| Description | This article describes the use case of Bidirectional Forwarding Detection (BFD) with a static route. |
| Scope | FortiGate. |
| Solution |
Bidirectional Forwarding Detection (BFD) is designed to detect failures in the bidirectional path between two forwarding engines quickly. In FortiGate devices running FortiOS, BFD can be integrated with static routes to provide faster failover compared to traditional methods.
When BFD is enabled on a static route, FortiGate monitors the reachability of the next-hop gateway using BFD control packets. If the BFD session goes down (indicating a path failure), the associated static route is withdrawn from the routing table. When the session recovers, the route is reinstated. This enables rapid convergence in redundant setups using multiple static routes with different priorities or administrative distances.
Topology: Consider two FortiGate devices, with redundant paths simulated through backup gateways:
Destination host/network: 1.1.1.1/32 (behind FortiGate B or reachable via gateways).
Configuration Steps: Step 1: Enable BFD on the Interface (Both FortiGates).
config system interface
Step 2: Configure BFD Neighbor (Recommended on the Peer or Both Sides).
config router bfd
Step 3: Configure Static Routes with BFD (On FortiGate A):
config router static
Verification commands:
get router info bfd neighbor get router info bfd neighbor get router info bfd neighbor detail get router info routing-table all
Troubleshooting: Capture BFD packets (UDP ports 3784 control, 3785 echo if used):
diagnose sniffer packet any "port 3784" 4
Enable BFD debug:
diagnose debug application bfdd -1 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.