Bfd Ospf
Test to check BFD protocol in OSPF.
Test Connection
Description
Tests BFD connection in OSPF.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 10.0.0.1/24 set interfaces ethernet eth0 address 192.168.1.1/24 set interfaces ethernet eth0 ip ospf bfd set interfaces ethernet eth0 ip ospf network point-to-point set protocols ospf area 0 network 10.0.0.0/24 set protocols ospf area 0 network 192.168.1.0/24 set protocols ospf parameters router-id 1.1.1.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces dummy dum0 address 10.0.0.2/24 set interfaces ethernet eth0 address 192.168.1.2/24 set interfaces ethernet eth0 ip ospf bfd set interfaces ethernet eth0 ip ospf network point-to-point set protocols ospf area 0 network 10.0.0.0/24 set protocols ospf area 0 network 192.168.1.0/24 set protocols ospf parameters router-id 2.2.2.2 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Ping IP address 192.168.1.2
from DUT0
:
admin@DUT0$ ping 192.168.1.2 count 1 size 56 timeout 1Show output
PING 192.168.1.2 (192.168.1.2) 56(84) bytes of data. 64 bytes from 192.168.1.2: icmp_seq=1 ttl=64 time=0.269 ms --- 192.168.1.2 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.269/0.269/0.269/0.000 ms
Step 4: Ping IP address 192.168.1.1
from DUT1
:
admin@DUT1$ ping 192.168.1.1 count 1 size 56 timeout 1Show output
PING 192.168.1.1 (192.168.1.1) 56(84) bytes of data. 64 bytes from 192.168.1.1: icmp_seq=1 ttl=64 time=0.325 ms --- 192.168.1.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.325/0.325/0.325/0.000 ms
Step 5: Run command protocols ospf show neighbor
at DUT0
and check if output matches the following regular expressions:
2.2.2.2
Show output
Neighbor ID Pri State Up Time Dead Time Address Interface RXmtL RqstL DBsmL 2.2.2.2 1 Init/- 0.637s 39.362s 192.168.1.2 eth0:192.168.1.1 0 0 0
Step 6: Run command protocols ospf show neighbor
at DUT1
and check if output matches the following regular expressions:
1.1.1.1
Show output
Neighbor ID Pri State Up Time Dead Time Address Interface RXmtL RqstL DBsmL 1.1.1.1 1 Full/- 0.726s 39.272s 192.168.1.1 eth0:192.168.1.2 1 0 0
Step 7: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
peer 192.168.1.2Show output
BFD Peers: peer 192.168.1.2 vrf default interface eth0 ID: 2824954577 Remote ID: 0 Active mode Status: down Downtime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 8: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
peer 192.168.1.1Show output
BFD Peers: peer 192.168.1.1 vrf default interface eth0 ID: 1976420657 Remote ID: 2824954577 Active mode Status: init Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: 50ms
Step 9: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 192.168.1.2 vrf default interface eth0 ID: 2824954577 Remote ID: 1976420657 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 10: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 192.168.1.1 vrf default interface eth0 ID: 1976420657 Remote ID: 2824954577 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Test Connection With Three Devices
Description
Tests BFD connection in OSPF between 3 devices.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 10.0.0.1/24 set interfaces ethernet eth0 address 192.168.1.1/24 set interfaces ethernet eth0 ip ospf bfd set interfaces ethernet eth0 ip ospf network point-to-point set interfaces ethernet eth1 address 192.168.2.1/24 set interfaces ethernet eth1 ip ospf bfd set interfaces ethernet eth1 ip ospf network point-to-point set protocols ospf area 0 network 10.0.0.0/24 set protocols ospf area 0 network 192.168.1.0/24 set protocols ospf area 1 network 192.168.2.0/24 set protocols ospf parameters router-id 1.1.1.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces dummy dum0 address 10.0.0.2/24 set interfaces ethernet eth0 address 192.168.2.2/24 set interfaces ethernet eth0 ip ospf bfd set interfaces ethernet eth0 ip ospf network point-to-point set interfaces ethernet eth1 address 192.168.3.2/24 set interfaces ethernet eth1 ip ospf bfd set interfaces ethernet eth1 ip ospf network point-to-point set protocols ospf area 0 network 10.0.0.0/24 set protocols ospf area 1 network 192.168.2.0/24 set protocols ospf area 2 network 192.168.3.0/24 set protocols ospf parameters router-id 2.2.2.2 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Set the following configuration in DUT2
