HP VPN Firewall Appliances High Availability Configuration Guide
74
• The Positive state of the track entry shows that the link where the active interface resides operates
correctly, and the standby interfaces stay in backup state.
• The Negative state of the track entry shows that the link where the active interface resides has failed,
and a standby interface changes to the active interface for data transmission.
• The always Invalid state of the track entry shows that the association does not take effect and each
interface keeps its original forwarding state. When the track entry turns to Invalid from other state,
a standby interface becomes the active interface.
You can associate a nonexistent track entry with an interface. The association takes effect only after you
use the track command to create the track entry. For more information, see "Configuring interface
backup."
To associate Track with interface backup:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter interface view.
interface interface-type
interface-number
N/A
3. Associate the interface with a
track entry.
standby track track-entry-number Not configured by default.
NOTE:
You can associate an interface with only one track entry. If you execute the standby track command
multiple times, the last configuration takes effect.
Displaying and maintaining track entries
Task Command
Remarks
Display information about the
specified or all track entries.
display track { track-entry-number | all }
[ | { begin | exclude | include }
regular-expression ]
Available in any view.
Track configuration examples
VRRP-Track-NQA collaboration configuration example
In this example, the master monitors the uplink.
Network requirements
As shown in Figure 38, configure Host A to access Host B on the Internet. The default gateway of Host A
i s 10 .1.1.10 / 24 .
Firewall A and Firewall B belong to VRRP group 1, which has the virtual IP address 10.1.1.10.
When Firewall A works correctly, packets from Host A to Host B are forwarded through Firewall A. When
NQA detects that a fault is on the uplink of Firewall A, packets from Host A to Host B are forwarded
through Firewall B.