Configure the USG2000%5000 ospf

4

The basic functions of the USG2000 and 5000 are as follows:
[USG_A] router id 1.1.1.1 // first configure the router ID
[USG_A] ospf // Enter the OSPF process
[USG_A-ospf-1] area 0 // go to zone 0
[USG_A-ospf-1-area-0.0.0.0] network 192.168.0.0 0.0.0.255 // Declare your own network segment
[USG_A-ospf-1-area-0.0.0.0] quit // last exit

Other related questions:
Configure the USG2000%5000 ospf
The basic functions of the USG2000 and 5000 are as follows: [USG_A] router id 1.1.1.1 // first configure the router ID [USG_A] ospf // Enter the OSPF process [USG_A-ospf-1] area 0 // go to zone 0 [USG_A-ospf-1-area-0.0.0.0] network 192.168.0.0 0.0.0.255 // Declare your own network segment [USG_A-ospf-1-area-0.0.0.0] quit // last exit

USG2000 / 5000 Configure OSPF to import external routes
USG2000 & 5000 Configure OSPF to import external routes as follows: 1. Configure the basic parameters of each interface to implement interworking. 2. Configure OSPF on the USG. 3. Configure the OSPF area on the USG and add the Internet segment on the USG to the OSPF area. 4. Configure OSPF to import direct routes on the egress gateway.

Configuring ACLs for the USG2000&5000
The USG2000&5000 series supports configuring ACLs using the CLI. acl [ number ] acl-number [ vpn-instance vpn-instance-name ] [ match-order { config | auto } ] undo acl { all | [ number ] acl-number } The default matching order is config. An access control list contains a series of rules with permit or deny statements. You need to first create an access control list and then configure its rules. Example # Create an ACL numbered 2000. system-view [sysname] acl number 2000 [sysname-acl-basic-2000]

Configuring SSH on the USG2000&5000
Configure SSH on the USG2000&5000 as follows: Configuration roadmap: USG_A serves as the client, and USG_B as the SSH server. 1. Create an SSH user on USG_B. 2. Generate a local key pair on USG_B. 3. Enable the STelnet/SFTP service on USG_B. 4. Log in to USG_B through USG_A on the client.

Configuring an address set for the USG2000&5000 series
The USG2000&5000 series supports configuring an address set using the web UI or CLI. An address set can contain IP addresses, network segments, IP address ranges, and MAC addresses and be contained in another address set. Configuring an address set using the web UI: Choose Firewall > Address > Address Set and then click Create in Address Set List. Enter or select the address set name and description, reference the address or address set, configure the IP address, and click Apply. Configuring an address set using the CLI: 1. Run the ip address-set address-set-name [ type { object | group } | vpn-instance vpn-instance-name ] * command in the system view to create an address set and access its view. 2. Run the address [ id ] { ip-address { 0 | wildcard | mask { mask-address | mask-len } } | range start-ip-address end-ip-address | address-set address-set-name | mac-address } [ description description ] command to add a member to this address set. You can run this command repeatedly to add multiple members to this address set. 3. Run the description text command to configure the address set description.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top