Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Add_workflow_for_techpubs
AUTH1UserResourceIdentifier{userKey=8a00a0c86e9b2550016ec54396b5000a, userName='null'}
JIRAIDAUTHSBX-126746
REV5UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cb8305e9, userName='null'}
REV6UserResourceIdentifier{userKey=8a00a02355cd1c2f0155cd26cd5909df, userName='null'}
REV3UserResourceIdentifier{userKey=8a00a0c85985e6110159ca1c8fb70008, userName='null'}
REV1UserResourceIdentifier{userKey=8a00a0c85985e6110159ca1c8fb70008, userName='null'}


Panel

In this Sectionsection:

Table of Contents
maxLevel
3
4


Overview

Multiexcerpt include
MultiExcerptNameICMP_ping
PageWithExcerptPath Check Support

Perform the following steps to configure path check path using ICMP ping:

Anchor
Configuring the Static Route
Configuring the Static Route
Configuring the Static Route

To configure the static routes to reach the target IP from interface, execute the following command:

Code Block
% set addressContext default staticRoute 10.54.80.155 32 10.54.114.1 LIF1 lif_eth2 preference 100 
 
% commit

Anchor
Configuring the Path Check Path Profile
Configuring the Path Check Path Profile
Configuring the Path Check Path Profile

To configure the pathCheckProfile, execute the following command:

Code Block
% set profiles services pathCheckProfile TP1 protocol icmp replyTimeout 5 sendInterval 10 failureResponseCodes all4xx recoveryCount 1 replyTimeoutCount 10 transportPreference preference1 tcp preference2 udp
 
% commit

Anchor
Configuring Path Check Path Object
Configuring Path Check Path Object
Configuring Path Check Path Object

Code Block
% set system pathCheckPath PATH1 sourceIpAddress 10.54.114.156 targetIpAddress 10.54.80.155 reportSignalIpAddress 10.54.80.156 reportSignalIpPort 3456 pathCheckProfile TP1 zone INTERNAL ipInterface lif_eth2 addressContext default ipInterfaceGroup LIF1 state enabled 
 
% commit

Anchor
Creating User ACL for ICMP (Optional)
Creating User ACL for ICMP (Optional)
Creating User ACL for ICMP (Optional)

The user ACL for ICMP must be created if there are more than 50 sessions. To create the user ACL, execute the following command:

Include Page
_IP_Access_Control_List_a_Condition_for_Using_Fill_Rate_and_Bucket_Size
_IP_Access_Control_List_a_Condition_for_Using_Fill_Rate_and_Bucket_Size

For IPv4:

Code Block
% set addressContext default ipAccessControlList rule Rule1 action accept protocol icmp fillRate 300 bucketSize 50 precedence 1 state enabled

% commit

For IPv6:

Code Block
% set addressContext default ipAccessControlList rule Rule1 action accept protocol icmpv6 fillRate 300 bucketSize 50 precedence 1 state enabled

% commit

Anchor
Viewing the ICMP Protocol
Viewing the ICMP Protocol
Viewing the ICMP Protocol

To view the ICMP protocol, enter the following command:

Code Block
> show table addressContext default ipAccessControlList rule test 
precedence 1;
protocol icmp;
action accept;
fillRate 300;
bucketSize 50;
state enabled;
aggregatePolicer OPERATOR;
[ok]
pagebreak