Bfd Static Route6
Tests to check BFD protocol in static routes for IPv6.
Test Connection With Next Hop
Description
Checks connection between two devices with BFD in static routes using the gateway as the BFD peer.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address '3fff:10::100/64' set protocols static route6 '::/0' next-hop '3fff:10::200' bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address '3fff:10::200/64' set protocols static route6 '::/0' next-hop '3fff:10::100' bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
peer 3fff:10::200Show output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::200 (status: uninstalled)
Step 4: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::100 (status: uninstalled)
Step 5: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
peer 3fff:10::200Show output
BFD Peers: peer 3fff:10::200 vrf default ID: 3907310426 Remote ID: 0 Active mode Status: down Downtime: 4 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 6: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
BFD Peers: peer 3fff:10::100 vrf default ID: 2408158068 Remote ID: 0 Active mode Status: down Downtime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 7: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::200 (status: installed)
Step 8: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::100 (status: installed)
Step 9: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::200 vrf default ID: 3907310426 Remote ID: 2408158068 Active mode Status: up Uptime: 0 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 10: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::100 vrf default ID: 2408158068 Remote ID: 3907310426 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 11: Ping IP address 3fff:10::200
from DUT0
:
admin@DUT0$ ping 3fff:10::200 count 1 size 56 timeout 1Show output
PING 3fff:10::200(3fff:10::200) 56 data bytes 64 bytes from 3fff:10::200: icmp_seq=1 ttl=64 time=0.350 ms --- 3fff:10::200 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.350/0.350/0.350/0.000 ms
Step 12: Ping IP address 3fff:10::100
from DUT1
:
admin@DUT1$ ping 3fff:10::100 count 1 size 56 timeout 1Show output
PING 3fff:10::100(3fff:10::100) 56 data bytes 64 bytes from 3fff:10::100: icmp_seq=1 ttl=64 time=0.291 ms --- 3fff:10::100 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.291/0.291/0.291/0.000 ms
Test Connection With Next Hop And Interface
Description
Checks connection between two devices with BFD in static routes using the gateway as the BFD peer and an interface.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address '3fff:10::100/64' set protocols static route6 '::/0' next-hop '3fff:10::200' interface eth0 bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address '3fff:10::200/64' set protocols static route6 '::/0' next-hop '3fff:10::100' interface eth0 bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
peer 3fff:10::200Show output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::200 (status: uninstalled)
Step 4: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::100 (status: uninstalled)
Step 5: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
peer 3fff:10::200Show output
BFD Peers: peer 3fff:10::200 vrf default interface eth0 ID: 2979056514 Remote ID: 0 Active mode Status: down Downtime: 3 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 6: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
BFD Peers: peer 3fff:10::100 vrf default interface eth0 ID: 3747660196 Remote ID: 0 Active mode Status: down Downtime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 7: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::200 (status: installed)
Step 8: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::100 (status: installed)
Step 9: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::200 vrf default interface eth0 ID: 2979056514 Remote ID: 3747660196 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 10: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::100 vrf default interface eth0 ID: 3747660196 Remote ID: 2979056514 Active mode Status: up Uptime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 11: Ping IP address 3fff:10::200
from DUT0
:
admin@DUT0$ ping 3fff:10::200 count 1 size 56 timeout 1Show output
PING 3fff:10::200(3fff:10::200) 56 data bytes 64 bytes from 3fff:10::200: icmp_seq=1 ttl=64 time=9.38 ms --- 3fff:10::200 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 9.383/9.383/9.383/0.000 ms
Step 12: Ping IP address 3fff:10::100
from DUT1
:
admin@DUT1$ ping 3fff:10::100 count 1 size 56 timeout 1Show output
