BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45



Similar documents
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System

Introducing Basic MPLS Concepts

The Complete IS-IS Routing Protocol

MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned

MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned. Richard A Steenbergen <ras@gt-t.net>

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

Department of Communications and Networking. S /3133 Networking Technology, Laboratory course A/B

ENSURING RAPID RESTORATION IN JUNOS OS-BASED NETWORKS

Ethernet over MPLS tests

MPLS Concepts. Overview. Objectives

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond

INTRODUCTION TO L2VPNS

100Gigabit and Beyond: Increasing Capacity in IP/MPLS Networks Today Rahul Vir Product Line Manager Foundry Networks

How To Make A Network Secure

Introduction to HA Technologies: SSO/NSF with GR and/or NSR. Ken Weissner / kweissne@cisco.com Systems and Technology Architecture, Cisco Systems

Junos MPLS and VPNs (JMV)

Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor

Boosting Capacity Utilization in MPLS Networks using Load-Sharing MPLS JAPAN Sanjay Khanna Foundry Networks

Measuring IP Network Routing Convergence. A new approach to the problem

MPLS Pseudowire Innovations: The Next Phase Technology for Today s Service Providers

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

MPLS. A Tutorial. Paresh Khatri. paresh.khatri@alcatel-lucent.com.au

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Fast Reroute for Triple Play Networks

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

IPv6 over IPv4/MPLS Networks: The 6PE approach

Route Discovery Protocols

MPLS-based Layer 3 VPNs

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Building A Cheaper Peering Router. (Actually it s more about buying a cheaper router and applying some routing tricks)

Cisco Exam CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

- Multiprotocol Label Switching -

Interconnecting Data Centers Using VPLS

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL

Link-State Routing Protocols

Understanding Virtual Router and Virtual Systems

High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0

Redundancy & the Netnod Internet Exchange Points

Connection-Oriented Ethernet: Operational and Deployment Considerations

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

BGP Convergence in much less than a second Clarence Filsfils - cf@cisco.com

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

Fast Reroute Techniques in MPLS Networks. George Swallow

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

IxNetwork TM MPLS-TP Emulation

DD2490 p Routing and MPLS/IP. Olof Hagsand KTH CSC

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

BGP as an IGP for Carrier/Enterprise Networks

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

MPLS - A Choice of Signaling Protocol

Implementing Cisco MPLS

How To Understand Bg

IMPLEMENTING CISCO MPLS V2.3 (MPLS)

How To Understand The Benefits Of An Mpls Network

Project Report on Traffic Engineering and QoS with MPLS and its applications

Kingston University London

How Routers Forward Packets

IP over Optical Networks - A Framework draft-ip-optical-framework-01.txt

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

HP Networking BGP and MPLS technology training

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

Introduction to MPLS-based VPNs

CS551 External v.s. Internal BGP

MPLS is the enabling technology for the New Broadband (IP) Public Network

Protection Methods in Traffic Engineering MPLS Networks

Chapter 4. Distance Vector Routing Protocols

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

MPLS L2VPN (VLL) Technology White Paper

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh

EVOLVING TO END-TO-END MPLS ARCHITECTURES Alcatel-Lucent Enables Seamless,

Brocade to Cisco Comparisons

Administrative Distance

ISIS for ISPs. ISP/IXP Workshops

QoS Implementation For MPLS Based Wireless Networks

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

KT The Value Networking Company

Junos OS. MPLS Configuration Guide for Security Devices. Release Published: Copyright 2012, Juniper Networks, Inc.

MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at:

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

DOS ATTACK PREVENTION ON A JUNIPER M/T-SERIES ROUTER

GregSowell.com. Mikrotik Routing

Testing Juniper Networks M40 Router MPLS Interoperability with Cisco Systems 7513 and Routers

Routing Protocol - BGP

Content CHAPTER 1 MPLS OVERVIEW

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

Designing and Developing Scalable IP Networks

IPv6 over MPLS VPN. Contents. Prerequisites. Document ID: Requirements

Scaling. 8.1 SPF Enhancements

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Evolution to Consolidated Network Layers

Course Contents CCNP (CISco certified network professional)

Objectives. Router as a Computer. Router components and their functions. Router components and their functions

Transcription:

BFD (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45

What is BFD? BFD provides a method to validate the operation of the forwarding plane between two routers. Upon detecting a failure, triggers an action in a routing protocol (severing a session or adjacency). Operates in two modes: Asynchronous Demand In either mode, BFD provides an Echo function in which one side can request its neighbor to loop back a series of packets. 2

Why would an operator use this? BFD can rapidly propagate awareness of forwarding plane failures up to routing/signaling protocols. Relying solely upon hellos, KEEPALIVEs, etc. to validate forwarding behaviors can be a bad idea. Routing/signaling protocols tend to be treated differently than forwarded traffic. Most routing/signaling protocol implementations are not designed to operate with sub-second keepalive intervals. Often, BFD runs on the line card, not the route processor, so it is unaffected by RP CPU utilization. 3

Understanding the layers 4

Router architectures and BFD An example of BFD in a distributed router architecture Route Processor IGP BGP SNMP Telnet/SSH BFD Master Linecard BFD Agent FIB Downloader Linecard BFD Agent FIB Downloader Linecard BFD Agent FIB Downloader 5

What protocols does BFD work with? Static routes IGPs (OSPF, IS-IS) BGP (ebgp, ibgp) LDP RSVP 6

Static Routes Static routes only use next-hop reachability information to determine whether they are valid. BFD provides a nice alternative to validate the forwarding path and provide liveliness detection for the actual next-hop. 7

