00-About the Configuration Guides

HomeSupportConfigure & DeployConfiguration GuidesH3C SecPath IPS Comware 7 Configuration Guides (R8560 R8660)-6W60000-About the Configuration Guides
Table of Contents
Related Documents

About the H3C SecPath ips Comware 7 configuration guides

The H3C SecPath IPS Comware 7 configuration guides describe the software features and configuration procedures for the Comware 7-based H3C SecPath IPS listed in "Applicable hardware and software versions."

Applicable hardware and software versions

To obtain software version information for a device, use the display version command in any view on the device. The configuration guides use the RXX60P18 versions as examples to illustrate feature configuration. For information about feature changes in other software versions, see the release notes for your device.

The configuration guides are applicable to the hardware and software versions in the following table:

Series

Model

Software version

T5000 series

T5010, T5020

R8560

T5030, T5060, T5080, T5000-C, T5000-S

R8560

T1000 series

T1020, T1030, T1050, T1060, T1080

R8560

T1000-AK series

T1000-AK340, T1000-AK350

R8560

T1000-AK345, T1000-AK355, T1000-AK365

R8660

T1000-AI series

T1000-AI-25, T1000-AI-35, T1000-AI-50, T1000-AI-55, T1000-AI-60, T1000-AI-65, T1000-AI-70, T1000-AI-80, T1000-AI-90

R8660

SecBlade IV IPS modules

IM-IPSX-IVLSQM1IPSDSC0LSWM1IPSD0

R8560

 

Configuration guide content

Table 1 lists features included in each configuration guide. Support for the features depends on the device model.

Table 1 Configuration guide content

Configuration guide

Content

Fundamentals Configuration Guide

Describes how to use the command line interface of the device, log in to and set up the device, and use the basic management functions. This guide includes:

·     CLI (command line interface overview and how to use the CLI)

·     RBAC

·     Login management

·     License management

·     FTP and TFTP

·     File system management

·     Configuration file management

·     Software upgrade

·     ISSU

·     Tcl

·     Python

·     MAC learning through a Layer 3 device

Virtual Technologies Configuration Guide

Describes the fundamentals and configuration of virtual technologies features. This guide includes:

·     IRF

·     Context

·     Reth interface and redundancy group

Security Configuration Guide

Describes the fundamentals and configuration of security features. This guide includes:

·     Security zone

·     Security policy

·     ASPF

·     Session management

·     Object group

·     AAA

·     User identification

·     Password control

·     MAC authentication

·     IPoE

·     Public key configuration

·     PKI

·     SSH

·     SSL

·     Connection limit

·     Attack detection and prevention

·     Server connection detection

·     ARP attack protection

·     ND attack defense

·     uRPF

·     IP-MAC binding

·     APR

·     Keychain

·     Crypto engine

DPI Configuration Guide

Describes the fundamentals and configuration of deep packet inspection (DPI) features. DPI inspects application layer payloads to protect the network against application layer malicious activities. This guide includes:

·     DPI overview

·     DPI engine

·     IPS

·     URL filtering

·     Data filtering

·     File filtering

·     Anti-virus

·     Data analysis center

·     WAF

·     Proxy policy

·     IP reputation

Internet Access Behavior Management Configuration Guide

Covers Internet access behavior management features. This guide includes:

·     Bandwidth management

·     Application audit and management

High Availability Configuration Guide

Describes high availability technologies and features available. This guide includes:

·     High availability group

Network Management and Monitoring Configuration Guide

Describes features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity. This guide includes:

·     Information center

·     Fast log output

·     Packet capture

·     Interface collaboration

·     System maintenance and debugging

·     NQA

·     BFD

·     Track

·     Monitor Link

·     CWMP

·     NTP

·     EAA

·     Process monitoring and maintenance

·     NETCONF

·     SNMP

·     RMON

·     Event MIB

·     NetStream

·     Sampler

·     Process placement

Interface Configuration Guide

Describes the fundamentals and configuration of various interfaces. This guide includes:

·     Bulk interface

·     Ethernet interface

·     Loopback, null, and inloopback interfaces

Layer 2—LAN Switching Configuration Guide

Describes the fundamentals and configuration of Layer 2 technologies and features used on a LAN switched network. This guide includes:

·     MAC address table

·     Ethernet link aggregation

·     VLAN

·     LLDP

·     Layer 2 forwarding

·     Loop detection

Layer 3—IP Services Configuration Guide

Describes IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, ARP, and interoperation between IPv4 and IPv6. This guide includes:

·     IP addressing

·     IP forwarding basic

·     Fast forwarding

·     ARP

·     DHCP

·     IPv6 basics

·     DHCPv6

·     IPv6 fast forwarding

·     DNS

·     IP performance optimization

·     Multi-CPU packet distribution

·     Adjacency table

Layer 3—IP Routing Configuration Guide

Describes the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route control, and policy based routing. This guide includes:

·     Basic IP routing

·     Static routing

·     IPv6 static routing

·     RIP

·     RIPng

·     OSPF

·     OSPFv3

·     Policy-based routing

·     IPv6 policy-based routing

·     Routing policy

ACL

Describes how to classify traffic with ACLs, and allocate network resources to improve network performance and network use efficiency. This guide includes:

·     ACL

·     Time range

VPN Instance Configuration Guide

Describes the fundamentals and configuration of VPN instances.

 

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网