VPN-aware SNMP requires that SNMP manager and agent entities operating in a VPN environment agree on mapping between the SNMP security name and the VPN name. This mapping is created by you using different contexts for the SNMP data of different VPNs, which is accomplished through the configuration of the SNMP View-based Access Control Model MIB (SNMP-VACM-MIB). The SNMP-VACM-MIB is configured with views so that a user on a VPN with a security name is allowed access to the restricted object space within the context of only that VPN.
SNMP request messages undergo three phases of security and access control before a response message is sent back with the object values within a VPN context:
- The first security phase is authentication of the username. During this phase, the user is authorized for SNMP access.
- The second phase is access control. During this phase, the user is authorized for SNMP access to the group objects in the requested SNMP context.
- In the third phase, the user can access a particular instance of a table entry. With this third phase, complete retrieval can be based on the SNMP context name.
IP access lists can be configured and associated with SNMP community strings. This feature enables you to configure an association between VPN routing and forwarding (VRF) instances and SNMP community strings. When a VRF instance is associated with an SNMP community string, SNMP processes requests coming in for a particular community string only if they are received from the configured VRF. If the community string contained in the incoming packet does not have a VRF associated with it, it is processed only if it came in through a non-VRF interface.
VPN Aware BFD MIB Sessions
The VPN Aware BFD MIB feature supports an SNMP query to the BFD MIB for both global and VPN contexts. You can enter BFD queries on any VRF and on the core (global context). A query can differentiate between BFD sessions from different VPNs. BFD session information for a VPN stays in the context of that VPN. Therefore, the information from one VPN is not available to a user of a different VPN.
In an MPLS VPN, a service provider edge router (PE) might contain VRFs for several VPNs and a global routing table. To set up separate BFD processes for different VPNs on the same device, configure each VPN with a unique securityName, contextName, and View-based Access Control Model (VACM) view. The VPN securityName must be configured for the BFD MIB.
Note | To verify BFD session information for a specific VPN, use the show bfd neighbor vrfvpn-namedetail command. |
VPN Aware BFD MIB Notifications
The VPN Aware BFD MIB feature supports BFD notifications for multiple VPN contexts for BFD. BFD notifications can be generated for the global context and for different VPNs. You can cause notifications be sent to different NMS hosts for different BFD contexts. BFD notifications associated with a specific VRF are sent to the NMS designated for that VRF. BFD global notifications are sent to the NMS configured to receive global traps.
To enable BFD context notifications for the VPN Aware BFD MIB feature, use either the SNMP ciscoBfdSessNotificationEnable object (in the global BFD context only) or the following extended global configuration commands.
To enable BFD notifications for the global context, use the following commands on a provider edge (PE) router:
Router(config)# snmp-server host host-address traps community Router(config)# snmp-server enable traps bfd
To enable BFD notifications for a VPN context, use the following commands:
Router(config)# snmp-server host host-address vrf vrf-name version {v1 |v2c |v3} community community-string udp-port upd-port bfd Router(config)# snmp-server enable traps bfd
How to Configure the Bidirectional Forwarding Detection MIB
Enabling the SNMP Agent for BFD MIB Notifications
The SNMP agent for the BFD MIB is disabled by default. To enable the SNMP agent for BFD MIB notifications, perform the following steps.
DETAILED STEPS
Verifying the Status of the SNMP Agent
To verify that the SNMP agent has been enabled on a host network device, perform the following steps.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable
Example: Router# enable |
Enables privileged EXEC mode |
Step 2 |
show
running-config |
includesnmp
Example: Router# show running-config | include snmp |
Displays the running configuration on the target device and is used to examine the output for displayed SNMP information. |
Step 3 | show bfd neighbors detail
Example: Router# show bfd neighbors detail |
Displays BFD protocol parameters and timers for each neighbor. |
Example
The follows example displays the running configuration on the target device and its SNMP information.
Router# show running-config | include snmp
.
.
.
snmp-server community public rw
snmp-server community private ro
Any snmp-server statement that appears in the output and takes the form shown here verifies that SNMP has been enabled on that device.
Configuration Examples for the Bidirectional Forwarding Detection MIB
- Enabling the SNMP Agent to Enable BFD Notifications Example
- Viewing BFD Sessions Example
- MIB Walk for BFD MIB Example
Enabling the SNMP Agent to Enable BFD Notifications Example
The following example shows how to enable an SNMP agent on a host network device:
Router# configure terminal Router(config)# snmp-server community privatero
The following example shows how to allow read-only access to all BFD MIB objects relating to members of access list 4 that specify the comaccess community string. No other SNMP agents will have access to any BFD MIB objects.
Router(config)# snmp-server community comaccess ro 4
The following example shows how to enable a router to send BFD-related SNMP notifications or informs to an SNMP host.
