HP VPN Firewall Appliances Network Management Configuration Guide

342
[Router] ip route-static 121.1.1.0 24 gigabitethernet 1/1 10.1.1.102
3. Verify the configuration:
# Display BFD sessions on Firewall A.
<FirewallA> display bfd session
Total Session Num: 1 Init Mode: Active
Session Working Under Ctrl Mode:
LD/RD SourceAddr DestAddr State Holdtime Interface
4/7 12.1.1.1 12.1.1.2 Up 2000ms GigabitEthernet1/1
The output shows that the BFD session has been created.
# Display static routes on Firewall A.
<FirewallA> display ip routing-table protocol static
Public Routing Table : Static
Summary Count : 2
Static Routing table Status : <Active>
Summary Count : 1
Destination/Mask Proto Pre Cost NextHop Interface
120.1.1.0/24 Static 60 0 12.1.1.2 GE1/1
Direct Routing table Status : <Inactive>
Summary Count : 1
Destination/Mask Proto Pre Cost NextHop Interface
120.1.1.0/24 Static 65 0 10.1.1.100 GE1/2
The output shows that Firewall A communicates with Firewall B through the Layer 2 switch.
# When the link between Firewall A and the Layer 2 switch fails, enable BFD debugging on
Firewall A.
<FirewallA> debugging bfd event
<FirewallA> debugging bfd scm
<FirewallA> terminal debugging
%Jul 27 10:18:18:672 2007 FirewallA BFD/4/LOG:Sess[12.1.1.1/12.1.1.2,
GigabitEthernet1/1,Ctrl], Sta: UP->DOWN, Diag: 1
*Jul 27 10:18:18:672 2007 FirewallA BFD/7/EVENT:Send sess-down Msg,
[Src:12.1.1.1,Dst:12.1.1.2, GigabitEthernet1/1,Ctrl], instance:0, protocol:STATIC
*Jul 27 10:18:19:172 2007 FirewallA BFD/7/EVENT:Receive Delete-sess,
[Src:12.1.1.1,Dst:12.1.1.2,GigabitEthernet1/1,Ctrl], Direct, Instance:0x0,
Proto:STATIC
The output shows that BFD can quickly detect the link failure.
# Display static routes on Firewall A.
<FirewallA> display ip routing-table protocol static
Public Routing Table : Static
Summary Count : 2
Static Routing table Status : <Active>