Bfd Static Route6
Tests to check BFD protocol in static routes for IPv6.
Test Connection With Next Hop
Description
Checks connection between two devices with BFD in static routes using the gateway as the BFD peer.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address '3fff:10::100/64' set protocols static route6 '::/0' next-hop '3fff:10::200' bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address '3fff:10::200/64' set protocols static route6 '::/0' next-hop '3fff:10::100' bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
peer 3fff:10::200Show output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF MON IPv4 Unicast: VRF MON IPv4 Multicast: VRF MON IPv6 Unicast: VRF TEST IPv4 Unicast: VRF TEST IPv4 Multicast: VRF TEST IPv6 Unicast: VRF VRF1 IPv4 Unicast: VRF VRF1 IPv4 Multicast: VRF VRF1 IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::200 (status: uninstalled) VRF test IPv4 Unicast: VRF test IPv4 Multicast: VRF test IPv6 Unicast: VRF test2 IPv4 Unicast: VRF test2 IPv4 Multicast: VRF test2 IPv6 Unicast:
Step 4: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::100 (status: uninstalled)
Step 5: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
peer 3fff:10::200Show output
BFD Peers: peer 3fff:10::200 vrf default ID: 3109197368 Remote ID: 0 Active mode Status: down Downtime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 6: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
BFD Peers: peer 3fff:10::100 vrf default ID: 654132281 Remote ID: 0 Active mode Status: down Downtime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 7: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF MON IPv4 Unicast: VRF MON IPv4 Multicast: VRF MON IPv6 Unicast: VRF TEST IPv4 Unicast: VRF TEST IPv4 Multicast: VRF TEST IPv6 Unicast: VRF VRF1 IPv4 Unicast: VRF VRF1 IPv4 Multicast: VRF VRF1 IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::200 (status: installed) VRF test IPv4 Unicast: VRF test IPv4 Multicast: VRF test IPv6 Unicast: VRF test2 IPv4 Unicast: VRF test2 IPv4 Multicast: VRF test2 IPv6 Unicast:
Step 8: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::100 (status: installed)
Step 9: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::200 vrf default ID: 3109197368 Remote ID: 654132281 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 10: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::100 vrf default ID: 654132281 Remote ID: 3109197368 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 11: Ping IP address 3fff:10::200
from DUT0
:
admin@DUT0$ ping 3fff:10::200 count 1 size 56 timeout 1Show output
PING 3fff:10::200(3fff:10::200) 56 data bytes 64 bytes from 3fff:10::200: icmp_seq=1 ttl=64 time=0.191 ms --- 3fff:10::200 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.191/0.191/0.191/0.000 ms
Step 12: Ping IP address 3fff:10::100
from DUT1
:
admin@DUT1$ ping 3fff:10::100 count 1 size 56 timeout 1Show output
PING 3fff:10::100(3fff:10::100) 56 data bytes 64 bytes from 3fff:10::100: icmp_seq=1 ttl=64 time=0.191 ms --- 3fff:10::100 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.191/0.191/0.191/0.000 ms
Test Connection With Next Hop And Interface
Description
Checks connection between two devices with BFD in static routes using the gateway as the BFD peer and an interface.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address '3fff:10::100/64' set protocols static route6 '::/0' next-hop '3fff:10::200' interface eth0 bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address '3fff:10::200/64' set protocols static route6 '::/0' next-hop '3fff:10::100' interface eth0 bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
peer 3fff:10::200Show output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF MON IPv4 Unicast: VRF MON IPv4 Multicast: VRF MON IPv6 Unicast: VRF TEST IPv4 Unicast: VRF TEST IPv4 Multicast: VRF TEST IPv6 Unicast: VRF VRF1 IPv4 Unicast: VRF VRF1 IPv4 Multicast: VRF VRF1 IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::200 (status: uninstalled) VRF test IPv4 Unicast: VRF test IPv4 Multicast: VRF test IPv6 Unicast: VRF test2 IPv4 Unicast: VRF test2 IPv4 Multicast: VRF test2 IPv6 Unicast:
Step 4: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::100 (status: uninstalled)
Step 5: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
peer 3fff:10::200Show output
BFD Peers: peer 3fff:10::200 vrf default interface eth0 ID: 1934479345 Remote ID: 0 Active mode Status: down Downtime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 6: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
