00-About the H3C S6805 S6850 S9850 Configuration Guides

HomeSupportResource CenterH3C S6805 & S6850 & S9850 Configuration Guides-Release 66xx-6W10000-About the H3C S6805 S6850 S9850 Configuration Guides
Download Book
Table of Contents
Related Documents

About the H3C S6805 & S6850 & S9850 configuration guides

The H3C S6805 & S6850 & S9850 configuration guides describe the software features for the H3C S6805, S6850, and S9850 switch series, and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.

 

Configuration guide

Content

Fundamentals Configuration Guide

Covers information about using the command line interface, logging in to and setting up the device, and using the basic management features.

This guide includes:

·         CLI (command line interface overview and how to use the CLI).

·         RBAC.

·         Logging in to the device (login methods such as telnet, and user interface configuration and access control).

·         FTP and TFTP.

·         File system management.

·         Configuration file management.

·         Software upgrade.

·         ISSU.

·         Automatic configuration.

·         Preprovisioning.

·         Device management.

·         Tcl.

·         Python.

·         License.

Virtual Technologies Configuration Guide

Covers Intelligent Resilient Framework (IRF) technology, which provides data center class availability and scalability.

IRF creates a large virtual device from multiple devices. The IRF member devices work in 1:N redundancy and appear as one unit in the network. IRF improves management efficiency and streamlines network topology. It is suitable for highly reliable enterprise networks and data centers.

Layer 2—LAN Switching Configuration Guide

Covers Layer 2 technologies and features used on a LAN switched network, such as VLAN technology and port isolation. You can use these features to divide broadcast domains, remove Layer 2 loops, isolate users within a VLAN, or re-mark VLAN tags.

This guide includes:

·         Ethernet interface.

·         Loopback, null, and inloopback interfaces.

·         Bulk interface configuration.

·         MAC address table and MAC Information.

·         Ethernet link aggregation.

·         DRNI.

·         Port isolation.

·         Spanning tree.

·         Loop detection.

·         VLAN (including super VLAN, private VLAN, and voice VLAN).

·         MVRP.

·         QinQ.

·         VLAN mapping.

·         LLDP.

·         L2PT.

·         Service loopback group.

·         Cut-through Layer 2 forwarding.

Layer 3—IP Services Configuration Guide

Covers IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, ARP, and interoperation between IPv4 and IPv6.

This guide includes:

·         ARP (ARP, gratuitous ARP, proxy ARP, ARP snooping, and ARP fast reply, ARP direct route advertisement).

·         IP addressing.

·         DHCP (DHCP overview, DHCP server, DHCP relay agent, DHCP client, DHCP snooping, BOOTP client).

·         DNS and DDNS.

·         IP forwarding basics and load sharing.

·         Fast forwarding.

·         Adjacency table.

·         IRDP.

·         IP performance optimization.

·         UDP Helper.

·         IPv6 basics.

·         DHCPv6 (DHCPv6 overview, DHCPv6 server, DHCPv6 relay agent, DHCPv6 client, DHCPv6 snooping,DHCPv6 guard).

·         IPv6 fast forwarding.

·         Tunneling.

·         GRE.

·         HTTP redirect.

Layer 3—IP Routing Configuration Guide

Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route control, and policy based routing.

This guide includes:

·         Basic IP routing.

·         Static routing.

·         RIP.

·         OSPF.

·         IS-IS.

·         BGP.

·         Policy-based routing.

·         IPv6 static routing.

·         RIPng.

·         OSPFv3.

·         IPv6 policy-based routing.

·         Routing policy.

IP Multicast Configuration Guide

Covers Layer 2 IPv4 multicast protocols (including IGMP snooping, and multicast VLAN), Layer 3 IPv4 multicast protocols (including IGMP and PIM), Layer 2 IPv6 multicast protocols (including MLD snooping and IPv6 multicast VLAN), and Layer 3 IPv6 multicast protocols (including MLD, IPv6 PIM, and MSDP).

This guide includes:

·         Multicast overview.

·         IGMP snooping.

