Enabling Micro-BFD
Micro-BFD (Bidirectional Forwarding Detection) is a lightweight protocol designed to rapidly detect failures between adjacent network devices, such as routers or switches, with minimal overhead. This guide provides step-by-step instructions to enable Micro-BFD on Customer Edge (CE) and Provider Edge (PE) devices.
Prerequisites
Ensure the following prerequisites are met before enabling Micro-BFD:
Both CE and PE devices are preconfigured with the required Micro-BFD settings.
The feature flag
MicroBFDEnabled
is turned off by default.
Note
It is required to contact Microsoft support through a support incident to enable the feature flag once necessary configurations has been performed to devices as explained in this article.
- It's necessary to put the device in maintenance mode to apply below the configuration changes.
Configuration steps for enabling Micro-BFD
Steps for existing deployments
To enable Micro-BFD, follow these steps, starting with the secondary devices. Once verified, proceed with the primary devices using the instructions provided. This ensures that the Micro BFD feature is enabled correctly without causing any disruptions to the network. This sequence helps in maintaining the stability and reliability of the network during the configuration process.
Step 1: Place CE2 in Maintenance Mode
Run the following Azure CLI command to place the CE2 device in maintenance mode:
az networkfabric device update-admin-state --resource-group <resource-group> --resource-name <resource-name> --state UnderMaintenance
Step 2.1: Configure Micro-BFD on CE2
Use the following Azure CLI command to configure Micro-BFD under Port-Channel1 on CE2.
az networkfabric device run-rw \
--ids "/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ManagedNetworkFabric/NetworkDevices/<device>-AggrRack-CE2" \
--rw-command "interface Port-Channel1
ip address 10.30.0.69/30
mtu 9124
no switchport
bfd neighbor 10.30.0.70
bfd interval 50 min-rx 50 multiplier 3
bfd per-link rfc-7130
!" \
--debug
Example1: NFIPv4Addr : 10.30.0.0/19 then 10.30.0.0/24 is reserved for TS<->PE and CE<->PE interaction
CE<->PE MicroBFD : 10.30.0.64/30 --> CE1: 10.30.0.65/30 & PE1: 10.30.0.66/30
10.30.0.68/30 --> CE2: 10.30.0.69/30 & PE2: 10.30.0.70/30
Example2: NFIPv4Addr : 10.30.32.0/19 then 10.30.32.0/24 is reserved for TS<->PE and CE<->PE interaction
CE<->PE MicroBFD : 10.30.32.64/30 --> CE1: 10.30.32.65/30 & PE1: 10.30.32.66/30
10.30.32.68/30 --> CE2: 10.30.32.69/30 & PE2: 10.30.32.70/30
Verify the changes using the following command and check that the configured IP address, BFD interval, and neighbor details match the intended configuration.
Example show output after configuring MicroBFD in CE2 :
CE2#show running-config interfaces pox
interface pox
description "Port pox Connected to PE-01"
mtu 9124
no switchport
ip address 10.30.0.69/30
bfd interval 50 min-rx 50 multiplier 3
bfd neighbor 10.30.0.70
bfd per-link rfc-7130
Step 2.2: Configure Micro-BFD on PE2
Configure PE2 device to enable Micro-BFD. Consider min-links under PE device for respective port-channel.
Verify the changes using the following command and check that the configured IP address, BFD interval, and neighbor details match the intended configuration
PE2#show running-config interfaces pox
interface pox
description "Port pox Connected to CE-02"
mtu 9124
no switchport
ip address 10.30.0.70/30
bfd interval 50 min-rx 50 multiplier 3
bfd neighbor 10.30.0.69
bfd per-link rfc-7130
Step 3: Move device CE2 into enabled state
Use the following command to re-enable the device and make it operational after configuration.
az networkfabric device update-admin-state --resource-group <resource-group> --resource-name <resource-name> --state Enable
CE1#show bfd peers dest-ip 10.30.0.69 detail
Step 4: Place CE1 in Maintenance Mode
Run the following Azure CLI command to place the CE1 device in maintenance mode:
az networkfabric device update-admin-state --resource-group <resource-group> --resource-name <resource-name> --state UnderMaintenance
Step 5.1: Configure Micro-BFD on CE1
Use the following Azure CLI command to configure Micro-BFD under Port-Channel1 on CE1.
az networkfabric device run-rw \
--ids "/subscriptions<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ManagedNetworkFabric/NetworkDevices/<device>-AggrRack-CE1" \
--rw-command "interface Port-Channel1
ip address 10.30.0.65/30
mtu 9124
no switchport
bfd neighbor 10.30.0.66
bfd interval 50 min-rx 50 multiplier 3
bfd per-link rfc-7130
!" \
--debug
CE1#show running-config interfaces pox
interface pox
description "Port pox Connected to PE-01"
mtu 9124
no switchport
ip address 10.30.0.65/30
bfd interval 50 min-rx 50 multiplier 3
bfd neighbor 10.30.0.66
bfd per-link rfc-7130
Step 5.2: Configure Micro-BFD on PE1
Configure PE1 device to enable Micro-BFD. Consider min-links under PE device for respective port-channel.
Verify the changes using the following command and check that the configured IP address, BFD interval, and neighbor details match the intended configuration
PE1#show running-config interfaces pox
interface xyz
description "Port xyz Connected to CE-01"
mtu 9124
no switchport
ip address 10.30.0.66/30
bfd interval 50 min-rx 50 multiplier 3
bfd neighbor 10.30.0.65
bfd per-link rfc-7130
PE1#
Step 6: Move device CE1 into enabled state
Use the following command to re-enable the device and make it operational after configuration.
az networkfabric device update-admin-state --resource-group <resource-group> --resource-name <resource-name> --state Enable
CE1#show bfd peers dest-ip 10.30.0.66 detail
Step 7: Ensure connectivity and BGP sessions
Ensure connectivity between CE and PE devices is stable, and BGP sessions are established with the appropriate routes.
Step 8: Enable Micro-BFD Flag
Contact Microsoft support through a support incident to enable the Micro-BFD feature flag. After enabling the feature flag, a full reconciliation with the base configuration is required, ensuring the NPB property is set to true.
Step 9: Verify Connectivity and BGP Sessions
After enabling the feature flag, confirm that connectivity and BGP sessions remain stable.
Step 10: Remove configuration from RW config
After the BFD sessions are up, run the following Azure CLI command to remove BFD configurations. This process ensures that every full reconcile request avoids reapplying configurations to the devices.
az networkfabric device run-rw --ids /subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ManagedNetworkFabric/NetworkDevices/<device-name>-AggrRack-CE1\PE1\CE2\PE2 --rw-command " "
Step 11: Ensure devices aren't disturbed
Ensure that devices aren't disturbed for Micro-BFD configuration.
Steps for new deployments
Prerequisites
Before enabling the Micro BFD feature flag, ensure the following:
The Provider Edge (PE) is configured with the required Micro BFD settings.
Inform the Microsoft Support team about the planned Micro BFD feature flag enablement.
Configure PE devices to enable Micro BFD and ensure the min-links under the PE device for the respective port-channel are considered.
Configuring Micro BFD on PE devices
Below are example configurations for enabling Micro BFD on PE devices.
PE2# show running-config interfaces pox
interface pox
description "Port pox Connected to CE-02"
mtu 9124
no switchport
ip address 10.30.0.70/30
bfd interval 50 min-rx 50 multiplier 3
bfd neighbor 10.30.0.69
bfd per-link rfc-7130
PE2#
PE1# show running-config interfaces pox
interface pox
description "Port xyz Connected to CE-01"
mtu 9124
no switchport
ip address 10.30.0.66/30
bfd interval 50 min-rx 50 multiplier 3
bfd neighbor 10.30.0.65
bfd per-link rfc-7130
Step 1: Create the Network Fabric
Proceed with creating the Network Fabric as per the standard provisioning procedures.
Step 2: Customer approval for geneva action
The customer must approve the lockbox enabled geneva action before proceeding further.
Step 3: Network provisioning operation
Once the Micro BFD feature is enabled, validate the BFD status on the CE devices using the following CLI commands.
CE2# show bfd peers dest-ip 10.30.0.70 detail
CE1# show bfd peers dest-ip 10.30.0.66 detail
Note
Check the BFD status using the provided commands on both CE devices or same can be requested from Microsoft support team to share once the configuration is completed.
Recovery steps if Micro-BFD is misconfigured
In cases like reconfiguration, where Micro-BFD is disabled by default but the Provider Edge (PE) device still has settings from a previous deployment, it's important to remove the Micro-BFD configuration from the PE device.
Follow these steps to ensure that Micro-BFD is disabled on your PE devices:
Step1: Identify the PE devices
Determine which PE devices have the Micro-BFD configuration from the previous deployment.
Step2: Remove Micro-BFD configuration
Access the configuration settings of each identified PE device and remove any existing Micro-BFD settings.
Verify configuration
Ensure that the Micro-BFD settings have been successfully removed and that the PE device is operating without Micro-BFD enabled.