PING 3fff:10::100(3fff:10::100) 56 data bytes 64 bytes from 3fff:10::100: icmp_seq=1 ttl=64 time=0.359 ms --- 3fff:10::100 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.359/0.359/0.359/0.000 ms
Test Connection With Next Hop And Next Hop VRF
Description
Checks connection between two devices with BFD in static routes using the gateway as the BFD peer and a leaked route with a nexthop in the specified VRF ID.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address '3fff:10::100/64' set interfaces ethernet eth0 vrf VRF set protocols static route6 '::/0' next-hop '3fff:10::200' next-hop-vrf VRF bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrf VRF
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address '3fff:10::200/64' set interfaces ethernet eth0 vrf VRF set protocols static route6 '::/0' next-hop '3fff:10::100' next-hop-vrf VRF bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrf VRF
Step 3: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
peer 3fff:10::200Show output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::200 (status: uninstalled)
Step 4: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::100 (status: uninstalled)
Step 5: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
peer 3fff:10::200Show output
BFD Peers: peer 3fff:10::200 vrf VRF ID: 1840007010 Remote ID: 0 Active mode Status: down Downtime: 3 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 6: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
BFD Peers: peer 3fff:10::100 vrf VRF ID: 3944333212 Remote ID: 0 Active mode Status: down Downtime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 7: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::200 (status: installed)
Step 8: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::100 (status: installed)
Step 9: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::200 vrf VRF ID: 1840007010 Remote ID: 3944333212 Active mode Status: up Uptime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 10: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::100 vrf VRF ID: 3944333212 Remote ID: 1840007010 Active mode Status: up Uptime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 11: Ping IP address 3fff:10::200
from DUT0
:
admin@DUT0$ ping 3fff:10::200 count 1 size 56 timeout 1Show output
PING 3fff:10::200(3fff:10::200) 56 data bytes 64 bytes from 3fff:10::200: icmp_seq=1 ttl=64 time=0.353 ms --- 3fff:10::200 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.353/0.353/0.353/0.000 ms
Step 12: Ping IP address 3fff:10::100
from DUT1
:
admin@DUT1$ ping 3fff:10::100 count 1 size 56 timeout 1Show output
PING 3fff:10::100(3fff:10::100) 56 data bytes 64 bytes from 3fff:10::100: icmp_seq=1 ttl=64 time=0.422 ms --- 3fff:10::100 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.422/0.422/0.422/0.000 ms
Test Multihop Connection
Description
Checks multihop connection between two devices in different networks.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address '3fff:1::1/64' set interfaces ethernet eth0 address '3fff:10::100/64' set protocols static route6 '3fff:20::/64' next-hop '3fff:10::101' set protocols static route6 '3fff:2::/64' next-hop '3fff:20::200' bfd multihop set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces dummy dum0 address '3fff:2::1/64' set interfaces ethernet eth0 address '3fff:20::200/64' set protocols static route6 '3fff:10::/64' next-hop '3fff:20::201' set protocols static route6 '3fff:1::/64' next-hop '3fff:10::100' bfd multihop set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Set the following configuration in DUT2
:
set interfaces ethernet eth0 address '3fff:10::101/64' set interfaces ethernet eth1 address '3fff:20::201/64' set protocols static route6 '3fff:1::/64' next-hop '3fff:10::100' set protocols static route6 '3fff:2::/64' next-hop '3fff:20::200' set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
peer 3fff:20::200Show output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: 3fff:2::/64 peer 3fff:20::200 (status: uninstalled)
Step 5: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: 3fff:1::/64 peer 3fff:10::100 (status: uninstalled)
Step 6: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
peer 3fff:20::200Show output
BFD Peers: peer 3fff:20::200 multihop local-address 3fff:10::100 vrf default ID: 2758482140 Remote ID: 0 Active mode Minimum TTL: 2 Status: down Downtime: 3 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 7: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
BFD Peers: peer 3fff:10::100 multihop local-address 3fff:20::200 vrf default ID: 2314677691 Remote ID: 0 Active mode Minimum TTL: 2 Status: down Downtime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 8: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: 3fff:2::/64 peer 3fff:20::200 (status: installed)
