R3721-F3210-F3171-HP High-End Firewalls High Availability Configuration Guide-6PW101
93
# Configure track entry 1 that is associated with the BFD session to check whether Firewall A can
communicate with the next hop Firewall B of the static route.
[FirewallB] track 1 bfd echo interface gigabitethernet 0/1 remote ip 10.2.1.1 local
ip 10.2.1.2
4. Configure Router:
# Configure a static route to 30.1.1.0/24, with the address of the next hop as 10.4.1.2.
<Router> system-view
[Router] ip route-static 30.1.1.0 24 10.4.1.2
# Configure a static route to 20.1.1.0/24, with the address of the next hop as 10.3.1.1.
[Router] ip route-static 20.1.1.0 24 10.3.1.1
5. Verify the configuration:
# Display information of the track entry on Firewall A.
[FirewallA] display track all
Track ID: 1
Status: Positive
Duration: 0 days 0 hours 0 minutes 32 seconds
Notification delay: Positive 0, Negative 0 (in seconds)
Reference object:
BFD Session:
Packet type: Echo
Interface : GigabitEthernet 0/1
Remote IP : 10.2.1.2
Local IP : 10.2.1.1
# Display the routing table of Firewall A.
[FirewallA] display ip routing-table
Routing Tables: Public
Destinations : 9 Routes : 9
Destination/Mask Proto Pre Cost NextHop Interface
10.2.1.0/24 Direct 0 0 10.2.1.1 GE0/1
10.2.1.1/32 Direct 0 0 127.0.0.1 InLoop0
10.3.1.0/24 Direct 0 0 10.3.1.1 GE0/2
10.3.1.1/32 Direct 0 0 127.0.0.1 InLoop0
20.1.1.0/24 Direct 0 0 20.1.1.1 GE0/3
20.1.1.1/32 Direct 0 0 127.0.0.1 InLoop0
30.1.1.0/24 Static 60 0 10.2.1.2 GE0/1
127.0.0.0/8 Direct 0 0 127.0.0.1 InLoop0
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoop0
The output shows the BFD detection result: the next hop 10.2.1.2 is reachable (the status of the
track entry is Positive), and the master static route takes effect. Firewall A forwards packets to
30.1.1.0/24 through Firewall B.
# Remove the IP address of interface GigabitEthernet 0/1 on Firewall B.
<FirewallB> system-view
[FirewallB] interface gigabitethernet 0/1
[FirewallB-GigabitEthernet 0/1] undo ip address
# Display information of the track entry on Firewall A.