F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices High Availability Command Reference-6PW100

45
Associating a track entry with the echo-mode BFD session detects a directly connected link. Before that,
you must configure the source IP address of BFD echo packets.
Associating a track entry with the control-mode BFD session detects an indirectly connected link. You
must make this configuration for both the local and remote ends. Otherwise, BFD does not take effect.
The following matrix shows the track bfd command and firewalls and UTM devices compatibility:
Hardware Command com
p
atible
F1000-A-EI/F1000-S-EI No
F1000-E No
F5000 Yes
Firewall module No
U200-A No
U200-S No
Examples
# Create track entry 1, which uses BFD to monitor the link between local IP address 192.168.40.2 and
remote IP address 192.168.40.1 by sending BFD echo packets.
<Sysname> system-view
[Sysname] track 1 bfd echo interface gigabitethernet 1/1 remote ip 192.168.40.1 local ip
192.168.40.2
# Create track entry 2, which uses BFD to monitor the link between local IP address 192.168.41.2 and
remote IP address 192.168.41.1 by sending BFD control packets.
[Sysname] track 2 bfd control interface gigabitethernet 1/2 remote ip 192.168.41.1 local
ip 192.168.41.2
Related commands
display track
track nqa
Use track nqa to create a track entry, associate it with the specified reaction entry of the NQA test group,
and specify the delay time for the track module to notify the application modules when the status of the
track entry changes.
Use undo track to remove the track entry.
Syntax
track track-entry-number nqa entry admin-name operation-tag reaction item-number [ delay { negative
negative-time | positive positive-time } * ]
undo track track-entry-number
Default
No track entry exists.
Views
System view