00-About the Configuration Guides

HomeSupportConfigure & DeployConfiguration GuidesH3C SecPath Firewall Series Configuration Guides(V7)-6W60100-About the Configuration Guides
Table of Contents
Related Documents

About the H3C SecPath firewall series configuration guides

The H3C SecPath firewall series configuration guides describe the software features for the H3C SecPath firewall series, and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.

Applicable hardware and software versions

To obtain software version information for a device, use the display version command in any view on the device. The configuration guides use the RXX60P27 versions as examples to illustrate feature configuration. For information about feature changes in other software versions, see the release notes for your device.

The following matrix shows the hardware and software versions to which the configuration guides are applicable:

 

F1000 Series

Device model

Software version

F1000-X-G5 series

F1000-A-G5, F1000-C-G5, F1000-C-G5-LI, F1000-E-G5, F1000-H-G5, F1000-S-G5

R8860

F1000-X-G3 series

F1000-A-G3, F1000-C-G3, F1000-E-G3, F1000-S-G3

R8860

F1000-X-G2 series

F1000-A-G2, F1000-C-G2, F1000-E-G2, F1000-S-G2

R9360

F1000-9X0-AI series

F1000-9390-AI,F1000-9385-AI,F1000-9380-AI,F1000-9370-AI,F1000-9360-AI,F1000-9350-AI,F1000-9330-AI,F1000-9320-AI

R8860

F1000-990-AI,F1000-980-AI,F1000-970-AI,F1000-960-AIF1000-950-AI,F1000-930-AI,F1000-920-AI

R9360

F1000-910-AI,F1000-905-AI

R9560

F1000-C83X0 series

F1000-C8395,F1000-C8390,F1000-C8385,F1000-C8380,F1000-C8370,F1000-C8360,F1000-C8350,F1000-C8330

R8860

F1000-C81X0 series

F1000-C8180,F1000-C8170,F1000-C8160

R9360

F1000-C8150,F1000-C8130,F1000-C8120,F1000-C8110

R9560

F1000-7X0-HI series

F1000-770-HI,F1000-750-HI,F1000-740-HI,F1000-730-HI

R8860

F1000-720-HI,F1000-710-HI

R9560

F1000-C-X series

F1000-C-EI,F1000-C-HI,F1000-C-XI,F1000-E-XI

R9360

F1000-V series

F1000-E-VG

R9360

F1000-S-VG

R9560

SecBlade IV

LSPM6FWD8,LSQM2FWDSC8

R8560

 

F100 Series

Device model

Software version

F100-X-G5 series

F100-A-G5,F100-E-G5

R8860

F100-C-G5,F100-M-G5,F100-S-G5

R9560

F100-X-G3 series

F100-A-G3,F100-E-G3

R9360

F100-C-G3,F100-M-G3,F100-S-G3

R9560

F100-X-G2 series

F100-A-G2,F100-E-G2

R9360

F100-C-G2,F100-M-G2,F100-S-G2

R9560

F100-WiNet series

F100-A91-WiNet,F100-A81-WiNet

R8860

F100-A80-WiNet

R9360

F100-C80-WiNet,F100-C60-WiNet,F100-C50-WiNet,F100-S80-WiNet

R9560

F100-C-A series

F100-C-A6,F100-C-A5,F100-C-A3

R9560

F100-C-A2,F100-C-A1

E8460

F100-C-A6-WL,F100-C-A5-WF100-C-A3-W

R9660

F100-X-XI series

F100-A-EI,F100-A-HI,F100-A-SI,F100-E-EI

R9360

F100-C-EI,F100-C-HI,F100-C-XI,F100-S-HI,F100-S-XI

R9560

 

Contents

Table 1 lists features included in each configuration guide. Support for the features depends on the device model.

Table 1 Configuration guide content

Configuration guide

Content

Fundamentals Configuration Guide

Covers information about using the command line interface, logging in to and setting up the device, and using the basic management features. This guide includes:

·     CLI (command line interface overview and how to use the CLI)

·     RBAC

·     Login management

·     License management

·     Device management

·     FTP and TFTP

·     File system management

·     Configuration file management

·     Software upgrade

·     ISSU

·     Automatic

·     Tcl

·     Python

Virtual Technologies Configuration Guide

Covers the configuration of virtual technologies. This guide includes:

·     IRF

·     Context

·     Reth interface and redundancy group

Security Configuration Guide

Covers identity authentication, access security, secure management, SSL, and attack protection features. This guide includes:

