Hi

> 3 jul 2014 kl. 11:43 skrev Bartosz Radwan <[email protected]>:
> 
> We experienced recently several times issues caused by eg. EAPS path swich in 
> one of our L2 transmission providers (new path MTU was not big enough due to 
> jumbo frames not enabled - that's what they told us, but in fact it does not 
> meter - it's out of our control).
> 
> From our point of view this situation sucks - we have several BGP sessions, 
> terminated on 2 different BGP routers in different data centers, but problems 
> as descripbed above in just one L2 provider network may cause our all 
> services are not fully operational - especially when afeccted BGP sessions 
> provides best routes for some popular services like FB, YT or… redtube.com ;).
> 
> So, the question: is BFD able to detect broken L2 MTU and if detected - 
> disable affected BGP sessions?
> 
> If not BFD, any other ideas?

ISIS hello packets are padded to MTU or close to it. 

It might not be useful for you, but anyway. 

/Tias

> 
> It's possible to detect L2 problems outside bird and then disable protocols, 
> but this may be complicated and error prone, so in fact - i do not want to to 
> that.
> 
> 
> -- 
> A: Because it messes up the order in which people normally read text.
> Q: Why is top-posting such a bad thing?
> Bartosz Radwan
> 

Reply via email to