00-About the Configuration Guides

HomeSupportResource CenterH3C S6520X-HI[EI][SI] & S6520-SI & S5560X-HI & S5000-EI & MS4600 Switch Series Configuration Guides-R63xx-6W10000-About the Configuration Guides
Download Book
Title Size Downloads
00-About the Configuration Guides-book.rar 17.38 MB
Table of Contents
Related Documents

About the H3C S6520X-HI[EI][SI] & S6520-SI & S5560X-HI & S5000-EI & MS4600 configuration guides

The configuration guides describe the software features for the following switches and guide you through the software configuration procedures:

·           H3C S6520X-HI switch series.

·           H3C S6520X-EI switch series.

·           H3C S6520X-SI switch series.

·           H3C S6520-SI switch series.

·           H3C S5560X-HI switch series.

·           H3C S5000-EI switch series.

·           H3C MS4600 switch series.

These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.


Configuration guide


Fundamentals Configuration Guide

Describes how to use the command line interface of the switch, log in to and set up the switch, and use the basic management functions. This guide includes:

·          CLI.

·          RBAC.

·          Login management (login methods including CLI, Web, RESTful, and SNMP, and user interface configuration and access control).

·          FTP and TFTP.

·          File system management.

·          Configuration file management.

·          Software upgrade.

·          ISSU.

·          Device management.

·          Tcl.

·          Python.

·          Automatic configuration.

·          License management.

Virtual Technologies Configuration Guide

Describes the Intelligent Resilient Framework (IRF) technology and the IRF 3.1 technology, which provide data center class availability and scalability.

IRF creates a fabric from multiple switches. The switches that form the IRF fabric work in 1:N redundancy and appear as one unit in the network. IRF improves management efficiency and streamlines network topologies. It is suitable for highly reliable enterprise networks and data centers.

IRF 3.1 integrates multiple lower-layer devices with a higher-layer IRF fabric to provide high-density, low-cost connectivity at the access layer. In an IRF 3.1 system, the higher-layer IRF fabric is called the parent fabric and the lower-layer devices are called bridge port extenders (PEXs). You manage and configure the PEXs from the parent fabric as if they were interface modules on the parent fabric.

Layer 2—LAN Switching Configuration Guide

Covers Layer 2 technologies and features used on a LAN switched network, such as VLAN technology, port isolation, and spanning tree. You can use these features to divide broadcast domains, remove Layer 2 loops, isolate users within a VLAN and so on. This guide includes:

·          Ethernet interface.

·          Loopback, null, and inloopback interfaces.

·          Bulk interface configuration.

·          MAC address table and MAC Information.

·          Ethernet link aggregation.

·          DRNI.

·          Port isolation.

·          Spanning tree.

·          Loop detection.

·          VLAN (including VLAN, super VLAN, private VLAN, and voice VLAN).

·          MVRP.

·          QinQ.

·          VLAN mapping.

·          LLDP.

·          L2PT.

·          PPPoE relay.

Layer 3—IP Services Configuration Guide

Describes how to configure ARP, IP addressing, IP performance optimization, IP forwarding basics, IPv6 basics, DHCP, DNS, UDP helper, and DHCPv6. This guide includes:

·          ARP (including gratuitous ARP, proxy ARP, ARP snooping, and ARP direct route advertisement).

·          IP addressing.

·          DHCP (including DHCP overview, DHCP server, DHCP relay agent, DHCP client, DHCP snooping, and BOOTP client).

·          DNS (including DDNS).

·          mDNS relay.

·          IP forwarding basics (including basic IP forwarding on the device and load sharing).

·          Fast forwarding.

·          IRDP.

·          IP performance optimization.

·          Adjacency table.

·          UDP helper.

·          Basic IPv6 settings.

·          DHCPv6 (including DHCPv6 overview, DHCPv6 server, DHCPv6 relay agent, DHCPv6 client, DHCPv6 snooping, and DHCPv6 guard).

