Method, apparatus and system for bidirectional forwarding detection implementation
A two-way forwarding detection, end-to-end technology, applied in the field of communication, can solve the problems of increased workload, increased errors, tedious manual configuration and deletion operation process, etc., to achieve the effect of improving accuracy and reducing complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] In this embodiment one, if figure 2 As shown, the corresponding BFD session establishment process may include:
[0048] First, the active end sends a BFD control message with BFD YD=0 to the passive end, where YD refers to: the remote descriptor (your discriminator), and the corresponding BFD control message can specifically be carried on IP / UDP (User Datagram Protocol ) sent in the message;
[0049] Afterwards, after receiving the BFD YD=0 message sent by the active end, the passive end establishes a BFD session corresponding to the passive end, thereby implementing bidirectional detection based on the BFD session.
[0050] Among them, the detection information used to uniquely determine a BFD session required for the passive end to establish a BFD session can be obtained from the IP / UDP packet header sent by the active end, and the corresponding detection information can include source address, destination address, Information such as VPN information and UDP port n...
Embodiment 2
[0053] The second embodiment is an improvement on the first embodiment, so that the IP-based message carrying the BFD control message transmitted during the establishment of the BFD session will not affect network security.
[0054] Specifically, in the second embodiment, in the process of sending the BFD control message with BFD YD=0 at the active end, the TTL (time-to-live value) and the port number can be combined on the single-hop link. Verify to ensure the security of the network.
[0055] In the second embodiment, for a multi-hop link, the LSP Ping can be used to trigger the passive end to establish a BFD session, and the combination of TTL and port number can be used for verification, so as to ensure the security performance of the network. like image 3 As shown, the corresponding specific implementation process includes:
[0056] First, when it is determined to be a multi-path link, the corresponding active end triggers the execution of the LSP Ping function, and se...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 