Title | Size | Downloads |
---|---|---|
00-About the H3C Access Controllers Comware 7 Configuration Examples-book.rar | 28.02 MB |
- Table of Contents
- Related Documents
-
About the H3C Access Controllers Comware 7 Configuration Examples
Support for the configuration examples varies by device model and version.
The H3C Access Controller (AC) Comware 7 Configuration Examples describe examples for configuring Comware 7-based ACs.
Book name |
Content |
Trending |
Describes trending configuration. The book includes: · License Management Configuration Examples · AP Association with the AC at Layer 2 Configuration Examples · AP Association with the AC at Layer 3 Configuration Examples · Local Forwarding Configuration Examples · PSK Encryption Configuration Examples · Remote 802.1X Authentication Configuration Examples · Remote Portal Authentication Configuration Examples · Local Portal Authentication through LDAP Server Configuration Examples · Portal MAC-Trigger Authentication Configuration Examples · Transparent Authentication Through Remote MAC and Portal Authentication Configuration Examples · Dual-Link Backup Configuration Examples · Auto-DFS and Auto-TPC Configuration Examples |
System management |
Describes device login methods. The book includes: · HTTPS Login Configuration Examples · SSH Configuration Examples |
License management |
Describes license installation methods. The book includes: · License Management Configuration Examples |
Layer 2 registration |
Describes AP registration on ACs at Layer 2. The book includes: · AP Association with the AC at Layer 2 Configuration Examples · AP Association with the AC at Layer 2 (IPv6) Configuration Examples · Auto AP Configuration Examples |
Layer 3 registration |
Describes AP registration on ACs at Layer 3. The book includes: · AP Association with the AC at Layer 3 Configuration Examples · AP Association with the AC at Layer 3 (IPv6) Configuration Examples |
WLAN access |
Describes WLAN access methods for wireless clients. The book includes: · WEP Encryption Configuration Examples · PSK Encryption Configuration Examples · WPA3-SAE PSK Encryption Configuration Examples · WLAN Access (IPv6) Configuration Examples · Policy-Based Forwarding with Dual Gateways Configuration Examples · Scheduled Configuration Deployment by AP Group Configuration Examples · Inter-AC Roaming with Static Client VLAN Allocation Configuration Examples · Service Template & Radio Binding Configuration Examples · Scheduled WLAN Access Services Configuration Examples |
Wireless authentication |
Describes configuration examples for portal authentication, MAC authentication, 802.1X authentication, and EAD authentication. The book includes: · Local Portal Authentication Configuration Examples · HTTPS-Based Local Portal Authentication Configuration Examples · Remote Portal Authentication Configuration Examples · Local Portal Authentication through LDAP Server Configuration Examples · Local Portal Authentication and SSID-based Authentication Page Pushing Configuration Examples · Local Portal MAC-Trigger Authentication Configuration Examples · Portal MAC-Trigger Authentication Configuration Examples · Local Forwarding Mode and Local Portal MAC-Trigger Authentication Configuration Examples · Local Portal Authentication (IPv6) Configuration Examples · Local Portal Authentication through LDAP Server (IPv6) Configuration Examples · Remote Portal Authentication (IPv6) Configuration Examples · Portal MAC-Trigger Authentication (IPv6) Configuration Example · Remote Portal Authentication with User Profile Authorization Configuration Examples · WiFiDog Portal Authentication Configuration Examples · Portal Fail-Permit Configuration Examples · Local MAC Authentication Configuration Examples · Remote MAC Authentication Configuration Examples · Transparent Authentication Through Remote MAC and Portal Authentication Configuration Examples · Remote AP, Remote Portal, and MAC-Trigger Authentication Configuration Examples · MAC Authentication with Guest VLAN Assignment Configuration Examples · MAC Authentication with Guest VLAN Assignment (IPv6) Configuration Examples · Local MAC-And-802.1X Authentication Configuration Examples · Local 802.1X Authentication Configuration Examples · Local RADIUS-Based 802.1X Authentication in EAP Relay Mode Configuration Examples · Remote 802.1X Authentication Configuration Examples · Remote 802.1X Authentication (IPv6) Configuration Examples · Remote 802.1X Authentication in WPA3-Enterprise Mode Configuration Examples · 802.1X Authentication with ACL Assignment Through IMC Server Configuration Examples · 802.1X Authentication with User Profile Assignment Through IMC Server Configuration Examples · EAD Authentication Configuration Examples · EAD Authentication (IPv6) Configuration Examples |
Local forwarding |
