00-About the H3C Access Controllers Comware 7 Configuration Examples

HomeSupportResource CenterConfigure & DeployConfiguration ExamplesH3C Access Controllers Configuration Examples(V7)-6W10200-About the H3C Access Controllers Comware 7 Configuration Examples

About the H3C Access Controllers Comware 7 Configuration Examples

Support for the configuration examples varies by device model and version.

The H3C Access Controller (AC) Comware 7 Configuration Examples describe examples for configuring Comware 7-based ACs.

 

Book name

Content

System management

Describes device login methods. The book includes:

·     HTTPS Login Configuration Examples

·     SSH Configuration Examples

License management

Describes license installation methods. The book includes:

·     License Management Configuration Examples

Layer 2 registration

Describes AP registration on ACs at Layer 2. The book includes:

·     AP Association with the AC at Layer 2 Configuration Examples

·     AP Association with the AC at Layer 2 (IPv6) Configuration Examples

·     Auto AP Configuration Examples

Layer 3 registration

Describes AP registration on ACs at Layer 3. The book includes:

·     AP Association with the AC at Layer 3 Configuration Examples

·     AP Association with the AC at Layer 3 (IPv6) Configuration Examples

WLAN access

Describes WLAN access methods for wireless clients. The book includes:

·     WEP Encryption Configuration Examples

·     PSK Encryption Configuration Examples

·     WPA3-SAE PSK Encryption Configuration Examples

·     WLAN Access (IPv6) Configuration Examples

·     Policy-Based Forwarding with Dual Gateways Configuration Examples

·     Scheduled Configuration Deployment by AP Group Configuration Examples

·     Inter-AC Roaming with Static Client VLAN Allocation Configuration Examples

·     Service Template & Radio Binding Configuration Examples

·     Scheduled WLAN Access Services Configuration Examples

Wireless authentication

Describes configuration examples for portal authentication, MAC authentication, 802.1X authentication, and EAD authentication. The book includes:

·     Local Portal Authentication Configuration Examples

·     HTTPS-Based Local Portal Authentication Configuration Examples

·     Remote Portal Authentication Configuration Examples

·     Local Portal Authentication through LDAP Server Configuration Examples

·     Local Portal Authentication and SSID-based Authentication Page Pushing Configuration Examples

·     Local Portal MAC-Trigger Authentication Configuration Examples

·     Portal MAC-Trigger Authentication Configuration Examples

·     Local Forwarding Mode and Local Portal MAC-Trigger Authentication Configuration Examples

·     Local Portal Authentication (IPv6) Configuration Examples

·     Local Portal Authentication through LDAP Server (IPv6) Configuration Examples

·     Remote Portal Authentication (IPv6) Configuration Examples

·     Portal MAC-Trigger Authentication (IPv6) Configuration Example

·     Remote Portal Authentication with User Profile Authorization Configuration Examples

·     WiFiDog Portal Authentication Configuration Examples

·     Portal Fail-Permit Configuration Examples

·     Local MAC Authentication Configuration Examples

·     MAC Authentication and PSK Authentication Configuration Examples

·     Remote MAC and Portal Authentication and Transparent Authentication Configuration Examples

·     Remote AP and Remote Portal MAC-Trigger Authentication Configuration Examples

·     MAC Authentication with Guest VLAN Assignment Configuration Examples

·     MAC Authentication with Guest VLAN Assignment (IPv6) Configuration Examples

·     Local MAC-Then-802.1X Authentication Configuration Examples

·     Local 802.1X Authentication Configuration Examples

·     Local RADIUS-Based 802.1X Authentication in EAP Relay Mode Configuration Examples

·     Remote 802.1X Authentication Configuration Examples

·     Remote 802.1X Authentication (IPv6) Configuration Examples

·     Remote 802.1X Authentication in WPA3-Enterprise Mode Configuration Examples

·     802.1X Authentication with ACL Assignment Through IMC Server Configuration Examples

·     802.1X Authentication with User Profile Assignment Through IMC Server Configuration Examples

·     EAD Authentication Configuration Examples

·     EAD Authentication (IPv6) Configuration Examples

Local forwarding

Describes local forwarding configuration. The book includes:

·     Local Forwarding Mode and Local Portal Authentication Configuration Examples

·     Local Forwarding Mode Direct Portal Authentication Configuration Examples

·     Local Forwarding Mode Direct Portal Authentication (IPv6) Configuration Examples

