|00-About the Configuration Guides-book.rar||17.38 MB|
- Table of Contents
- Related Documents
· H3C S6520X-HI switch series.
· H3C S6520X-EI switch series.
· H3C S6520X-SI switch series.
· H3C S6520-SI switch series.
· H3C S5560X-HI switch series.
· H3C S5000-EI switch series.
· H3C MS4600 switch series.
These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.
Fundamentals Configuration Guide
Describes how to use the command line interface of the switch, log in to and set up the switch, and use the basic management functions. This guide includes:
· Login management (login methods including CLI, Web, RESTful, and SNMP, and user interface configuration and access control).
· FTP and TFTP.
· File system management.
· Configuration file management.
· Software upgrade.
· Device management.
· License management.
Virtual Technologies Configuration Guide
Describes the Intelligent Resilient Framework (IRF) technology and the IRF 3.1 technology, which provide data center class availability and scalability.
IRF creates a fabric from multiple switches. The switches that form the IRF fabric work in 1:N redundancy and appear as one unit in the network. IRF improves management efficiency and streamlines network topologies. It is suitable for highly reliable enterprise networks and data centers.
IRF 3.1 integrates multiple lower-layer devices with a higher-layer IRF fabric to provide high-density, low-cost connectivity at the access layer. In an IRF 3.1 system, the higher-layer IRF fabric is called the parent fabric and the lower-layer devices are called bridge port extenders (PEXs). You manage and configure the PEXs from the parent fabric as if they were interface modules on the parent fabric.
Layer 2—LAN Switching Configuration Guide
Covers Layer 2 technologies and features used on a LAN switched network, such as VLAN technology, port isolation, and spanning tree. You can use these features to divide broadcast domains, remove Layer 2 loops, isolate users within a VLAN and so on. This guide includes:
· Ethernet interface.
· Loopback, null, and inloopback interfaces.
· Bulk interface configuration.
· MAC address table and MAC Information.
· Ethernet link aggregation.
· Port isolation.
· Spanning tree.
· Loop detection.
· VLAN (including VLAN, super VLAN, private VLAN, and voice VLAN).
· VLAN mapping.
· PPPoE relay.
Layer 3—IP Services Configuration Guide
· IP addressing.
· DNS (including DDNS).
· mDNS relay.
· IP forwarding basics (including basic IP forwarding on the device and load sharing).
· Fast forwarding.
· IP performance optimization.
· Adjacency table.
· IPv6 fast forwarding.
· HTTP redirect.
Layer 3—IP Routing Configuration Guide
Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering. This guide includes:
· Basic IP routing.
· Static routing.
· Policy-based routing.
· IPv6 static routing.
· IPv6 policy-based routing.
· Routing policy.
IP Multicast Configuration Guide
Covers Layer 2 and Layer 3 multicast protocols.
This guide includes:
· Multicast overview.
· IGMP snooping.
· PIM snooping.
· Multicast VLAN.
· Multicast routing and forwarding.
· MLD snooping.
· IPv6 PIM snooping.
· IPv6 multicast VLAN.
· IPv6 multicast routing and forwarding.
· IPv6 PIM.
MCE Configuration Guide
Describes the application scenarios, fundamentals, and configuration of MCE.
ACL and QoS Configuration Guide
Describes how to classify traffic with ACLs, and allocate network resources and manage congestions with QoS technologies to improve network performance and network use efficiency. You can use ACLs to help other function modules (such as QoS and IP routing) classify or filter traffic. This configuration guide includes:
· QoS (including QoS overview, QoS policy, priority mapping, traffic policing, GTS, and rate limit, congestion management, traffic filtering, priority marking, nesting, traffic redirecting, global CAR, class-based accounting, and appendixes).
· Data buffer.
· Time range.
Security Configuration Guide
Covers security features. The major security features available on the switch include: identity authentication, secure management, and attack protection. This guide includes:
· MAC authentication.
· Portal authentication.
· Triple authentication.
· Port security.
· User profile.
· Password control.
· IPsec, IKE, and IKEv2.
· Attack detection and prevention.
· TCP attack prevention.
· IP source guard.
· ARP attack protection.
· ND attack defense.
High Availability Configuration Guide
Describes high availability technologies and features available on the switch for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery. This guide includes:
· Ethernet OAM.
· Smart Link.
· Monitor Link.
Network Management and Monitoring Configuration Guide
Describes features that help you manage and monitor your network, for example, manage system events, and test network connectivity. This guide includes:
· NTP (including SNTP).
· Event MIB.
· Process monitoring and maintenance.
· Mirroring (including both port and flow mirroring).
· Information center.
· VCF fabric.
· Cloud connection.
· EPS agent.
Telemetry Configuration Guide
Describes the application scenarios, fundamentals, and configuration of gRPC.
OpenFlow Configuration Guide
Describes the application scenarios, fundamentals, and configuration of OpenFlow.
VXLAN Configuration Guide
Describes the application scenarios, fundamentals, and configuration of VXLAN.
EVPN Configuration Guide
Describes the application scenarios, fundamentals, and configuration of EVPN.
Service Chain Configuration Guide
Describes the application scenarios and fundamentals of service chains.
Lists the significant acronyms in the configuration guides.