BFD Peers: peer 3fff:10::100 vrf default interface eth0 ID: 1142073436 Remote ID: 0 Active mode Status: down Downtime: 0 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 7: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF MON IPv4 Unicast: VRF MON IPv4 Multicast: VRF MON IPv6 Unicast: VRF TEST IPv4 Unicast: VRF TEST IPv4 Multicast: VRF TEST IPv6 Unicast: VRF VRF1 IPv4 Unicast: VRF VRF1 IPv4 Multicast: VRF VRF1 IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::200 (status: installed) VRF test IPv4 Unicast: VRF test IPv4 Multicast: VRF test IPv6 Unicast: VRF test2 IPv4 Unicast: VRF test2 IPv4 Multicast: VRF test2 IPv6 Unicast:
Step 8: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::100 (status: installed)
Step 9: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::200 vrf default interface eth0 ID: 1934479345 Remote ID: 1142073436 Active mode Status: up Uptime: 0 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 10: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::100 vrf default interface eth0 ID: 1142073436 Remote ID: 1934479345 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 11: Ping IP address 3fff:10::200
from DUT0
:
admin@DUT0$ ping 3fff:10::200 count 1 size 56 timeout 1Show output
PING 3fff:10::200(3fff:10::200) 56 data bytes 64 bytes from 3fff:10::200: icmp_seq=1 ttl=64 time=0.193 ms --- 3fff:10::200 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.193/0.193/0.193/0.000 ms
Step 12: Ping IP address 3fff:10::100
from DUT1
:
admin@DUT1$ ping 3fff:10::100 count 1 size 56 timeout 1Show output
PING 3fff:10::100(3fff:10::100) 56 data bytes 64 bytes from 3fff:10::100: icmp_seq=1 ttl=64 time=0.204 ms --- 3fff:10::100 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.204/0.204/0.204/0.000 ms
Test Connection With Next Hop And Next Hop VRF
Description
Checks connection between two devices with BFD in static routes using the gateway as the BFD peer and a leaked route with a nexthop in the specified VRF ID.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address '3fff:10::100/64' set interfaces ethernet eth0 vrf VRF set protocols static route6 '::/0' next-hop '3fff:10::200' next-hop-vrf VRF bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrf VRF
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address '3fff:10::200/64' set interfaces ethernet eth0 vrf VRF set protocols static route6 '::/0' next-hop '3fff:10::100' next-hop-vrf VRF bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrf VRF
Step 3: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
peer 3fff:10::200Show output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF MON IPv4 Unicast: VRF MON IPv4 Multicast: VRF MON IPv6 Unicast: VRF TEST IPv4 Unicast: VRF TEST IPv4 Multicast: VRF TEST IPv6 Unicast: VRF VRF1 IPv4 Unicast: VRF VRF1 IPv4 Multicast: VRF VRF1 IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::200 (status: uninstalled) VRF test IPv4 Unicast: VRF test IPv4 Multicast: VRF test IPv6 Unicast: VRF test2 IPv4 Unicast: VRF test2 IPv4 Multicast: VRF test2 IPv6 Unicast:
Step 4: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::100 (status: uninstalled)
Step 5: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
peer 3fff:10::200Show output
BFD Peers: peer 3fff:10::200 vrf VRF ID: 4153453459 Remote ID: 0 Active mode Status: down Downtime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 6: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
BFD Peers: peer 3fff:10::100 vrf VRF ID: 32433785 Remote ID: 0 Active mode Status: down Downtime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 7: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF MON IPv4 Unicast: VRF MON IPv4 Multicast: VRF MON IPv6 Unicast: VRF TEST IPv4 Unicast: VRF TEST IPv4 Multicast: VRF TEST IPv6 Unicast: VRF VRF1 IPv4 Unicast: VRF VRF1 IPv4 Multicast: VRF VRF1 IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::200 (status: installed) VRF test IPv4 Unicast: VRF test IPv4 Multicast: VRF test IPv6 Unicast: VRF test2 IPv4 Unicast: VRF test2 IPv4 Multicast: VRF test2 IPv6 Unicast:
Step 8: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: ::/0 peer 3fff:10::100 (status: installed)
Step 9: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::200 vrf VRF ID: 4153453459 Remote ID: 32433785 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 10: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::100 vrf VRF ID: 32433785 Remote ID: 4153453459 Active mode Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 11: Ping IP address 3fff:10::200