Router(config)# snmp-server enable traps bfd
Viewing BFD Sessions Example
The following example show the output of the show bfd neighbors command, which displays BFD sessions and timers for each neighbor.
Router# show bfd neighbors NeighAddr LD/RD RH/RS State Int 10.0.0.2 7/7 Up Up Et1/2.2 10.1.0.2 6/6 Up Up Et1/2.5 DDDD::1 1/1 Up Up Et1/3 Router# show bfd neighbors detail NeighAddr LD/RD RH/RS State Int 10.0.0.2 9/8 Up Up Gi3/8.1 Session state is UP and using echo function with 50 ms interval. OurAddr: 10.0.0.1 Local Diag: 0, Demand mode: 0, Poll bit: 0 MinTxInt: 1000000, MinRxInt: 1000000, Multiplier: 5 Received MinRxInt: 1000000, Received Multiplier: 5 Holddown (hits): 0(0), Hello (hits): 1000(350) Rx Count: 352, Rx Interval (ms) min/max/avg: 1/1000/874 last: 464 ms ago Tx Count: 351, Tx Interval (ms) min/max/avg: 756/1000/876 last: 524 ms ago Elapsed time watermarks: 0 0 (last: 0) Registered protocols: CEF OSPF Uptime: 00:05:07 Last packet: Version: 1 - Diagnostic: 0 State bit: Up - Demand bit: 0 Poll bit: 0 - Final bit: 0 Multiplier: 5 - Length: 24 My Discr.: 8 - Your Discr.: 9 Min tx interval: 1000000 - Min rx interval: 1000000 Min Echo interval: 50000 NeighAddr LD/RD RH/RS State Int 10.1.0.2 6/6 Up Up Gi3/8.2 Session state is UP and using echo function with 50 ms interval. OurAddr: 10.1.0.1 Local Diag: 0, Demand mode: 0, Poll bit: 0 MinTxInt: 1000000, MinRxInt: 1000000, Multiplier: 5 Received MinRxInt: 1000000, Received Multiplier: 5 Holddown (hits): 0(0), Hello (hits): 1000(352) Rx Count: 352, Rx Interval (ms) min/max/avg: 1/1000/880 last: 248 ms ago Tx Count: 354, Tx Interval (ms) min/max/avg: 1/1000/875 last: 244 ms ago Elapsed time watermarks: 0 0 (last: 0) Registered protocols: CEF OSPF Uptime: 00:05:09 Last packet: Version: 1 - Diagnostic: 0 State bit: Up - Demand bit: 0 Poll bit: 0 - Final bit: 0 Multiplier: 5 - Length: 24 My Discr.: 6 - Your Discr.: 6 Min tx interval: 1000000 - Min rx interval: 1000000 Min Echo interval: 50000
MIB Walk for BFD MIB Example
This example shows sample output from a MIB walk of the BFD MIB:
ciscoBfdSessMapTable
ciscoBfdSessMapBfdIndex.1.7.1.4.10.1.0.1 = 65543 ciscoBfdSessMapBfdIndex.3.1.2.16.221.221.0.0.0.0.0.0.0.0.0.0.0.0.0.2 = 196609 ciscoBfdSessMapBfdIndex.4.6.1.4.40.4.0.1 = 262150 The MapTable index includes the following information about BFD sessions and clients: Index example: 1.7.1.4.10.1.0.1 1 - Client id 7 - Local discriminator 1 - IP address type (1 - IPv4, 2- IPv6) 4 - Length of next string (4 for IPv4 addresses or 16 for IPv6 addresses) 10.1.0.1 - IP address of the BFD session
ciscoBfdSessTable
ciscoBfdSessApplicationId.65543 = 1 ciscoBfdSessApplicationId.196609 = 3 ciscoBfdSessApplicationId.262150 = 4 ciscoBfdSessDiscriminator.65543 = 7 ciscoBfdSessDiscriminator.196609 = 1 ciscoBfdSessDiscriminator.262150 = 6 ciscoBfdSessRemoteDiscr.65543 = 7 ciscoBfdSessRemoteDiscr.196609 = 1 ciscoBfdSessRemoteDiscr.262150 = 6 ciscoBfdSessUdpPort.65543 = 3785 ciscoBfdSessUdpPort.196609 = 3784 ciscoBfdSessUdpPort.262150 = 3785 ciscoBfdSessState.65543 = up ciscoBfdSessState.196609 = up ciscoBfdSessState.262150 = up ciscoBfdSessRemoteHeardFlag.65543 = false ciscoBfdSessRemoteHeardFlag.196609 = false ciscoBfdSessRemoteHeardFlag.262150 = false ciscoBfdSessOperMode.65543 = asyncModeWEchoFun ciscoBfdSessOperMode.196609 = asynchModeWOEchoFun ciscoBfdSessOperMode.262150 = asyncModeWEchoFun