IGP Some mechanisms exist within the IGP to determine a failure rapidly (even at sub-second intervals). These capabilities ( fast hellos ) only work by verifying the IGP keepalive mechanisms. IGP protocols generally are punted to the route-processor in a distributed system, often bypassing standard packet forwarding. Because IGPs generally run on the route-processor, heavy CPU usage can cause IGP adjacencies to fail. BFD can help by severing an IGP adjacency in the event of forwarding path failure. 8

BGP Like IGPs, BGP has its own keepalive mechanism. BGP tears down a session when it has not received a KEEPALIVE message from its neighbor before the hold timer expires. BGP is generally executed on route-processors, just like an IGP, so high RP CPU utilization can also cause BGP failure. BFD can shutdown the BGP session in under a second after a forwarding path failure. 9

ibgp BFD can be enabled on an ibgp session between router loopbacks to verify forwarding path. Can be an alternative to reliance upon the IGP to notify you of a router going offline. No longer need to rely upon event-driven or periodic nexthop scanning. Can improve ibgp convergence by rapidly detecting BGP neighbor failure. 10

ebgp BGP timers aren t great for fast failure detection. BFD is great for situations where: You and your neighbor have an L2 device in the middle. (like Internet Exchange LANs or MPLS transport) Transport between neighbors lacks reliable link state notification. (wavelengths) BFD allows for ranges to be specified for minimum detection thresholds. Neighbors may have various timers due to their own limitations or preferences. Timers are continuously negotiated and can be altered at any time. 11

MPLS LDP BFD can be enabled to provide OAM on a particular LDP FEC. The LSP is bootstrapped with LSP-Ping and BFD can be operated at a variety of intervals. This is useful for informational purposes as LDP really doesn t have a mechanism to select an alternate path (it sticks with what the IGP tells it). One benefit is the ability for LDP to fork across ECMP paths in a network, providing validation across the ECMP tree. 12

MPLS LDP and ECMPs (cont d) BFD Session #1 to R6 R2 R4 R1 R6 BFD Session #2 to R6 R3 R5 13

MPLS RSVP BFD can be used with RSVP to provide liveliness detection on a path built by RSVP-TE. Upon BFD declaring a failure on a particular RSVP-TE path, the head-end router (the router initiating the BFD session) can trigger the use of secondary paths. This provides an operator with a nice method to verify multiple forwarding paths as well as provide an automated method to select an alternate path. 14

MPLS RSVP Point-to-Multipoint LSPs BFD can be used to operate within the Point-to-Multipoint environment to support BFD for each downstream router PE. P2MP LSPs are very popular for providing linear broadcast of media, typically with the requirement of rapid-convergence (FRR), bandwidth-reservation and explicit routing (SRLG-free paths). 15

Pseudowires BFD can be used with a pseudowires VCCV (Virtual Circuit Connectivity Verification) control channel. This provides a rapid method to detect faults between the endpoints of a pseudowire. The fault information could then be translated to other protocols native OAM capabilities (ATM, FR, Ethernet). 16

What are the caveats? Two main ones: 1. BFD can have high resource demands depending on your scale. 2. BFD is not visible to Layer 2 bundling protocols. (Ethernet LAGs or POS bundles) 17

BFD Resource Demands The number of BFD sessions on each linecard or router can impact how well BFD scales for you. Each unique platform has its own limits. Bundled interfaces supporting min tx/rx of 250ms or 2 seconds have been seen. In some cases, BFD instances on a router may need to be operated on the route-processor depending on the implementation (non-adjacency based BFD sessions). Test your platform first before deploying BFD. Attempt to put load on the RP or LC CPU with your configured settings. This can be done by: Executing CPU-heavy commands Flooding packets to TTL expire on the destination 18

BFD Resource Demands (cont d) What values are safe to try? Based upon speaking to several operators, 300ms with a multiplier of 3 (900ms detection) appears to be a safe value that works on most equipment fairly well. This is a significant improvement over some of the alternatives. 19

BFD and L2 link-bundling BFD is unaware of underlying L2 link bundle members. A 4x10GigE L2 bundle (802.3ad) would appear as a single L3 adjacency. BFD packets would be transmitted on a single member link, rather than out all 4 links. A failure of the link with BFD on it would result in the entire L3 adjacency failing. However, in some scenarios the failed member link may result in only a single BFD packet being dropped. Subsequent packets may route over working member links. 20

L3 Interface BFD and L2 link-bundling (cont d) 21 L3 Interface

BFD and L2 link-bundling (cont d) This can be a showstopper because it s generally preferable to build L2 bundles rather than to use L3 ECMP, to avoid platform-specific scaling issues and polluting your IGP. Having BFD fork across each individual link would be great, but it would have its own scaling impact. Each individual member link would have to have a separate BFD session. No vendor currently supports this mode of operation, nor is there a published draft describing it. 22

Conclusion Routers do still have faults in the forwarding plane where IGP and other control-plane protocols continue to work. These events do happen and result in major outages (you ve seen some in the press in 2008 ) The default hello/keepalive intervals of some protocols (BGP, IGP, RSVP) are still too high to be optimal for failure detection. There needs to be a way to support L2 link bundling as networks continue to grow links (we don t have 100GE yet, so scaling Nx10G and Nx40G is going to be important). Always remember to stress-test your configurations to make sure that you and your equipment is comfortable with what you ve selected. 23

Send questions, comments, complaints to: Tom Scholl, AT&T Labs tom.scholl@att.com