Method used to modify the cost value of the static route on USG firewalls

2

The cost value of the static route on the USG2000, USG5000, and USG6000 cannot be changed. By default, it is 0.

Other related questions:
Method used to configure the static route on USG firewalls
The method used to configure the static route on USG firewalls is as follows: For example: ip route-static 1.1.1.0 255.255.255.0 1.1.5.1 //ip rout-static indicates the static route, 1.1.1.0 indicates the destination address, 255.255.255.0 indicates the mask, and 1.1.5.1 indicates the next-hop address.

Method used to modify the MAC address on USG firewalls
Method used to modify the MAC address on the USG2000, USG5000, and USG6000: USG firewalls do not support modification of the MAC address.

Method used to configure the routing policy on USG firewalls
The method used to configure the routing policy on USG2000, USG5000, and USG6000 is as follows: 1. Create a routing policy. 2. Configure the If-match sub-sentence. 3. Configure the Apply sub-sentence. 4. Filter the routes upon receiving, publishing, and introducing routes.

Method used to configure static ARP binding on USG firewalls
The command used to configure static ARP binding on the USG2000, USG5000, and USG6000 is as follows: In a static ARP entry, the IP address is 10.10.10.1/24, and the corresponding MAC address is 0025-1185-8C21. system-view [USG] arp static 10.10.10.1 0025-1185-8C21

Method used to configure interworking between BFD sessions and static routes on the USG firewall
The static route is a special route manually configured by the network administrator for a specified path. Different from a dynamic route, the static route does not have any detection mechanism. When a fault occurs on the network, the network administrator needs to detect and locate the fault. By means of interworking between BFD sessions and the static route, the static route is bound with static BFD sessions, so that the static route state is updated in pace with the BFD session state. BFD sessions can be established between devices to improve the network reliability and accelerate route convergence upon network failures. The status of links between devices can be monitored using BFD sessions. Key configurations for the interworking between BFD sessions and the static route on the USG firewall are as follows: 1. # Configure BFD sessions for USG_B. [USG_A] bfd [USG_A-bfd] quit [USG_A] bfd ab bind peer-ip 10.1.1.2 [USG_A-bfd-session-ab] discriminator local 10 [USG_A-bfd-session-ab] discriminator remote 20 [USG_A-bfd-session-ab] commit [USG_A-bfd-session-ab] quit 2. # Configure the interworking between the static route and BFD sessions. [USG_A] ip route-static 192.168.1.0 255.255.255.0 10.1.1.2 track bfd-session ab Note: The USG6000 configuration must be consistent with the key configuration of the USG2000&5000. This case takes the USG2000&5000 as an example to describe the configuration. You can learn the USG6000 configuration in other configurations. For specific configurations, click Method used to configure interworking between BFD sessions and the static route on the USG firewall.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top