00-About the Configuration Guides

HomeSupportConfigure & DeployConfiguration GuidesH3C S6800 & S6860 Switch Series Configuration Guides-Release 671x-6W10000-About the Configuration Guides
Table of Contents
Related Documents

About the H3C S6800 & 6860 configuration guides

The H3C S6800 & S6860 configuration guides describe the software features for the H3C S6800, and S6860 Switch Series, and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.

These configuration guides are applicable to the following product models:

·     S6800-32Q(LS-6800-32Q-H1).

·     S6800-54QF(LS-6800-54QF-H3).

·     S6800-54QF(LS-6800-54QF-H5).

·     S6800-54QT(LS-6800-54QT-H3).

·     S6800-2C(LS-6800-2C-H1).

·     S6800-4C(LS-6800-4C-H1).

·     S6860-54HF(LS-6860-54HF).

·     S6860-30HF(LS-6860-30HF).

·     S6860-54HT(LS-6860-54HT).

 

Configuration guide

Content

Fundamentals Configuration Guide

Covers information about using the command line interface, logging in to and setting up the device, and using the basic management features.

This guide includes:

·     CLI (command line interface overview and how to use the CLI).

·     RBAC.

·     Logging in to the device (login methods such as Telnet, and user interface configuration and access control).

·     FTP and TFTP.

·     File system management.

·     Configuration file management.

·     Software upgrade.

·     ISSU.

·     GIR.

·     Emergency shell.

·     Automatic configuration.

·     Preprovisioning.

·     Device management.

·     Tcl.

·     Python.

·     Licenses management.

Virtual Technologies Configuration Guide

IRF creates a large virtual device from multiple devices. The IRF member devices work in 1:N redundancy and appear as one unit in the network. IRF improves management efficiency and streamlines network topology. It is suitable for highly reliable enterprise networks and data centers.

Layer 2—LAN Switching Configuration Guide

Covers Layer 2 technologies and features used on a LAN switched network, such as VLAN technology and port isolation. You can use these features to divide broadcast domains, remove Layer 2 loops, isolate users within a VLAN, or re-mark VLAN tags.

This guide includes:

·     MAC address table and MAC Information.

·     Bulk interface configuration.

·     Ethernet interface.

·     Ethernet link aggregation.

·     M-LAG.

·     Port isolation.

·     VLAN (including VLAN, super VLAN, private VLAN, and voice VLAN).

·     MVRP.

·     Loopback, null, and inloopback interfaces.

·     QinQ.

·     VLAN mapping.

·     PBB.

·     Loop detection.

·     Spanning tree.

·     LLDP.

·     L2PT.

·     Service loopback group.

·     Layer 2 forwarding.

Layer 3—IP Services Configuration Guide

Covers IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, ARP, and interoperation between IPv4 and IPv6.

This guide includes:

·     ARP (including ARP, gratuitous ARP, proxy ARP, ARP snooping, ARP fast reply, and ARP direct route advertisement).

·     IP addressing.

·     DHCP (including DHCP overview, DHCP server, DHCP relay agent, DHCP client, DHCP snooping, and BOOTP client).

·     DNS and DDNS.

·     IP forwarding basics and load sharing.

·     Fast forwarding.

·     Adjacency table.

·     IRDP.

·     IP performance optimization.

·     UDP helper.

·     Basic IPv6 settings.

·     DHCPv6 (including DHCPv6 overview, DHCPv6 server, DHCPv6 relay agent, DHCPv6 client, and DHCPv6 snooping).

·     IPv6 fast forwarding.

·     Tunneling.

·     GRE.

·     HTTP redirect.

Layer 3—IP Routing Configuration Guide

Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route control, and policy based routing.

This guide includes:

·     Basic IP routing.

·     Static routing.

·     RIP.

·     OSPF.

·     IS-IS.

·     BGP.

·     Policy-based routing.

·     IPv6 static routing.

·     RIPng.

·     OSPFv3.

·     IPv6 policy-based routing.

·     Routing policy.

·     DCN.

IP Multicast Configuration Guide

Covers Layer 2 and Layer 3 multicast protocols.

This guide includes:

·     Multicast overview.