Step 9: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: 3fff:1::/64 peer 3fff:10::100 (status: installed)
Step 10: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:20::200 multihop local-address 3fff:10::100 vrf default ID: 2758482140 Remote ID: 2314677691 Active mode Minimum TTL: 2 Status: up Uptime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 11: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::100 multihop local-address 3fff:20::200 vrf default ID: 2314677691 Remote ID: 2758482140 Active mode Minimum TTL: 2 Status: up Uptime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 12: Ping IP address 3fff:20::200
from DUT0
:
admin@DUT0$ ping 3fff:20::200 count 1 size 56 timeout 1Show output
PING 3fff:20::200(3fff:20::200) 56 data bytes 64 bytes from 3fff:20::200: icmp_seq=1 ttl=63 time=2.48 ms --- 3fff:20::200 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 2.484/2.484/2.484/0.000 ms
Step 13: Ping IP address 3fff:10::100
from DUT1
:
admin@DUT1$ ping 3fff:10::100 count 1 size 56 timeout 1Show output
PING 3fff:10::100(3fff:10::100) 56 data bytes 64 bytes from 3fff:10::100: icmp_seq=1 ttl=63 time=0.997 ms --- 3fff:10::100 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.997/0.997/0.997/0.000 ms
Test DUT0 Source IP
Description
Captures BFD packets and verifies the source address is correct when packets are sent from DUT0.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address '3fff:10::100/64' set protocols static route6 '::/0' next-hop '3fff:10::200' bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address '3fff:10::200/64' set protocols static route6 '::/0' next-hop '3fff:10::100' bfd source-ip '3fff:10::100' set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Test DUT1 Source IP
Description
Captures BFD packets and verifies the source address is correct when packets are sent from DUT1.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address '3fff:10::100/64' set protocols static route6 '::/0' next-hop '3fff:10::200' bfd source-ip '3fff:10::200' set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address '3fff:10::200/64' set protocols static route6 '::/0' next-hop '3fff:10::100' bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Test Profile
Description
Checks BFD profile in static routes.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address '3fff:10::100/64' set protocols bfd profile PFL detect-multiplier 5 set protocols bfd profile PFL echo-interval 60 set protocols bfd profile PFL echo-mode set protocols bfd profile PFL passive-mode set protocols bfd profile PFL receive-interval 400 set protocols bfd profile PFL transmit-interval 400 set protocols static route6 '::/0' next-hop '3fff:10::200' bfd profile PFL set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address '3fff:10::200/64' set protocols static route6 '::/0' next-hop '3fff:10::100' bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
3fff:10::200Show output
BFD Peers: peer 3fff:10::200 vrf default ID: 2935865372 Remote ID: 0 Passive mode Status: down Downtime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 4: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Detect-multiplier: 5Show output
BFD Peers: peer 3fff:10::200 vrf default ID: 2935865372 Remote ID: 0 Passive mode Status: down Downtime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 5: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Echo receive interval: 60msShow output
BFD Peers: peer 3fff:10::200 vrf default ID: 2935865372 Remote ID: 0 Passive mode Status: down Downtime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 6: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Echo transmission interval: 60msShow output
BFD Peers: peer 3fff:10::200 vrf default ID: 2935865372 Remote ID: 0 Passive mode Status: down Downtime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 7: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Passive modeShow output
BFD Peers: peer 3fff:10::200 vrf default ID: 2935865372 Remote ID: 0 Passive mode Status: down Downtime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 8: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Receive interval: 400msShow output
BFD Peers: peer 3fff:10::200 vrf default ID: 2935865372 Remote ID: 0 Passive mode Status: down Downtime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 9: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Transmission interval: 400msShow output
BFD Peers: peer 3fff:10::200 vrf default ID: 2935865372 Remote ID: 0 Passive mode Status: down Downtime: 3 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled