Hello, I just wanted to post this sample configuration to see if this is how I would get BFD to protect an OSPF route on a particular interface between EXOS and Cisco IOS.
What I am after is a 300ms timer... not too short to cause false positives but not too long to cause delay in detection.
EXOS side on Extreme X690 running core liscence - VLAN specified below is the transport vlan on an interface to an ethrenet handoff device provided by the ISP:
configure ospf vlan WAN-WS400 bfd on
configure bfd vlan WAN-WS400 detection-multiplier 3 receive-interval 300 transmit-interval 300
enable bfd vlan WAN-WS400
Cisco IOS side on a 2901 router specifying BFD directly on the external WAN interface that faces the ISP where the X690 is connected to in another city:
ip ospf bfd
bfd interval 300 min_rx 300 multiplier 3
My expectation here is that BFD hellos would have to not be exchanged for 900 (300 times 3) and if so it would inform the OSPF process and tear down that adjacency. I have a backup link at this site on with OSPF on it which is a tunnel interface via AT&T LTE. At the HQ it terminates into another Cisco 2901 which participates OSPF to the X690.
In testing today if I disconnect the WAN link, it takes about 40 seconds for the path to re-converge over the LTE backup. I'd like to shorten this down to only a few seconds if possible. Its imperative that there are no false positives, as the latency over the LTE link is terrible (around 350ms). Because of this I only think I need to use BFD protection on the primary link. A ping right now to a server at that location is showing 1ms.
Please let me know if I am missing anything or misunderstanding this feature. Is 300ms ok? I found a gtac article recommending 1000ms, but then another article stating 300 and up work (for example setting to 200 caused bfd down events).
Thanks in advance!