Describes local forwarding configuration. The book includes: · Local Forwarding Mode and Local Portal Authentication Configuration Examples · Local Forwarding Mode Direct Portal Authentication Configuration Examples · Local Forwarding Mode Direct Portal Authentication (IPv6) Configuration Examples · Local Forwarding Configuration Examples · Wired Port Local Forwarding through Wireless Terminator Configuration Examples · Remote AP Configuration Examples · Downlink VLAN Management for Fit-Mode APs Configuration Examples · Downlink VLAN Management for Fit-Mode APs and Cloud-Mode APs Configuration Examples |
WLAN security |
Describes WLAN security configuration. The book includes: · WIPS Configuration Examples · WIPS Countermeasures Against All SSIDs Configuration Examples · IP Source Guard (IPv4) Configuration Examples · IP Source Guard (IPv6) Configuration Examples |
Application security |
Describes DPI feature and online behavior management configuration. The book includes: · IPS Configuration Examples · URL Filtering Configuration Examples · Anti-Virus Configuration Examples · Data Filtering Configuration Examples · File Filtering Configuration Examples · Application Audit and Management Configuration Examples · Application Rate Limiting Configuration Examples |
High availability |
Describes WLAN high availability configuration. The book includes: · IRF Setup with LACP MAD Configuration Examples · IRF Setup with ARP MAD Configuration Examples · IRF Setup with Members Not Directly Connected Configuration Examples · IRF Setup with Members in One Chassis Configuration Examples · IRF Setup with Members in Different Chassis Configuration Examples · Dual-Link Backup Configuration Examples · Remote 802.1X Authentication on an AC Hierarchy Network with Dual-Link Central AC Backup Configuration Examples · Remote Portal Authentication on an AC Hierarchy Network with Dual-Link Central AC Backup Configuration Examples · OAuth-Based Portal MAC-Trigger Authentication on a Local-Forwarding Dual-Link Backup Network Configuration Examples · Dual-Link Backup OAuth-Based Portal Authentication in Local Forwarding Configuration Examples · Dual-Link Backup Remote Portal MAC-Trigger Authentication in Local Forwarding Configuration Examples · Dual-Link Backup Remote Portal and Transparent MAC Authentication in Local Forwarding Configuration Examples · Dual-Link Backup Remote Portal Authentication in Local Forwarding Configuration Examples · Dual-Link Backup Remote Portal and Transparent MAC Auth in Centralized Forwarding Configuration Examples · Dual-Link Backup Remote Portal Authentication in Centralized Forwarding Configuration Examples · Dual-Link Backup Lightweight Portal Authentication in Centralized Forwarding Configuration Examples · Dual-Link Backup OAuth-Based Portal Authentication in Centralized Forwarding Configuration Examples · Dual-Link Backup Remote Portal MAC-Trigger Authentication in Centralized Forwarding Configuration Examples · Remote 802.1X Authentication on a Dual-Link AC Backup Network Configuration Examples · Remote MAC Authentication on a Dual-Link AC Backup Network Configuration Examples |
AC hierarchy |
Describes AC hierarchy configuration. The book includes: · AC Hierarchy Configuration Examples · Remote 802.1X Authentication on an AC Hierarchy Network with Local ACs as Authenticators and Traffic Forwarders Configuration Examples · Remote 802.1X Authentication on an AC Hierarchy Network (Central AC Authentication + AP Forwarding) Configuration Examples · AC Hierarchy (IPv6) Configuration Examples |
WLAN advanced features |
Describes WLAN optimization configuration. The book includes: · WLAN Probe Configuration Examples · Multicast Optimization Configuration Examples · Client Rate Limiting Configuration Examples · Inter-AC Roaming Configuration Examples · Inter-AC Roaming (IPv6) Configuration Examples · Inter-AC Roaming in Local Forwarding Mode Configuration Examples · H3C Access Controllers Cooperative Roaming for 802.11v Clients Configuration Examples · WLAN Load Balancing Configuration Examples · Static Blacklist Configuration Examples · Client Quantity Control Configuration Examples · AP License Synchronization Configuration Examples · BLE Module iBeacon Transmission Configuration Examples · Medical RFID Tag Management Configuration Examples · iBeacon Management Configuration Examples · Mesh Link Establishment Between Fit APs Configuration Examples · Mesh Link Establishment Between a Fit AP and a Fat AP Configuration Examples · Auto-DFS and Auto-TPC Configuration Examples · AP Image Downloading Configuration Examples · Dual-Uplink Interfaces Configuration Guide · H3C Comware AC Cloud-Managed AP Centralized Management Configuration Examples |
Basic network configuration |
Describes network connectivity configuration. The book includes: · Internal-to-External Access Through NAT Configuration Examples · Layer 2 Static Aggregation Configuration Examples · Layer 2 Multicast Configuration Examples · Static VLAN Allocation Configuration Examples · URL Redirection Configuration Examples · IPv6 URL Redirection Configuration Examples |