H3C SecPath IPS Comware 7 Configuration Guides (R8560_R8660)-6W600-book_CHM.rar(15.69 MB)
H3C SecPath IPS Comware 7 Configuration Guides (R8560_R8660)-6W600-book.pdf(15.60 MB)
- Released At: 29-08-2023
- Page Views:
- Downloads:
- Table of Contents
- Related Documents
-
About the H3C SecPath ips Comware 7 configuration guides
The H3C SecPath IPS Comware 7 configuration guides describe the software features and configuration procedures for the Comware 7-based H3C SecPath IPS listed in "Applicable hardware and software versions."
Applicable hardware and software versions
To obtain software version information for a device, use the display version command in any view on the device. The configuration guides use the RXX60P18 versions as examples to illustrate feature configuration. For information about feature changes in other software versions, see the release notes for your device.
The configuration guides are applicable to the hardware and software versions in the following table:
Series | Model | Software version |
T5000 series | T5010, T5020 | R8560 |
T5030, T5060, T5080, T5000-C, T5000-S | R8560 | |
T1000 series | T1020, T1030, T1050, T1060, T1080 | R8560 |
T1000-AK series | T1000-AK340, T1000-AK350 | R8560 |
T1000-AK345, T1000-AK355, T1000-AK365 | R8660 | |
T1000-AI series | T1000-AI-25, T1000-AI-35, T1000-AI-50, T1000-AI-55, T1000-AI-60, T1000-AI-65, T1000-AI-70, T1000-AI-80, T1000-AI-90 | R8660 |
SecBlade IV IPS modules | IM-IPSX-IV、LSQM1IPSDSC0、LSWM1IPSD0 | R8560 |
Configuration guide content
Table 1 lists features included in each configuration guide. Support for the features depends on the device model.
Table 1 Configuration guide content
Configuration guide | Content |
Fundamentals Configuration Guide | Describes how to use the command line interface of the device, log in to and set up the device, and use the basic management functions. This guide includes: · CLI (command line interface overview and how to use the CLI) · RBAC · Login management · License management · FTP and TFTP · File system management · Configuration file management · Software upgrade · ISSU · Tcl · Python · MAC learning through a Layer 3 device |
Virtual Technologies Configuration Guide | Describes the fundamentals and configuration of virtual technologies features. This guide includes: · IRF · Context · Reth interface and redundancy group |
Security Configuration Guide | Describes the fundamentals and configuration of security features. This guide includes: · Security zone · Security policy · ASPF · Session management · Object group · AAA · User identification · Password control · MAC authentication · IPoE · Public key configuration · PKI · SSH · SSL · Connection limit · Attack detection and prevention · Server connection detection · ARP attack protection · ND attack defense · uRPF · IP-MAC binding · APR · Keychain · Crypto engine |
DPI Configuration Guide | Describes the fundamentals and configuration of deep packet inspection (DPI) features. DPI inspects application layer payloads to protect the network against application layer malicious activities. This guide includes: · DPI overview · DPI engine · IPS · URL filtering · Data filtering · File filtering · Anti-virus · Data analysis center · WAF · Proxy policy · IP reputation |
Internet Access Behavior Management Configuration Guide | Covers Internet access behavior management features. This guide includes: · Bandwidth management · Application audit and management |
High Availability Configuration Guide | Describes high availability technologies and features available. This guide includes: · High availability group |
Network Management and Monitoring Configuration Guide | Describes features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity. This guide includes: · Information center · Fast log output · Packet capture · Interface collaboration · System maintenance and debugging · NQA · BFD · Track · Monitor Link · CWMP · NTP · EAA · Process monitoring and maintenance · NETCONF · SNMP · RMON · Event MIB · NetStream · Sampler · Process placement |
Interface Configuration Guide | Describes the fundamentals and configuration of various interfaces. This guide includes: · Bulk interface · Ethernet interface · Loopback, null, and inloopback interfaces |
Layer 2—LAN Switching Configuration Guide | Describes the fundamentals and configuration of Layer 2 technologies and features used on a LAN switched network. This guide includes: · MAC address table · Ethernet link aggregation · VLAN · LLDP · Layer 2 forwarding · Loop detection |
Layer 3—IP Services Configuration Guide | Describes IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, ARP, and interoperation between IPv4 and IPv6. This guide includes: · IP addressing · IP forwarding basic · Fast forwarding · ARP · DHCP · IPv6 basics · DHCPv6 · IPv6 fast forwarding · DNS · IP performance optimization · Multi-CPU packet distribution · Adjacency table |
Layer 3—IP Routing Configuration Guide | Describes the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route control, and policy based routing. This guide includes: · Basic IP routing · Static routing · IPv6 static routing · RIP · RIPng · OSPF · OSPFv3 · Policy-based routing · IPv6 policy-based routing · Routing policy |
ACL | Describes how to classify traffic with ACLs, and allocate network resources to improve network performance and network use efficiency. This guide includes: · ACL · Time range |
VPN Instance Configuration Guide | Describes the fundamentals and configuration of VPN instances. |