Skip to content

Commit fe08631

Browse files
committed
Update howto-enable-micro-bfd.md
1 parent 2395a2c commit fe08631

File tree

1 file changed

+17
-28
lines changed

1 file changed

+17
-28
lines changed

articles/operator-nexus/howto-enable-micro-bfd.md

Lines changed: 17 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,11 @@ ms.custom: template-how-to, devx-track-azurecli
1111

1212
# Enabling Micro-BFD
1313

14-
Micro-BFD (Bidirectional Forwarding Detection) is a lightweight protocol designed to rapidly detect failures between adjacent network devices, such as routers or switches, with minimal overhead. This guide provides step-by-step instructions to enable Micro-BFD on Customer Edge (CE) and Provider Edge (PE) devices.
14+
Micro-BFD (Bidirectional Forwarding Detection) are a lightweight protocol designed to rapidly detect failures between adjacent network devices, such as routers or switches, with minimal overhead. This guide provides step-by-step instructions to enable Micro-BFD on Customer Edge (CE) and Provider Edge (PE) devices.
1515

1616
## Prerequisites
1717

18-
Before enabling Micro-BFD, ensure the following:
18+
Ensure the following prerequisites are met before enabling Micro-BFD:
1919

2020
- Both CE and PE devices are preconfigured with the required Micro-BFD settings.
2121

@@ -28,7 +28,7 @@ Before enabling Micro-BFD, ensure the following:
2828

2929
## Configuration steps for enabling Micro-BFD
3030

31-
Follow these steps to enable Micro-BFD, starting with the secondary devices. Once verified, proceed with the primary devices as described below.
31+
Follow these steps to enable Micro-BFD, starting with the secondary devices. Once verified, proceed with the primary devices using the instructions provided.
3232

3333
### Step 1: Place CE2 in Maintenance Mode
3434

@@ -68,7 +68,7 @@ CE1: 10.30.32.65/30 & PE1: 10.30.32.66/30
6868
CE2: 10.30.32.69/30 & PE2: 10.30.32.70/30
6969
```
7070

71-
Confirm the changes by executing below command.
71+
Verify the changes using the following command and check that the configured IP address, BFD interval, and neighbor details match the intended configuration.
7272

7373
```Example show output after configuring MicroBFD on CE2
7474
CE2#show running-config interfaces pox
@@ -82,18 +82,7 @@ CE2#show running-config interfaces pox
8282
bfd per-link rfc-7130
8383
```
8484

85-
### Step 3: Put device PE2 into maintenance mode
86-
87-
Run the following command to place PE2 in maintenance mode:
88-
89-
```Azure CLI
90-
az networkfabric device update-admin-state --resource-group <resource-group> --resource-name <resource-name> --state UnderMaintenance
91-
```
92-
93-
>[!Note]
94-
> For new deployments, maintenance mode is not required.
95-
96-
### Step 4: Configure Micro-BFD on PE2
85+
### Step 3: Configure Micro-BFD on PE2
9786

9887
Use the following command to configure PE2 with Micro-BFD: Consider min-links under the PE device for the respective port-channel.
9988

@@ -108,7 +97,7 @@ Microsoft.ManagedNetworkFabric/NetworkDevices/<device>-AggrRack-PE2 --rw-command
10897
bfd per-link rfc-7130
10998
```
11099

111-
Confirm the changes by executing below command.
100+
Verify the changes using the following command and check that the configured IP address, BFD interval, and neighbor details match the intended configuration.
112101

113102
```Example Show Output After Configuring MicroBFD on PE2
114103
PE2#show running-config interfaces pox
@@ -122,9 +111,9 @@ PE2#show running-config interfaces pox
122111
bfd per-link rfc-7130
123112
```
124113

125-
### Step 5: Move device CE2 and PE2 into enabled state
114+
### Step 4: Move device CE2 into enabled state
126115

127-
Run the following command to enable the devices:
116+
Use the following command to re-enable the device amd make it operational after configuration.
128117

129118
```Azure CLI
130119
az networkfabric device update-admin-state --resource-group <resource-group> --resource-name <resource-name> --state Enable
@@ -133,7 +122,7 @@ az networkfabric device update-admin-state --resource-group <resource-group> --r
133122
>[!Note]
134123
> For new deployments, this step is not required.
135124
136-
### Step 6: Verify BFD Details
125+
### Step 5: Verify BFD details
137126

138127
Check BFD peer details using the following command:
139128

@@ -142,23 +131,23 @@ CE2#show bfd peers dest-ip <dest-bfd-peer-ip> detail
142131
```
143132

144133
>[!NOTE]
145-
> After verifying the configuration on secondary devices, repeat steps 1 to 6 for primary devices (CE1 and PE1).
134+
> After verifying the configuration on secondary devices, repeat steps 1 to 5 for primary devices (CE1 and PE1).
146135
147-
### Step 7: Ensure Connectivity and BGP Sessions
136+
### Step 6: Ensure connectivity and BGP sessions
148137

149138
Ensure connectivity between CE and PE devices is stable, and BGP sessions are established with the appropriate routes.
150139

151-
### Step 8: Enable Micro-BFD Flag
140+
### Step 7: Enable Micro-BFD Flag
152141

153-
**Contact Microsoft support through a support incident to enable the Micro-BFD feature flag** and this will require a full reconcile with base configuration along with the property of NPB set to true.
142+
**Contact Microsoft support through a support incident to enable the Micro-BFD feature flag**, and this action will require a full reconciliation with the base configuration along with the property of NPB set to true.
154143

155-
### Step 9: Verify Connectivity and BGP Sessions
144+
### Step 8: Verify Connectivity and BGP Sessions
156145

157146
After enabling the feature flag, confirm that connectivity and BGP sessions remain stable.
158147

159-
### Step 10: Remove configuration from RW config
148+
### Step 9: Remove configuration from RW config
160149

161-
After the BFD sessions are up, run the following Azure CLI command to remove BFD configurations. This ensures that every full reconcile request does not push the configurations again to the devices.
150+
After the BFD sessions are up, run the following Azure CLI command to remove BFD configurations. This process ensures that every full reconcile request avoids reapplying configurations to the devices.
162151

163152
```Azure CLI
164153
az networkfabric device run-rw --ids /subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.ManagedNetworkFabric/NetworkDevices/<device-name>-AggrRack-CE1\PE1\CE2\PE2 --rw-command " "
@@ -170,7 +159,7 @@ Ensure that devices are not disturbed for Micro-BFD configuration.
170159

171160
## Recovery steps if Micro-BFD is misconfigured
172161

173-
In scenarios such as reconfiguration, where Micro-BFD is disabled by default, and the Provider Edge (PE) device is configured with Micro-BFD settings from a previous deployment, it is crucial to remove the Micro-BFD configuration from the PE device.
162+
In cases like reconfiguration, where Micro-BFD is disabled by default but the Provider Edge (PE) device still has settings from a previous deployment, it is important to remove the Micro-BFD configuration from the PE device.
174163

175164
Follow these steps to ensure that Micro-BFD is disabled on your PE devices:
176165

0 commit comments

Comments
 (0)