BFD
Understand Bidirectional Forwarding Detection (BFD), which recognizes a failure in
the bidirectional path between two routing peers.
Where Can I Use This? | What Do I Need? |
- NGFW (Managed by PAN-OS or Panorama)
| |
The firewall supports
Bidirectional Forwarding Detection (BFD), (
RFC 5880), a protocol that recognizes a failure in the bidirectional path
between two routing peers. BFD failure detection is extremely fast, providing for a
faster failover than can be achieved by link monitoring or frequent dynamic routing
health checks, such as Hello packets or heartbeats. Mission-critical data centers and
networks that require high availability and extremely fast failover need the extremely
fast failure detection that BFD provides.
When you enable BFD, BFD establishes a session from one endpoint (the firewall) to its
BFD peer at the endpoint of a link using a three-way handshake. Control packets perform
the handshake and negotiate the parameters configured in the BFD profile, including the
minimum intervals at which the peers can send and receive control packets. BFD control
packets for both IPv4 and IPv6 are transmitted over UDP port 3784. BFD control packets
for multihop support are transmitted over UDP port 4784. BFD control packets transmitted
over either port are encapsulated in the UDP packets.
After the BFD session is established, the Palo Alto Networks implementation of BFD
operates in asynchronous mode, meaning both endpoints send each other control packets
(which function like Hello packets) at the negotiated interval. If a peer does not
receive a control packet within the detection time (calculated as the negotiated
transmit interval multiplied by a Detection Time Multiplier), the peer considers the
session down. (The firewall does not support demand mode, in which control packets are
sent only if necessary rather than periodically.)
- When you enable BFD for a static route and a BFD session between the
firewall and the BFD peer fails, the firewall removes the failed route from the RIB
and FIB tables and allows an alternate path with a lower priority to take over.
- When you enable BFD for a routing protocol, BFD notifies the routing
protocol to switch to an alternate path to the peer. Thus, the firewall and BFD peer
reconverge on a new path.
A BFD profile enables you to
Configure BFD settings and
apply them to one or more routing protocols or static routes on the firewall. If you
enable BFD without configuring a profile, the firewall uses its default BFD profile
(with all of the default settings). You can’t change the default BFD profile.
When an interface is running multiple protocols that use different BFD profiles, BFD uses
the profile having the lowest
Desired Minimum Tx Interval. See
BFD for Dynamic Routing
Protocols.
Active/passive HA peers synchronize BFD configurations and sessions; active/active HA
peers don’t.
BFD Model, Interface, and Client Support
The following firewall models don’t support BFD: PA-800 Series, PA-220, and VM-50
firewalls. The models that do support BFD support a maximum number of BFD sessions,
as listed in the
Product Selection tool.
BFD runs on physical Ethernet, Aggregated Ethernet (AE), VLAN, and tunnel interfaces
(site-to-site VPN and LSVPN), and on Layer 3 subinterfaces.
Supported BFD clients are:
Static routes (IPv4 and IPv6) consisting of a single hop
OSPFv2 and OSPFv3 (interface types include broadcast, point-to-point, and
point-to-multipoint)
BGP IPv4 and IPv6 (IBGP, EBGP) consisting of a single hop or multiple
hops
RIP (single hop)
Non-Supported RFC Components of BFD
BFD is standardized in
RFC 5880. PAN-OS does not support all components of RFC
5880; nonsupported components are:
Demand mode
Authentication
Sending or receiving Echo packets; however, the firewall will pass Echo
packets that arrive on a virtual wire or tap interface. (BFD Echo packets
have the same IP address for the source and destination.)
Poll sequences
Congestion control
BFD for LACP (micro-BFD with LAG interfaces)