:
set interfaces dummy dum0 address 10.0.0.3/24 set interfaces ethernet eth0 address 192.168.1.3/24 set interfaces ethernet eth0 ip ospf bfd set interfaces ethernet eth0 ip ospf network point-to-point set interfaces ethernet eth1 address 192.168.3.3/24 set interfaces ethernet eth1 ip ospf bfd set interfaces ethernet eth1 ip ospf network point-to-point set protocols ospf area 0 network 10.0.0.0/24 set protocols ospf area 0 network 192.168.1.0/24 set protocols ospf area 2 network 192.168.3.0/24 set protocols ospf parameters router-id 3.3.3.3 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Ping IP address 192.168.1.3
from DUT0
:
admin@DUT0$ ping 192.168.1.3 count 1 size 56 timeout 1Show output
PING 192.168.1.3 (192.168.1.3) 56(84) bytes of data. 64 bytes from 192.168.1.3: icmp_seq=1 ttl=64 time=0.655 ms --- 192.168.1.3 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.655/0.655/0.655/0.000 ms
Step 5: Ping IP address 192.168.2.2
from DUT0
:
admin@DUT0$ ping 192.168.2.2 count 1 size 56 timeout 1Show output
PING 192.168.2.2 (192.168.2.2) 56(84) bytes of data. 64 bytes from 192.168.2.2: icmp_seq=1 ttl=64 time=1.78 ms --- 192.168.2.2 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 1.779/1.779/1.779/0.000 ms
Step 6: Ping IP address 192.168.2.1
from DUT1
:
admin@DUT1$ ping 192.168.2.1 count 1 size 56 timeout 1Show output
PING 192.168.2.1 (192.168.2.1) 56(84) bytes of data. 64 bytes from 192.168.2.1: icmp_seq=1 ttl=64 time=0.719 ms --- 192.168.2.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.719/0.719/0.719/0.000 ms
Step 7: Ping IP address 192.168.3.3
from DUT1
:
admin@DUT1$ ping 192.168.3.3 count 1 size 56 timeout 1Show output
PING 192.168.3.3 (192.168.3.3) 56(84) bytes of data. 64 bytes from 192.168.3.3: icmp_seq=1 ttl=64 time=0.740 ms --- 192.168.3.3 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.740/0.740/0.740/0.000 ms
Step 8: Ping IP address 192.168.1.1
from DUT2
:
admin@DUT2$ ping 192.168.1.1 count 1 size 56 timeout 1Show output
PING 192.168.1.1 (192.168.1.1) 56(84) bytes of data. 64 bytes from 192.168.1.1: icmp_seq=1 ttl=64 time=4.39 ms --- 192.168.1.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 4.389/4.389/4.389/0.000 ms
Step 9: Ping IP address 192.168.3.2
from DUT2
:
admin@DUT2$ ping 192.168.3.2 count 1 size 56 timeout 1Show output
PING 192.168.3.2 (192.168.3.2) 56(84) bytes of data. 64 bytes from 192.168.3.2: icmp_seq=1 ttl=64 time=0.326 ms --- 192.168.3.2 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.326/0.326/0.326/0.000 ms
Step 10: Run command protocols ospf show neighbor
at DUT0
and check if output matches the following regular expressions:
3.3.3.3
Show output
Neighbor ID Pri State Up Time Dead Time Address Interface RXmtL RqstL DBsmL 3.3.3.3 1 Full/- 0.213s 39.783s 192.168.1.3 eth0:192.168.1.1 1 0 0 2.2.2.2 1 Full/- 3.663s 36.333s 192.168.2.2 eth1:192.168.2.1 1 0 0
Step 11: Run command protocols ospf show neighbor
at DUT0
and check if output matches the following regular expressions:
2.2.2.2
Show output
Neighbor ID Pri State Up Time Dead Time Address Interface RXmtL RqstL DBsmL 3.3.3.3 1 Full/- 0.362s 39.635s 192.168.1.3 eth0:192.168.1.1 1 0 0 2.2.2.2 1 Full/- 3.812s 36.185s 192.168.2.2 eth1:192.168.2.1 1 0 0
Step 12: Run command protocols ospf show neighbor
at DUT1
and check if output matches the following regular expressions:
1.1.1.1
Show output
Neighbor ID Pri State Up Time Dead Time Address Interface RXmtL RqstL DBsmL 1.1.1.1 1 Full/- 3.958s 32.349s 192.168.2.1 eth0:192.168.2.2 1 0 0 3.3.3.3 1 Full/- 0.506s 39.491s 192.168.3.3 eth1:192.168.3.2 1 0 0
Step 13: Run command protocols ospf show neighbor
at DUT1
and check if output matches the following regular expressions:
3.3.3.3
Show output
Neighbor ID Pri State Up Time Dead Time Address Interface RXmtL RqstL DBsmL 1.1.1.1 1 Full/- 4.105s 32.201s 192.168.2.1 eth0:192.168.2.2 1 0 0 3.3.3.3 1 Full/- 0.653s 39.343s 192.168.3.3 eth1:192.168.3.2 1 0 0
Step 14: Run command protocols ospf show neighbor
at DUT2
and check if output matches the following regular expressions:
1.1.1.1
Show output
Neighbor ID Pri State Up Time Dead Time Address Interface RXmtL RqstL DBsmL 1.1.1.1 1 Full/- 0.799s 32.057s 192.168.1.1 eth0:192.168.1.3 1 0 0 2.2.2.2 1 Full/- 0.798s 35.748s 192.168.3.2 eth1:192.168.3.3 1 0 0
