[j-nsp] BFD between Cisco - Juniper when FRR is enabled does not torn down primary tunnel
David Ball
davidtball at gmail.com
Fri Apr 3 16:53:49 EDT 2009
How long does it take for your FRR to kick in? Is your logical or
physical link actually down (you mention both below) ? I imagine if
you want BFD-speed failover, you may want to look at 9.4, which
apparently supports BFD for LDP and RSVP sessions.
David
On 03/04/2009, Robert Kern <cj11st at gmail.com> wrote:
> Hi all,
>
> we have run into a problem with BFD between Cisco and Juniper box when
> MPLS-FRR is configured.
>
> ISIS is used as IGP protocol and one hop MPLS-TE tunnels are configured with
> link protection. BFD is configured on both sides (under IS-IS protocol).
> After primary logical link is dropped between Cisco-Juniper (simulating DWDM
> system), BFD session and isis adj are torn down on both sides. The problem
> is that Juniper does not signal to MPLS-TE FRR that physical interface is
> logicaly down and FRR should be used. Instead it keeps primary tunnel up
> showing faulty interface as outgoing. The result is that traffic is
> blackholed. On the other side Cisco re-routes traffic corectly.
>
> Am I missing some configuration or this is a known issue?
>
> Config on both sides (FRR without BFD works fine):
>
> ge-1/3/0
> description Link_to_Cisco;
> mtu 9110;
> hold-time up 0 down 0;
> unit 0
> family inet
> address 10.100.111.50/30;
>
> family iso;
> family inet6
> address 2A00:EE00:0:12:10:100:111:50/64;
>
> family mpls;
>
> protocols
> rsvp
> interface ge-1/3/0.0
> authentication-key
> "$9$9cAaCORSrvxNd9AIclKx7jHqmfzAtO1IcApclMXbwHqm"; ## SECRET-DATA
> bandwidth 850m;
> link-protection
> path
> 10.100.111.66 strict;
> 10.100.111.53 strict;
> mpls
> traffic-engineering mpls-forwarding;
> explicit-null;
> ipv6-tunneling;
> standby;
> label-switched-path Protect-ge020
> to 10.100.100.5;
> ldp-tunneling;
> link-protection;
> primary path1;
>
> path path1
> 10.100.111.49 strict;
> interface ge-1/3/0.0;
>
>
> isis
>
> lsp-lifetime 65000;
> spf-options
> delay 50;
> holddown 2000;
>
> topologies ipv6-unicast;
> overload timeout 600;
> traffic-engineering
> family inet
> shortcuts;
>
> family inet6
> shortcuts;
>
>
> level 1 disable;
> level 2
> authentication-key "$9$L04XVYoJD.P5bsfz3/0OxNd"; ## SECRET-DATA
> authentication-type md5;
> wide-metrics-only;
>
>
>
> interface ge-1/3/0.0
> point-to-point;
> bfd-liveness-detection
> version automatic;
> minimum-interval 300;
> minimum-receive-interval 300;
> multiplier 3;
>
> On Cisco side I have under interface:
>
> bfd interval 300 min_rx 300 multiplier 3
>
> and under router isis:
>
> bfd all-interfaces
>
>
> Regards,
>
> Robert
> _______________________________________________
> juniper-nsp mailing list juniper-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp
>
More information about the juniper-nsp
mailing list