·          IPv6 fast forwarding.

·          GRE.

·          HTTP redirect.

·          Tunneling.

Layer 3—IP Routing Configuration Guide

Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering. This guide includes:

·          Basic IP routing.

·          Static routing.

·          RIP.

·          OSPF.

·          IS-IS.

·          BGP.

·          Policy-based routing.

·          IPv6 static routing.

·          RIPng.

·          OSPFv3.

·          IPv6 policy-based routing.

·          Routing policy.

IP Multicast Configuration Guide

Covers Layer 2 and Layer 3 multicast protocols.

This guide includes:

·          Multicast overview.

·          IGMP snooping.

·          PIM snooping.

·          Multicast VLAN.

·          Multicast routing and forwarding.

·          IGMP.

·          PIM.

·          MSDP.

·          MLD snooping.

·          IPv6 PIM snooping.

·          IPv6 multicast VLAN.

·          IPv6 multicast routing and forwarding.

·          MLD.

·          IPv6 PIM.

MCE Configuration Guide

Describes the application scenarios, fundamentals, and configuration of MCE.

ACL and QoS Configuration Guide

Describes how to classify traffic with ACLs, and allocate network resources and manage congestions with QoS technologies to improve network performance and network use efficiency. You can use ACLs to help other function modules (such as QoS and IP routing) classify or filter traffic. This configuration guide includes:

·          ACL.

·          QoS (including QoS overview, QoS policy, priority mapping, traffic policing, GTS, and rate limit, congestion management, traffic filtering, priority marking, nesting, traffic redirecting, global CAR, class-based accounting, and appendixes).

·          Data buffer.

·          Time range.

Security Configuration Guide

Covers security features. The major security features available on the switch include: identity authentication, secure management, and attack protection. This guide includes:

·          AAA.

·          802.1X.

·          MAC authentication.

·          Portal authentication.

·          Web authentication.

·          Triple authentication.

·          Port security.

·          User profile.

·          Password control.

·          Keychain.

·          Public key management.

·          PKI.

·          IPsec, IKE, and IKEv2.

·          SSH.

·          SSL.

·          Attack detection and prevention.

·          TCP attack prevention.

·          IP source guard.

·          ARP attack protection.

·          ND attack defense.

·          uRPF.

·          SAVI.

·          MFF.

·          Crypto engine.

·          FIPS.

High Availability Configuration Guide

Describes high availability technologies and features available on the switch for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery. This guide includes:

·          Ethernet OAM.

·          CFD.

·          DLDP.

·          RRPP.

·          ERPS.

·          Smart Link.

·          Monitor Link.

·          VRRP.

·          BFD.

·          Track.

·          Process placement.

Network Management and Monitoring Configuration Guide

Describes features that help you manage and monitor your network, for example, manage system events, and test network connectivity. This guide includes:

·          System maintenance and debugging (ping, tracert, and system debugging).

·          NQA.

·          NTP (including SNTP).

·          PTP.

·          PoE.

·          SNMP.

·          RMON.

·          Event MIB.

·          NETCONF.

·          Ansible.

·          Puppet.

·          SmartMC.

·          CWMP.

·          EAA.

·          Process monitoring and maintenance.

·          Mirroring (including both port and flow mirroring).

·          sFlow.

·          Information center.

·          Packet capture.

·          VCF fabric.

·          Cloud connection.

·          EPS agent.

Telemetry Configuration Guide

Describes the application scenarios, fundamentals, and configuration of gRPC.

OpenFlow Configuration Guide

Describes the application scenarios, fundamentals, and configuration of OpenFlow.

VXLAN Configuration Guide

Describes the application scenarios, fundamentals, and configuration of VXLAN.

EVPN Configuration Guide

Describes the application scenarios, fundamentals, and configuration of EVPN.

Service Chain Configuration Guide

Describes the application scenarios and fundamentals of service chains.


Lists the significant acronyms in the configuration guides.