Step 15: Run command protocols ospf show neighbor
at DUT2
and check if output matches the following regular expressions:
2.2.2.2
Show output
Neighbor ID Pri State Up Time Dead Time Address Interface RXmtL RqstL DBsmL 1.1.1.1 1 Full/- 0.971s 31.885s 192.168.1.1 eth0:192.168.1.3 1 0 0 2.2.2.2 1 Full/- 0.970s 35.577s 192.168.3.2 eth1:192.168.3.3 1 0 0
Step 16: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
peer 192.168.1.3Show output
BFD Peers: peer 192.168.1.3 vrf default interface eth0 ID: 4254837704 Remote ID: 533154143 Active mode Status: init Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: 50ms peer 192.168.2.2 vrf default interface eth1 ID: 926467156 Remote ID: 3403299316 Active mode Status: up Uptime: 3 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 17: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
peer 192.168.2.2Show output
BFD Peers: peer 192.168.1.3 vrf default interface eth0 ID: 4254837704 Remote ID: 533154143 Active mode Status: init Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: 50ms peer 192.168.2.2 vrf default interface eth1 ID: 926467156 Remote ID: 3403299316 Active mode Status: up Uptime: 3 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 18: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
peer 192.168.2.1Show output
BFD Peers: peer 192.168.3.3 vrf default interface eth1 ID: 1318530884 Remote ID: 1686929134 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms peer 192.168.2.1 vrf default interface eth0 ID: 3403299316 Remote ID: 926467156 Active mode Status: up Uptime: 4 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 19: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
peer 192.168.3.3Show output
BFD Peers: peer 192.168.3.3 vrf default interface eth1 ID: 1318530884 Remote ID: 1686929134 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms peer 192.168.2.1 vrf default interface eth0 ID: 3403299316 Remote ID: 926467156 Active mode Status: up Uptime: 4 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 20: Run command protocols bfd show peers
at DUT2
and check if output matches the following regular expressions:
peer 192.168.1.1Show output
BFD Peers: peer 192.168.3.2 vrf default interface eth1 ID: 1686929134 Remote ID: 1318530884 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms peer 192.168.1.1 vrf default interface eth0 ID: 533154143 Remote ID: 4254837704 Active mode Status: up Uptime: 0 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 21: Run command protocols bfd show peers
at DUT2
and check if output matches the following regular expressions:
peer 192.168.3.2Show output
BFD Peers: peer 192.168.3.2 vrf default interface eth1 ID: 1686929134 Remote ID: 1318530884 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms peer 192.168.1.1 vrf default interface eth0 ID: 533154143 Remote ID: 4254837704 Active mode Status: up Uptime: 0 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Test Profile
Description
Checks BFD profile in OSPF.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address 10.0.0.1/24 set interfaces ethernet eth0 address 192.168.1.1/24 set interfaces ethernet eth0 ip ospf bfd set interfaces ethernet eth0 ip ospf network point-to-point set protocols bfd profile PFL detect-multiplier 5 set protocols bfd profile PFL echo-interval 60 set protocols bfd profile PFL echo-mode set protocols bfd profile PFL passive-mode set protocols bfd profile PFL receive-interval 400 set protocols bfd profile PFL transmit-interval 400 set protocols ospf area 0 network 10.0.0.0/24 set protocols ospf area 0 network 192.168.1.0/24 set protocols ospf parameters router-id 1.1.1.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Modify the following configuration lines in DUT0
:
set interfaces ethernet eth0 ip ospf bfd profile PFL
Step 3: Set the following configuration in DUT1
:
set interfaces dummy dum0 address 10.0.0.2/24 set interfaces ethernet eth0 address 192.168.1.2/24 set interfaces ethernet eth0 ip ospf bfd set interfaces ethernet eth0 ip ospf network point-to-point set protocols ospf area 0 network 10.0.0.0/24 set protocols ospf area 0 network 192.168.1.0/24 set protocols ospf parameters router-id 2.2.2.2 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Ping IP address 192.168.1.2
