BFD
Focus
Focus
Next-Generation Firewall

BFD

Table of Contents

BFD

Understand Bidirectional Forwarding Detection (BFD), which recognizes a failure in the bidirectional path between two routing peers.
Where Can I Use This?What Do I Need?
  • NGFW (Managed by PAN-OS or Panorama)
The firewall supports Bidirectional Forwarding Detection (BFD), (RFC 5880), a protocol that recognizes a failure in the bidirectional path between two routing peers. BFD failure detection is extremely fast, providing for a faster failover than can be achieved by link monitoring or frequent dynamic routing health checks, such as Hello packets or heartbeats. Mission-critical data centers and networks that require high availability and extremely fast failover need the extremely fast failure detection that BFD provides.
When you enable BFD, BFD establishes a session from one endpoint (the firewall) to its BFD peer at the endpoint of a link using a three-way handshake. Control packets perform the handshake and negotiate the parameters configured in the BFD profile, including the minimum intervals at which the peers can send and receive control packets. BFD control packets for both IPv4 and IPv6 are transmitted over UDP port 3784. BFD control packets for multihop support are transmitted over UDP port 4784. BFD control packets transmitted over either port are encapsulated in the UDP packets.
After the BFD session is established, the Palo Alto Networks implementation of BFD operates in asynchronous mode, meaning both endpoints send each other control packets (which function like Hello packets) at the negotiated interval. If a peer does not receive a control packet within the detection time (calculated as the negotiated transmit interval multiplied by a Detection Time Multiplier), the peer considers the session down. (The firewall does not support demand mode, in which control packets are sent only if necessary rather than periodically.)
  • When you enable BFD for a static route and a BFD session between the firewall and the BFD peer fails, the firewall removes the failed route from the RIB and FIB tables and allows an alternate path with a lower priority to take over.
  • When you enable BFD for a routing protocol, BFD notifies the routing protocol to switch to an alternate path to the peer. Thus, the firewall and BFD peer reconverge on a new path.
A BFD profile enables you to Configure BFD settings and apply them to one or more routing protocols or static routes on the firewall. If you enable BFD without configuring a profile, the firewall uses its default BFD profile (with all of the default settings). You can’t change the default BFD profile.
When an interface is running multiple protocols that use different BFD profiles, BFD uses the profile having the lowest Desired Minimum Tx Interval. See BFD for Dynamic Routing Protocols.
Active/passive HA peers synchronize BFD configurations and sessions; active/active HA peers don’t.
PAN-OS also supports RFC 5881, Bidirectional Forwarding Detection (BFD) for IPv4 and IPv6 (Single Hop). In this case, BFD tracks a single hop between two systems that use IPv4 or IPv6, so the two systems are directly connected to each other. BFD also tracks multiple hops from peers connected by BGP. PAN-OS follows BFD encapsulation as described in RFC 5883, Bidirectional Forwarding Detection (BFD) for Multihop Paths. However, PAN-OS does not support authentication.

BFD Model, Interface, and Client Support

The following firewall models don’t support BFD: PA-800 Series, PA-220, and VM-50 firewalls. The models that do support BFD support a maximum number of BFD sessions, as listed in the Product Selection tool.
BFD runs on physical Ethernet, Aggregated Ethernet (AE), VLAN, and tunnel interfaces (site-to-site VPN and LSVPN), and on Layer 3 subinterfaces.
Supported BFD clients are:
  • Static routes (IPv4 and IPv6) consisting of a single hop
  • OSPFv2 and OSPFv3 (interface types include broadcast, point-to-point, and point-to-multipoint)
  • BGP IPv4 and IPv6 (IBGP, EBGP) consisting of a single hop or multiple hops
  • RIP (single hop)

Non-Supported RFC Components of BFD

BFD is standardized in RFC 5880. PAN-OS does not support all components of RFC 5880; nonsupported components are:
  • Demand mode
  • Authentication
  • Sending or receiving Echo packets; however, the firewall will pass Echo packets that arrive on a virtual wire or tap interface. (BFD Echo packets have the same IP address for the source and destination.)
  • Poll sequences
  • Congestion control
  • BFD for LACP (micro-BFD with LAG interfaces)