from DUT0
:
admin@DUT0$ ping 3fff:10::200 count 1 size 56 timeout 1Show output
PING 3fff:10::200(3fff:10::200) 56 data bytes 64 bytes from 3fff:10::200: icmp_seq=1 ttl=64 time=0.158 ms --- 3fff:10::200 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.158/0.158/0.158/0.000 ms
Step 12: Ping IP address 3fff:10::100
from DUT1
:
admin@DUT1$ ping 3fff:10::100 count 1 size 56 timeout 1Show output
PING 3fff:10::100(3fff:10::100) 56 data bytes 64 bytes from 3fff:10::100: icmp_seq=1 ttl=64 time=0.209 ms --- 3fff:10::100 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.209/0.209/0.209/0.000 ms
Test Multihop Connection
Description
Checks multihop connection between two devices in different networks.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces dummy dum0 address '3fff:1::1/64' set interfaces ethernet eth0 address '3fff:10::100/64' set protocols static route6 '3fff:20::/64' next-hop '3fff:10::101' set protocols static route6 '3fff:2::/64' next-hop '3fff:20::200' bfd multihop set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces dummy dum0 address '3fff:2::1/64' set interfaces ethernet eth0 address '3fff:20::200/64' set protocols static route6 '3fff:10::/64' next-hop '3fff:20::201' set protocols static route6 '3fff:1::/64' next-hop '3fff:10::100' bfd multihop set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Set the following configuration in DUT2
:
set interfaces ethernet eth0 address '3fff:10::101/64' set interfaces ethernet eth1 address '3fff:20::201/64' set protocols static route6 '3fff:1::/64' next-hop '3fff:10::100' set protocols static route6 '3fff:2::/64' next-hop '3fff:20::200' set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
peer 3fff:20::200Show output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF MON IPv4 Unicast: VRF MON IPv4 Multicast: VRF MON IPv6 Unicast: VRF TEST IPv4 Unicast: VRF TEST IPv4 Multicast: VRF TEST IPv6 Unicast: VRF VRF1 IPv4 Unicast: VRF VRF1 IPv4 Multicast: VRF VRF1 IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: 3fff:2::/64 peer 3fff:20::200 (status: uninstalled) VRF test IPv4 Unicast: VRF test IPv4 Multicast: VRF test IPv6 Unicast: VRF test2 IPv4 Unicast: VRF test2 IPv4 Multicast: VRF test2 IPv6 Unicast:
Step 5: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: 3fff:1::/64 peer 3fff:10::100 (status: uninstalled)
Step 6: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
peer 3fff:20::200Show output
BFD Peers: peer 3fff:20::200 multihop local-address 3fff:10::100 vrf default ID: 4074340723 Remote ID: 0 Active mode Minimum TTL: 2 Status: down Downtime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 7: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
peer 3fff:10::100Show output
BFD Peers: peer 3fff:10::100 multihop local-address 3fff:20::200 vrf default ID: 1881028511 Remote ID: 0 Active mode Minimum TTL: 2 Status: down Downtime: 0 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 8: Run command protocols bfd show static route
at DUT0
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF MON IPv4 Unicast: VRF MON IPv4 Multicast: VRF MON IPv6 Unicast: VRF TEST IPv4 Unicast: VRF TEST IPv4 Multicast: VRF TEST IPv6 Unicast: VRF VRF1 IPv4 Unicast: VRF VRF1 IPv4 Multicast: VRF VRF1 IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: 3fff:2::/64 peer 3fff:20::200 (status: installed) VRF test IPv4 Unicast: VRF test IPv4 Multicast: VRF test IPv6 Unicast: VRF test2 IPv4 Unicast: VRF test2 IPv4 Multicast: VRF test2 IPv6 Unicast:
Step 9: Run command protocols bfd show static route
at DUT1
and check if output matches the following regular expressions:
status: installedShow output
Showing BFD monitored static routes: Next hops: VRF BFD IPv4 Unicast: VRF BFD IPv4 Multicast: VRF BFD IPv6 Unicast: VRF BGP IPv4 Unicast: VRF BGP IPv4 Multicast: VRF BGP IPv6 Unicast: VRF default IPv4 Unicast: VRF default IPv4 Multicast: VRF default IPv6 Unicast: 3fff:1::/64 peer 3fff:10::100 (status: installed)
Step 10: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:20::200 multihop local-address 3fff:10::100 vrf default ID: 4074340723 Remote ID: 1881028511 Active mode Minimum TTL: 2 Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 11: Run command protocols bfd show peers
at DUT1
and check if output matches the following regular expressions:
Status: upShow output
BFD Peers: peer 3fff:10::100 multihop local-address 3fff:20::200 vrf default ID: 1881028511 Remote ID: 4074340723 Active mode Minimum TTL: 2 Status: up Uptime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms Echo transmission interval: disabled Remote timers: Detect-multiplier: 3 Receive interval: 300ms Transmission interval: 300ms Echo receive interval: 50ms
