This section describes BFD session establishment modes, two detection modes, single- and multi-hop BFD, dynamic parameter modification, and binding of a BFD session to a VPN instance.
You can configure a static BFD session with automatically negotiated discriminators on a local device to enable the local device to interwork with the device on which a BFD session is dynamically set up. The static BFD session with automatically negotiated discriminators is used to monitor static routes.
This section describes how to configure a one-arm BFD echo session to rapidly detect faults in the direct link between a device that supports BFD and a device that does not support BFD.
This section describes how to configure passive BFD echo to implement interworking between devices that support the echo function. Passive BFD echo applies only to single-hop BFD sessions.
Configure association between BFD status and interface status to trigger fast route convergence. It can be used only in multicast IP single-hop BFD sessions and link-bundle single-hop BFD sessions.
Association between a BFD session and a sub-interface triggers rapid route convergence. Only a single-hop BFD session with a default multicast IP address can be bound to a sub-interface.
This section describes how to enable BFD to modify the port or link state table to speed up link fault detection. This function applies only to single-hop BFD sessions.
One BFD session is associated with only one interface. For example, when an interface is associated with a BFD session, the interface cannot be associated with another BFD session. In addition, when a BFD session is associated with an interface, the BFD session cannot be associated with another interface.
This section describes how to configure BFD sessions to enter the AdminDown state. After entering the AdminDown state, BFD sessions are not deleted but they do not monitor links.
This section describes how to configure BFD session authentication information, including the authentication algorithm, authentication key, authentication key ID, and negotiation timeout period, to improve network security.