·     IGMP snooping.

·     PIM snooping.

·     Multicast VLAN.

·     Multicast routing and forwarding.

·     IGMP.

·     PIM.

·     MSDP.

·     Multicast VPN.

·     MLD snooping.

·     IPv6 PIM snooping.

·     IPv6 multicast VLAN.

·     IPv6 multicast routing and forwarding.

·     MLD.

·     IPv6 PIM.

MPLS Configuration Guide

Covers MPLS fundamentals and configurations.

This guide includes:

·     Basic MPLS.

·     SR-MPLS.

·     Static LSP.

·     LDP.

·     MPLS TE.

·     Static CRLSP.

·     RSVP.

·     Tunnel policy.

·     MPLS L3VPN and IPv6 MPLS L3VPN.

·     MPLS L2VPN.

·     VPLS.

·     MPLS OAM.

·     MCE and IPv6 MCE.

ACL and QoS Configuration Guide

Covers information about classifying traffic with ACLs, and allocating network resources and managing congestions with QoS technologies to improve network performance and network use efficiency. You can use ACLs to help feature modules (such as QoS and IP routing) classify or filter traffic.

This guide includes:

·     ACL.

·     QoS (including QoS overview, QoS policy, priority mapping, traffic policing, GTS and rate limit, congestion management, congestion avoidance, traffic filtering, priority marking, nesting, traffic redirecting, global CAR, class-based accounting, and appendixes).

·     Time range.

·     Data buffer.

·     QCN.

Security Configuration Guide

Covers security features. The major security features available on the switch include: identity authentication (AAA and PKI), access security (802.1X, MAC authentication, portal, and port security), secure management (public key management, SSH, SSL, and IPsec), and attack protection (IP source guard, ARP attack protection, uRPF, attack detection and prevention, and ND attack defense).

This guide includes:

·     AAA.

·     802.1X.

·     MAC authentication.

·     Portal.

·     Web authentication.

·     Triple authentication.

·     Port security.

·     User profile.

·     Password control.

·     Keychain.

·     Public key management.

·     PKI.

·     SSH.

·     SSL.

·     Object group.

·     Attack detection and prevention.

·     TCP attack prevention.

·     IP source guard.

·     ARP attack protection.

·     ND attack defense.

·     uRPF.

·     SAVI.

·     SAVA.

·     MFF.

·     Crypto engine.

·     FIPS.

·     MACsec.

·     Microsegmentation.

High Availability Configuration Guide

Covers high availability technologies and features available on the switch for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery.

This guide includes:

·     Ethernet OAM.

·     CFD.

·     DLDP.

·     RRPP.

·     ERPS.

·     Smart Link.

·     Monitor Link.

·     VRRP.

·     BFD.

·     Track.

·     Process placement.

Network Management and Monitoring Configuration Guide

Covers features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity.

This guide includes:

·     System maintenance and debugging (ping, tracert, and system debugging).

·     NQA.

·     NTP and SNTP.

·     PTP.

·     SNMP.

·     RMON.

·     Event MIB.

·     NETCONF.

·     Ansible.

·     Puppet.

·     Chef.

·     CWMP.

·     EAA.

·     Process monitoring and maintenance.

·     Mirroring (including both port and traffic mirroring).

·     sFlow.

·     Information center.

·     Packet capture.

·     VCF fabric.

·     Performance management.

FC and FCoE Configuration Guide

Covers FC and FCoE fundamentals and configuration.

Telemetry Configuration Guide

Covers gRPC fundamentals and configuration.

TRILL Configuration Guide

Covers TRILL fundamentals and configuration.

SPB Configuration Guide

Covers SPBM fundamentals and configuration.

EVB Configuration Guide

Covers EVB fundamentals and configuration.

OpenFlow Configuration Guide

Covers OpenFlow fundamentals and configuration.

VXLAN Configuration Guide

Covers VXLAN fundamentals and configuration.

EVPN Configuration Guide

Covers EVPN fundamentals and configuration.

Service Chain Configuration Guide

Covers service chain fundamentals.

Intelligent Lossless Network Configuration Guide

Covers PFC fundamentals and configuration.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网