Step 12: Ping IP address 3fff:20::200
from DUT0
:
admin@DUT0$ ping 3fff:20::200 count 1 size 56 timeout 1Show output
PING 3fff:20::200(3fff:20::200) 56 data bytes 64 bytes from 3fff:20::200: icmp_seq=1 ttl=63 time=0.263 ms --- 3fff:20::200 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.263/0.263/0.263/0.000 ms
Step 13: Ping IP address 3fff:10::100
from DUT1
:
admin@DUT1$ ping 3fff:10::100 count 1 size 56 timeout 1Show output
PING 3fff:10::100(3fff:10::100) 56 data bytes 64 bytes from 3fff:10::100: icmp_seq=1 ttl=63 time=0.291 ms --- 3fff:10::100 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.291/0.291/0.291/0.000 ms
Test DUT0 Source IP
Description
Captures BFD packets and verifies the source address is correct when packets are sent from DUT0.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address '3fff:10::100/64' set protocols static route6 '::/0' next-hop '3fff:10::200' bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address '3fff:10::200/64' set protocols static route6 '::/0' next-hop '3fff:10::100' bfd source-ip '3fff:10::100' set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Test DUT1 Source IP
Description
Captures BFD packets and verifies the source address is correct when packets are sent from DUT1.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address '3fff:10::100/64' set protocols static route6 '::/0' next-hop '3fff:10::200' bfd source-ip '3fff:10::200' set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address '3fff:10::200/64' set protocols static route6 '::/0' next-hop '3fff:10::100' bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Test Profile
Description
Checks BFD profile in static routes.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address '3fff:10::100/64' set protocols bfd profile PFL detect-multiplier 5 set protocols bfd profile PFL echo-interval 60 set protocols bfd profile PFL echo-mode set protocols bfd profile PFL passive-mode set protocols bfd profile PFL receive-interval 400 set protocols bfd profile PFL transmit-interval 400 set protocols static route6 '::/0' next-hop '3fff:10::200' bfd profile PFL set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT1
:
set interfaces ethernet eth0 address '3fff:10::200/64' set protocols static route6 '::/0' next-hop '3fff:10::100' bfd set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
3fff:10::200Show output
BFD Peers: peer 3fff:10::200 vrf default ID: 1711805529 Remote ID: 0 Passive mode Status: down Downtime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 4: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Detect-multiplier: 5Show output
BFD Peers: peer 3fff:10::200 vrf default ID: 1711805529 Remote ID: 0 Passive mode Status: down Downtime: 1 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 5: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Echo receive interval: 60msShow output
BFD Peers: peer 3fff:10::200 vrf default ID: 1711805529 Remote ID: 0 Passive mode Status: down Downtime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 6: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Echo transmission interval: 60msShow output
BFD Peers: peer 3fff:10::200 vrf default ID: 1711805529 Remote ID: 0 Passive mode Status: down Downtime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 7: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Passive modeShow output
BFD Peers: peer 3fff:10::200 vrf default ID: 1711805529 Remote ID: 0 Passive mode Status: down Downtime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 8: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Receive interval: 400msShow output
BFD Peers: peer 3fff:10::200 vrf default ID: 1711805529 Remote ID: 0 Passive mode Status: down Downtime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled
Step 9: Run command protocols bfd show peers
at DUT0
and check if output matches the following regular expressions:
Transmission interval: 400msShow output
BFD Peers: peer 3fff:10::200 vrf default ID: 1711805529 Remote ID: 0 Passive mode Status: down Downtime: 2 second(s) Diagnostics: ok Remote diagnostics: ok Peer Type: dynamic RTT min/avg/max: 0/0/0 usec Local timers: Detect-multiplier: 5 Receive interval: 400ms Transmission interval: 400ms Echo receive interval: 60ms Echo transmission interval: 60ms Remote timers: Detect-multiplier: 3 Receive interval: 1000ms Transmission interval: 1000ms Echo receive interval: disabled