·     Security zone

·     Security policy

·     ASPF

·     Session management

·     Object group

·     IP source guard

·     AAA

·     802.1X

·     User identification

·     Password control

·     Portal

·     MAC authentication

·     IPoE

·     Public key configuration

·     PKI

·     SSH

·     SSL

·     Connection limit

·     Attack detection and prevention

·     Server connection detection

·     ARP attack protection

·     ND attack defense

·     uRPF

·     IP-MAC binding

·     APR

·     Keychain

·     Crypto engine

·     MAC learning through a Layer 3 device

·     SMS

DPI Configuration Guide

Covers fundamentals and configuration of deep packet inspection. This guide includes:

·     DPI overview

·     DPI engine

·     IPS

·     URL filtering

·     Data filtering

·     File filtering

·     Anti-virus

·     Data analysis center

·     Proxy policy

·     WAF

·     IP reputation

·     APT defense

·     Domain reputation

NAT Configuration Guide

Covers fundamentals and configuration of NAT and AFT. This guide includes:

·     NAT

·     NAT66

·     AFT

VPN Configuration Guide

Covers VPN-related features. This guide includes:

·     SSL VPN

·     IPsec

·     Tunneling

·     GRE

·     L2TP

·     ADVPN

Internet Access Behavior Management Configuration Guide

Covers Internet access behavior management features. This guide includes:

·     Bandwidth management

·     Application audit and management

·     NetShare control

Load Balancing Configuration Guide

Covers fundamentals, configuration procedures, and configuration examples of load balancing features.

High Availability Configuration Guide

Describes high availability technologies and features available on the device for failure detection and failover.

Interface Configuration Guide

Covers the configuration of various interfaces. This guide includes:

·     Bulk interface

·     Ethernet interface

·     Loopback, null, and inloopback interfaces

Layer 2—LAN Switching Configuration Guide

Covers Layer 2 technologies and features used on a LAN switched network. This guide includes:

·     MAC address table

·     Ethernet link aggregation

·     VLAN

·     VLAN termination

·     Spanning tree

·     LLDP

·     Layer 2 forwarding

Layer 2—WAN Access Configuration Guide

Covers the Layer 2 WAN access features. This guide includes:

·     PPP

·     Mobile communication modem

Layer 3—IP Services Configuration Guide

Covers IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, ARP, and interoperation between IPv4 and IPv6. This guide includes:

·     IP addressing

·     IP forwarding basics

·     Fast forwarding

·     ARP (including proxy ARP)

·     IPv6 basics

·     IPv6 fast forwarding

·     DHCP

·     DHCPv6

·     DNS

·     IP performance optimization

·     Multi-CPU packet distribution

·     Adjacency table

·     Web caching

Layer 3—IP Routing Configuration Guide

Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route control, and policy based routing. This guide includes:

·     Basic IP routing

·     Static routing

·     IPv6 static routing

·     RIP

·     RIPng

·     OSPF

·     OSPFv3

·     IS-IS

·     BGP

·     Policy-based routing

·     IPv6 policy-based routing

·     Routing policy

·     Guard route

·     RIR

ACL and QoS Configuration Guide

Covers information about classifying traffic with ACLs, and controlling traffic and allocating network resources with QoS technologies to improve network performance and network use efficiency. This guide includes:

·     ACL

·     QoS (including QoS overview, QoS policy, traffic policing, traffic filtering, and priority marking)

·     Time range

IP Multicast Configuration Guide

Covers the IP multicast features. This guide includes:

·     Multicast overview

·     Multicast routing and forwarding

·     IGMP

·     PIM

·     IPv6 multicast routing and forwarding

·     MLD

Network Management and Monitoring Configuration Guide

Covers features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity. This guide includes:

·     Information center

·     Flow log

·     Fast log output

·     NetStream

·     Cloud connection

·     Mirroring

·     Packet capture

·     NQA

·     Track

·     BFD

·     Monitor Link

·     Smart Link

·     Interface backup

·     Interface collaboration

·     System maintenance and debugging (ping, tracert, and system debugging)

·     NTP

·     EAA

·     Process monitoring and maintenance

·     NETCONF

·     CWMP

·     SNMP (including the MIB style configuration)

·     RMON

·     Event MIB

·     Process placement

VPN Instance Configuration Guide

Covers VPN instance fundamentals and configuration procedures.

VXLAN Configuration Guide

Describes the fundamentals and configuration of VXLAN features.

Service Chain Configuration Guide

Describes the fundamentals and configuration of Service Chain features.

Acronyms

Lists the significant acronyms in the configuration guides.

 

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网