from DUT0
:
admin@DUT0$ ping 192.168.1.2 count 1 size 56 timeout 1Show output
PING 192.168.1.2 (192.168.1.2) 56(84) bytes of data. 64 bytes from 192.168.1.2: icmp_seq=1 ttl=64 time=0.548 ms --- 192.168.1.2 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.548/0.548/0.548/0.000 ms
Step 5: Ping IP address 192.168.1.1
from DUT1
:
admin@DUT1$ ping 192.168.1.1 count 1 size 56 timeout 1Show output
PING 192.168.1.1 (192.168.1.1) 56(84) bytes of data. 64 bytes from 192.168.1.1: icmp_seq=1 ttl=64 time=0.325 ms --- 192.168.1.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.325/0.325/0.325/0.000 ms
Step 6: Run command protocols ospf show neighbor
at DUT0
and check if output matches the following regular expressions:
192.168.1.2
Show output
Neighbor ID Pri State Up Time Dead Time Address Interface RXmtL RqstL DBsmL 2.2.2.2 1 Init/- 0.649s 39.350s 192.168.1.2 eth0:192.168.1.1 0 0 0
Step 7: Run command protocols ospf show neighbor
at DUT1
and check if output matches the following regular expressions:
192.168.1.1
Show output
Neighbor ID Pri State Up Time Dead Time Address Interface RXmtL RqstL DBsmL 1.1.1.1 1 Full/- 1.793s 38.202s 192.168.1.1 eth0:192.168.1.2 1 0 0
Step 8: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
192.168.1.2
Show output
BFD Peers: peer 192.168.1.2 vrf default interface eth0 ID: 469797914 Remote ID: 2000526645 Passive mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 280/431/734 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 9: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
192.168.1.1
Show output
BFD Peers: peer 192.168.1.1 vrf default interface eth0 ID: 2000526645 Remote ID: 469797914 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms
Step 10: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 192.168.1.2 vrf default interface eth0 ID: 469797914 Remote ID: 2000526645 Passive mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 303/1008/4806 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 11: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 192.168.1.1 vrf default interface eth0 ID: 2000526645 Remote ID: 469797914 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms
Step 12: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Detect-multiplier: 5Show output
BFD Peers: peer 192.168.1.2 vrf default interface eth0 ID: 469797914 Remote ID: 2000526645 Passive mode Status: up Uptime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 334/958/4585 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 13: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Echo receive interval: 60msShow output
BFD Peers: peer 192.168.1.2 vrf default interface eth0 ID: 469797914 Remote ID: 2000526645 Passive mode Status: up Uptime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 289/389/541 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 14: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Echo transmission interval: 60msShow output
BFD Peers: peer 192.168.1.2 vrf default interface eth0 ID: 469797914 Remote ID: 2000526645 Passive mode Status: up Uptime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 289/1365/4317 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 15: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Passive modeShow output
BFD Peers: peer 192.168.1.2 vrf default interface eth0 ID: 469797914 Remote ID: 2000526645 Passive mode Status: up Uptime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 350/1673/4317 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 16: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Receive interval: 400msShow output
BFD Peers: peer 192.168.1.2 vrf default interface eth0 ID: 469797914 Remote ID: 2000526645 Passive mode Status: up Uptime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 346/1205/4317 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 17: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Transmission interval: 400msShow output
BFD Peers: peer 192.168.1.2 vrf default interface eth0 ID: 469797914 Remote ID: 2000526645 Passive mode Status: up Uptime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 346/723/2631 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms