HP VPN Firewall Appliances Network Management Configuration Guide

345
# Configure static routes on Router A.
<RouterA> system-view
[RouterA] ip route-static 120.1.1.0 24 gigabitethernet 1/2 13.1.1.1
[RouterA] ip route-static 121.1.1.0 24 gigabitethernet 1/1 10.1.1.102
# Configure static routes on Router B.
<RouterB> system-view
[RouterB] ip route-static 120.1.1.0 24 gigabitethernet 1/2 11.1.1.2
[RouterB] ip route-static 121.1.1.0 24 gigabitethernet 1/1 12.1.1.1
3. Verify the configuration:
# Display the BFD session information on Firewall A.
<FirewallA> display bfd session
Total Session Num: 1 Init Mode: Active
Session Working Under Ctrl Mode:
LD/RD SourceAddr DestAddr State Holdtime Interface
4/7 1.1.1.9 2.2.2.9 Up 2000ms Loop1
The output shows that the BFD session has been created.
# Display static routes on Firewall A.
<FirewallA> display ip routing-table protocol static
Public Routing Table : Static
Summary Count : 2
Static Routing table Status : <Active>
Summary Count : 1
Destination/Mask Proto Pre Cost NextHop Interface
120.1.1.0/24 Static 60 0 2.2.2.9 GE1/1
Static Routing table Status : <Inactive>
Summary Count : 1
Destination/Mask Proto Pre Cost NextHop Interface
120.1.1.0/24 Static 65 0 10.1.1.100 GE1/2
The output shows that Firewall A communicates with Firewall B through Router B.
# When the link between Firewall A and Router B fails, enable BFD debugging on Firewall A.
<FirewallA> debugging bfd event
<FirewallA> debugging bfd scm
<FirewallA> terminal debugging
%Oct 10 10:18:18:672 2010 FirewallA BFD/4/LOG:Sess[1.1.1.9/2.2.2.9, Loop1,Ctrl], Sta:
UP->DOWN, Diag: 1
*Oct 10 10:18:18:672 2010 FirewallA BFD/7/EVENT:Send sess-down Msg,
[Src:1.1.1.9,Dst:2.2.2.9,Loop1,Ctrl], instance:0, protocol:STATIC
The output shows that BFD can quickly detect the link failure.
# Display static routes on Firewall A.
<FirewallA> display ip routing-table protocol static