ciscoBfdSessDemandModeDesiredFlag.65543 = false ciscoBfdSessDemandModeDesiredFlag.196609 = false ciscoBfdSessDemandModeDesiredFlag.262150 = false ciscoBfdSessEchoFuncModeDesiredFlag.65543 = true ciscoBfdSessEchoFuncModeDesiredFlag.196609 = false ciscoBfdSessEchoFuncModeDesiredFlag.262150 = true ciscoBfdSessControlPlanIndepFlag.65543 = false ciscoBfdSessControlPlanIndepFlag.196609 = false ciscoBfdSessControlPlanIndepFlag.262150 = false ciscoBfdSessAddrType.65543 = ipv4 ciscoBfdSessAddrType.196609 = ipv6 ciscoBfdSessAddrType.262150 = ipv4 ciscoBfdSessAddr.65543 = 28:01:00:01 ciscoBfdSessAddr.196609 = DD:DD:00:00:00:00:00:00:00:00:00:00:00:00:00:02 ciscoBfdSessAddr.262150 = 10:04:00:01 ciscoBfdSessDesiredMinTxInterval.65543 = 1000000 ciscoBfdSessDesiredMinTxInterval.196609 = 50000 ciscoBfdSessDesiredMinTxInterval.262150 = 1000000 ciscoBfdSessReqMinRxInterval.65543 = 1000000 ciscoBfdSessReqMinRxInterval.196609 = 50000 ciscoBfdSessReqMinRxInterval.262150 = 1000000 ciscoBfdSessReqMinEchoRxInterval.65543 = 50000 ciscoBfdSessReqMinEchoRxInterval.196609 = 0 ciscoBfdSessReqMinEchoRxInterval.262150 = 50000 ciscoBfdSessDetectMult.65543 = 5 ciscoBfdSessDetectMult.196609 = 5 ciscoBfdSessDetectMult.262150 = 5 ciscoBfdSessStorType.65543 = volatile ciscoBfdSessStorType.196609 = volatile ciscoBfdSessStorType.262150 = volatile ciscoBfdSessRowStatus.65543 = active ciscoBfdSessRowStatus.196609 = active ciscoBfdSessRowStatus.262150 = active ciscoBfdSessAuthPresFlag.65543 = false ciscoBfdSessAuthPresFlag.196609 = false ciscoBfdSessAuthPresFlag.262150 = false ciscoBfdSessAuthenticationType.65543 = 0 ciscoBfdSessAuthenticationType.196609 = 0 ciscoBfdSessAuthenticationType.262150 = 0
ciscoBfdSessPerfTable
ciscoBfdSessPerfPktIn.65543 = 246 ciscoBfdSessPerfPktIn.196609 = 5159 ciscoBfdSessPerfPktIn.262150 = 290 ciscoBfdSessPerfPktOut.65543 = 247 ciscoBfdSessPerfPktOut.196609 = 5416 ciscoBfdSessPerfPktOut.262150 = 291 ciscoBfdSessUpTime.65543 = 43376 ciscoBfdSessUpTime.196609 = 39781 ciscoBfdSessUpTime.262150 = 39736 ciscoBfdSessPerfLastSessDownTime.65543 = 0 ciscoBfdSessPerfLastSessDownTime.196609 = 0 ciscoBfdSessPerfLastSessDownTime.262150 = 0 ciscoBfdSessPerfLastCommLostDiag.65543 = 0 ciscoBfdSessPerfLastCommLostDiag.196609 = 0 ciscoBfdSessPerfLastCommLostDiag.262150 = 0 ciscoBfdSessPerfSessUpCount.65543 = 1 ciscoBfdSessPerfSessUpCount.196609 = 1 ciscoBfdSessPerfSessUpCount.262150 = 1 ciscoBfdSessPerfDiscTime.65543 = 0 ciscoBfdSessPerfDiscTime.196609 = 0 ciscoBfdSessPerfDiscTime.262150 = 0 ciscoBfdSessPerfPktInHC.65543 = 247 ciscoBfdSessPerfPktInHC.196609 = 5179 ciscoBfdSessPerfPktInHC.262150 = 291 ciscoBfdSessPerfPktOutHC.65543 = 248 ciscoBfdSessPerfPktOutHC.196609 = 5440 ciscoBfdSessPerfPktOutHC.262150 = 292
Additional References
MIBs
Technical Assistance
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for the Bidirectional Forwarding Detection MIB
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 1 | Feature Information for the Bidirectional Forwarding Detection MIB |
Feature Name |
Releases |
Feature Information |
---|---|---|
Bidirectional Forwarding Detection MIB, Version 2 |
12.2(33)SRE 15.1(1)SG |
The Bidirectional Forwarding Detection MIB feature enables the SNMP agent support in Cisco IOS software for BFD management, as implemented in the CISCO-IETF-BFD-MIB. The following commands were introduced or modified: |
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.