·     Local Forwarding Configuration Examples

·     Wired Port Local Forwarding through Wireless Terminator Configuration Examples

·     Policy-Based Local Forwarding Configuration Examples

·     Remote AP Configuration Examples

WLAN security

Describes WLAN security configuration. The book includes:

·     WIPS Configuration Examples

·     WIPS Countermeasures Against All SSIDs Configuration Examples

·     IP Source Guard (IPv4) Configuration Examples

·     IP Source Guard (IPv6) Configuration Examples

Application security

Describes DPI feature and online behavior management configuration. The book includes:

·     IPS Configuration Examples

·     URL Filtering Configuration Examples

·     Anti-Virus Configuration Examples

·     Data Filtering Configuration Examples

·     File Filtering Configuration Examples

·     Application Audit and Management Configuration Examples

·     Application Rate Limiting Configuration Examples

High availability

Describes WLAN high availability configuration. The book includes:

·     IRF Setup with Members Directly Connected Configuration Examples

·     IRF Setup with Members Not Directly Connected Configuration Examples

·     IRF Setup with Members in One Chassis Configuration Examples

·     IRF Setup with Members in Different Chassis Configuration Examples

·     Dual-Link Backup Configuration Examples

·     Remote 802.1X Authentication on an AC Hierarchy Network with Dual-Link Central AC Backup Configuration Examples

·     Remote Portal Authentication on an AC Hierarchy Network with Dual-Link Central AC Backup Configuration Examples

·     OAuth-Based Portal MAC-Trigger Auth on a Local-Forwarding Dual-Link Backup Network Configuration Examples

·     Dual-Link Backup OAuth-Based Portal Authentication in Local Forwarding Configuration Examples

·     Dual-Link Backup Remote Portal MAC-Trigger Authentication in Local Forwarding Configuration Examples

·     Dual-Link Backup Remote Portal and Transparent MAC Authentication in Local Forwarding Configuration Examples

·     Dual-Link Backup Remote Portal Authentication in Local Forwarding Configuration Examples

·     Dual-Link Backup Remote Portal and Transparent MAC Auth in Centralized Forwarding Configuration Examples

·     Dual-Link Backup Remote Portal Authentication in Centralized Forwarding Configuration Examples

·     Dual-Link Backup Lightweight Portal Authentication in Centralized Forwarding Configuration Examples

·     Dual-Link Backup OAuth-Based Portal Authentication in Centralized Forwarding Configuration Examples

·     Dual-Link Backup Remote Portal MAC-Trigger Authentication in Centralized Forwarding Configuration Examples

·     Remote 802.1X Authentication on a Dual-Link AC Backup Network Configuration Examples

·     Remote MAC Authentication on a Dual-Link AC Backup Network Configuration Examples

AC hierarchy

Describes AC hierarchy configuration. The book includes:

·     AC Hierarchy Configuration Examples

·     Remote 802.1X Authentication (Local AC Authentication + AC Forwardering) Configuration Examples

·     Remote 802.1X Authentication (Central AC Authentication + AP Forwarding) Configuration Examples

·     AC Hierarchy (IPv6) Configuration Examples

WLAN advanced features

Describes WLAN optimization configuration. The book includes:

·     WLAN Probe Configuration Examples

·     Multicast Optimization Configuration Examples

·     Client Rate Limiting Configuration Examples

·     Inter-AC Roaming Configuration Examples

·     Inter-AC Roaming (IPv6) Configuration Examples

·     WLAN Load Balancing Configuration Examples

·     Static Blacklist Configuration Examples

·     Client Quantity Control Configuration Examples

·     AP License Synchronization Configuration Examples

·     EVI Tunneling Configuration Examples

·     BLE Module iBeacon Transmission Configuration Examples

·     Medical RFID Tag Management Configuration Examples

·     iBeacon Management Configuration Examples

·     Mesh Link Establishment Between a Fit AP and a Fat AP Configuration Examples

·     Mesh Link Establishment Between Fit APs Configuration Examples

·     Auto-DFS and Auto-TPC Configuration Examples

Basic network configuration

Describes network connectivity configuration. The book includes:

·     Internal-to-External Access Through NAT Configuration Examples

·     Layer 2 Static Aggregation Configuration Examples

·     Layer 2 Multicast Configuration Examples

·     Static VLAN Allocation Configuration Examples

·     URL Redirection Configuration Examples

·     IPv6 URL Redirection Configuration Examples

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网