·         PIM snooping.

·         Multicast VLAN.

·         Multicast routing and forwarding.

·         IGMP.

·         PIM.

·         MSDP.

·         Multicast VPN.

·         MLD snooping.

·         IPv6 PIM snooping.

·         IPv6 multicast VLAN.

·         IPv6 multicast routing and forwarding.

·         MLD.

·         IPv6 PIM.

MPLS Configuration Guide

Covers MPLS features.

This guide includes:

·         Basic MPLS.

·         Static LSP.

·         LDP.

·         MPLS TE.

·         Static CRLSP.

·         RSVP.

·         Tunnel policy.

·         MPLS L3VPN and IPv6 MPLS L3VPN.

·         MPLS L2VPN.

·         VPLS.

·         MPLS OAM.

·         MCE and IPv6 MCE.

·         MPLS SR.

ACL and QoS Configuration Guide

Covers information about classifying traffic with ACLs, and allocating network resources and managing congestions with QoS technologies to improve network performance and network use efficiency. You can use ACLs to help feature modules (such as QoS and IP routing) classify or filter traffic.

This guide includes:

·         ACL.

·         QoS:

?  QoS overview.

?  QoS policy.

?  Priority mapping.

?  Traffic policing, GTS, and rate limit.

?  Congestion management.

?  Congestion avoidance.

?  Traffic filtering.

?  Priority marking.

?  Nesting.

?  Traffic redirecting.

?  Global CAR.

?  Class-based accounting.

?  QPPB.

?  Packet-drop logging for control plane protocols.

?  Appendixes.

·         Data buffer.

·         Time range.

Security Configuration Guide

Covers security features. The major security features available on the switch include identity authentication, access security, secure management, and attack protection.

This guide includes:

·         AAA.

·         802.1X.

·         MAC authentication.

·         Portal.

·         Web authentication.

·         Port security.

·         User profile.

·         Password control.

·         Keychain.

·         Public key management.

·         PKI.

·         IPsec, IKE, and IKEv2.

·         SSH.

·         SSL.

·         Attack detection and prevention.

·         TCP attack prevention.

·         IP source guard.

·         ARP attack protection.

·         ND attack defense.

·         uRPF.

·         MFF.

·         Crypto engine.

·         FIPS.

·         MACsec.

High Availability Configuration Guide

Covers high availability technologies and features available on the switch for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery.

This guide includes:

·         Ethernet OAM.

·         CFD.

·         DLDP.

·         RRPP.

·         ERPS.

·         Smart Link.

·         Monitor Link.

·         VRRP.

·         BFD.

·         Track.

·         Process placement.

Network Management and Monitoring Configuration Guide

Covers features that help you manage and monitor your network, for example, manage system events and test network connectivity.

This guide includes:

·         System maintenance and debugging (ping, tracert, and system debugging).

·         NQA.

·         NTP and SNTP.

·         PTP.

·         SNMP.

·         RMON.

·         Event MIB.

·         NETCONF.

·         Puppet.

·         Chef.

·         CWMP.

·         EAA.

·         Process monitoring and maintenance.

·         Sampler.

·         Mirroring (including both port and flow mirroring).

·         NetStream.

·         IPv6 NetStream.

·         sFlow.

·         Information center.

·         GOLD.

·         Packet capture.

·         VCF fabric.

·         Ansible.

Telemetry Configuration Guide

Covers the application scenarios, fundamentals, and configuration of gRPC, INT, and telemetry stream.

FC and FCoE Configuration Guide

Covers the application scenarios, fundamentals, and configuration of FC and FCoE.

OpenFlow Configuration Guide

Covers the application scenarios,  fundamentals, and configuration of OpenFlow.

VXLAN Configuration Guide

Covers the application scenarios, fundamentals, and configuration of VXLAN.

EVPN Configuration Guide

Covers the application scenarios, fundamentals, and configuration of EVPN.

Service Chain Configuration Guide

Covers the application scenarios and fundamentals of the service chain technology.

Acronyms

Lists the significant acronyms in the configuration guides.