Hi Qazik,
The session table matching mechanism of the firewall takes precedence over the policy-based routing and routing tables. If a data packet has been generated in a session table and the quintuples are the same, the firewall forwards the data packet based on the session table instead of querying the policy-based routing and routing table. If the data matches the previous session quintuple, the data is forwarded based on the session table, and the policy-based routing does not take effect. The data is sent in a loop between the USG6620 and AntiDDoS until the TTL reaches 0.
Change the networking mode and configure AntiDDoS traffic diversion and injection on the S7706 to prevent the firewall session table from being preferentially matched.
Configure the S7706 as follows:
acl number 3000
rule 0 permit ip destination 10.139.195.0 0.0.0.255
#
traffic classifier DDos operator or precedence 5
if-match acl 3000
#
traffic behavior DDos
permit
redirect ip-nexthop 10.10.100.18
#
traffic policy DDos match-order config
classifier DDos behavior DDos
interface Vlanif129
traffic-policy DDos inbound
I hope it helps!