00-About the Configuration Guides

HomeSupportResource CenterConfigure & DeployConfiguration GuidesH3C S5130S-HI[EI]&S5110V2&S3100V3-EI Switch Series Configuration Guides-R612x-6W10300-About the Configuration Guides
Download Book
Title Size Downloads
00-About the Configuration Guides-book.zip 11.52 MB
Table of Contents
Related Documents

About the H3C S5130S-HI[EI] & S5110V2 & S3100V3-EI configuration guides

The configuration guides describe the software features for the H3C S5130S-HI, S5130S-EI, S5110V2, and S3100V3-EI switch series, and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.


Configuration guide


Fundamentals Configuration Guide

Covers information about using the command line interface, logging in to and setting up the device, and using the basic management features.

This guide includes:

·         CLI (command line interface overview and how to use the CLI).

·         RBAC.

·         Logging in to the device (login methods such as Telnet, and user interface configuration and access control).

·         FTP and TFTP.

·         File system management.

·         Configuration file management.

·         Software upgrade.

·         Device management.

·         Tcl.

·         Python.

·         Automatic configuration.

Virtual Technologies Configuration Guide

Covers Intelligent Resilient Framework (IRF) technology, which provides data center class availability and scalability.

IRF creates a large virtual device from multiple devices. The IRF member devices work in 1:N redundancy and appear as one unit in the network. IRF improves management efficiency and streamlines network topology. It is suitable for highly reliable enterprise networks and data centers.

Layer 2—LAN Switching Configuration Guide

Covers Layer 2 technologies and features used on a LAN switched network, such as VLAN technology, port isolation, and spanning tree. You can use these features to divide broadcast domains, remove Layer 2 loops, isolate users within a VLAN, re-mark VLAN tags, or implement VLAN VPNs over the Internet.

This guide includes:

·         Ethernet interface.

·         Loopback, null, and inloopback interfaces.

·         Bulk interface configuration.

·         MAC address table and MAC Information.

·         Ethernet link aggregation.

·         Port isolation.

·         Spanning tree.

·         Loop detection.

·         VLAN (including VLAN, private VLAN, and voice VLAN).

·         MVRP.

·         QinQ.

·         VLAN mapping.

·         LLDP.

·         L2PT.

Layer 3—IP Services Configuration Guide

Covers IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, and ARP.

This guide includes:

·         ARP (including gratuitous ARP, proxy ARP, ARP snooping, and ARP direct route advertisement).

·         IP addressing.

·         DHCP (including DHCP overview, DHCP server, DHCP relay agent, DHCP client, DHCP snooping, and BOOTP client).

·         DNS.

·         Basic IP forwarding.

·         Fast forwarding.

·         IP performance optimization.

·         UDP helper.

·         IPv6 basics.

·         DHCPv6 (including DHCPv6 overview, DHCPv6 server, DHCPv6 relay agent, DHCPv6 client, and DHCPv6 snooping).

·         IPv6 fast forwarding.

·         HTTP redirect.

Layer 3—IP Routing Configuration Guide

Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route control, and policy-based routing.

This guide includes:

·         Basic IP routing.

·         Static routing.

·         Default route.

·         RIP.

·         OSPF.

·         Policy-based routing.

·         IPv6 static routing.

·         RIPng.

·         OSPFv3.

·         IPv6 policy-based routing.

·         Routing policy.

IP Multicast Configuration Guide

Covers Layer 2 IPv4 multicast protocols (including IGMP snooping, PIM snooping, and multicast VLAN) and Layer 2 IPv6 multicast protocols (including MLD snooping, IPv6 PIM snooping, and IPv6 multicast VLAN).

This guide includes:

·         Multicast overview.

·         IGMP snooping.

·         PIM snooping.

·         Multicast VLAN.

·         MLD snooping.

·         IPv6 PIM snooping.

·         IPv6 multicast VLAN.

ACL and QoS Configuration Guide

Covers information about classifying traffic with ACLs, and allocating network resources and managing congestions with QoS technologies to improve network performance and network use efficiency. You can use ACLs to help feature modules (such as QoS and IP routing) classify or filter traffic.

This guide includes:

·         ACL.

·         QoS (including QoS overview, QoS policy, priority mapping, traffic policing, GTS and rate limit, congestion management, traffic filtering, priority marking, nesting, traffic redirecting, global CAR, class-based accounting, and appendixes).

·         Data buffer.

·         Time range.

Security Configuration Guide

Covers security features. The major security features available on the switch include: identity authentication (AAA and PKI), access security (802.1X, MAC authentication, and port security), secure management (SSH), SSL, and attack protection (IP source guard and ARP attack protection).

This guide includes:

·         AAA.

·         802.1X.

·         MAC authentication.

·         Portal authentication.

·         Web authentication.

·         Triple authentication.

·         Port security.

·         User profile.

·         Password control.

·         Public key management.

·         PKI.

·         IPsec (including IPsec, IKE, and IKEv2).

·         SSH.

·         SSL.

·         Attack detection and prevention.

·         TCP attack prevention.

·         IP source guard.

·         ARP attack protection.

·         ND attack defense.

·         SAVI.

·         MFF.

·         Crypto engine.

·         FIPS.

·         802.1X client.

High Availability Configuration Guide

Covers high availability technologies and features available on the switch for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery.

This guide includes:

·         Ethernet OAM.

·         CFD.

·         DLDP.

·         RRPP.

·         ERPS.

·         Smart Link.

·         Monitor Link.

·         VRRP.

·         BFD.

·         Track.

Network Management and Monitoring Configuration Guide

Covers features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity.

This guide includes:

·         System maintenance and debugging (ping, tracert, and system debugging).

·         NQA.

·         NTP and SNTP.

·         PoE.

·         SNMP.

·         RMON.

·         NETCONF.

·         CWMP.

·         EAA.

·         Process monitoring and maintenance.

·         Mirroring (including both port and traffic mirroring).

·         sFlow.

·         Information center.

·         Packet capture.

·         VCF fabric.

·         Cloud connection.

OpenFlow Configuration Guide

Describes the application scenarios, fundamentals, and configuration of OpenFlow.


Lists the significant acronyms in the configuration guides.