00-About the Configuration Guides

HomeSupportSecurityH3C SecPath F5000 FirewallConfigure & DeployConfiguration GuidesH3C SecPath F50X0-D[F5000-AK] Firewalls Series Configuration Guides (V7) (R9620)-6W40100-About the Configuration Guides
Table of Contents
Related Documents

About the H3C SecPath F50X0-D[F5000-AK] configuration guides

The H3C SecPath F50X0-D[F5000-AK] configuration guides describe the software features for the H3C SecPath F50X0-D and F5000-AK firewall series, and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.

Applicable hardware and software versions

The following matrix shows the hardware and software versions to which the configuration guides are applicable:

 

Hardware

Device type

Software version

F5030-D, F5060-D, F5080-D

Distributed devices in IRF mode.

F9620P15

F5000-AK515, F5000-AK525

Distributed devices in IRF mode.

F9620P15

 

Contents

Table 1 lists features included in each configuration guide. Support for the features depends on the device model.

Table 1 Configuration guide content

Configuration guide

Content

Fundamentals Configuration Guide

Covers information about using the command line interface, logging in to and setting up the device, and using the basic management features. This guide includes:

·     CLI (command line interface overview and how to use the CLI)

·     RBAC

·     Logging in to the device (login methods such as telnet, and user interface configuration and access control)

·     FTP and TFTP

·     File system management

·     Configuration file management

·     Software upgrade

·     ISSU

·     Device management

·     Tcl

·     Python

·     License management

Virtual Technologies Configuration Guide

Covers the configuration of virtual technologies. This guide includes:

·     IRF

·     Context

Security Configuration Guide

Covers identity authentication, access security, secure management, SSL, and attack protection features. This guide includes:

·     Security zone

·     Security policy

·     ASPF

·     Session management

·     Object group

·     Object policy

·     IP source guard

·     AAA

·     User identification

·     Password control

·     Portal

·     MAC authentication

·     IPoE

·     Public key configuration

·     PKI

·     SSH

·     SSL

·     Connection limit

·     Attack detection and prevention

·     Server connection detection

·     ARP attack protection

·     ND attack defense

·     uRPF

·     IP-MAC binding

·     IP reputation

·     APR

·     Keychain

·     Crypto engine

DPI Configuration Guide

Covers fundamentals and configuration of deep packet inspection. This guide includes:

·     DPI overview

·     DPI engine

·     IPS

·     URL filtering

·     Data filtering

·     File filtering

·     Anti-virus

·     Data analysis center

·     Proxy policy

·     WAF

NAT Configuration Guide

Covers fundamentals and configuration of NAT. This guide includes:

·     NAT

·     AFT

·     NAT66

VPN Configuration Guide

Covers VPN-related features. This guide includes:

·     SSL VPN

·     IPsec, IKE, and IKEv2

·     Tunneling

·     GRE

·     L2TP

·     ADVPN

Internet Access Behavior Management Configuration Guide

Covers Internet access behavior management features. This guide includes:

·     Bandwidth management

·     NetShare control

·     Application audit and management

Load Balancing Configuration Guide

Covers load balancing fundamentals, configuration procedures, and configuration examples.

High Availability Configuration Guide

Covers high availability technologies and features available for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery. This guide includes:

·     Hot backup

·     RBM

·     VRRP

·     BFD

·     Track

·     Reth interface and redundancy group

·     Failover group

·     Interface collaboration

·     Interface backup

·     Monitor Link

·     Smart Link

·     Process placement

Interface Configuration Guide

Covers the configuration of various interfaces. This guide includes:

·     Bulk interface

·     Ethernet interface

·     Loopback, null, and inloopback interface

Layer 2—LAN Switching Configuration Guide

Covers Layer 2 technologies and features used on a LAN switched network. This guide includes:

·     MAC address table

·     Ethernet link aggregation

·     VLAN

·     VLAN termination

·     Spanning tree

·     LLDP

·     Layer 2 forwarding

·     Loop detection

Layer 3—IP Services Configuration Guide

Covers IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, ARP, and interoperation between IPv4 and IPv6. This guide includes:

·     IP addressing

·     IP forwarding basics

·     Fast forwarding

·     ARP (including proxy ARP)

·     IPv6 basics

·     IPv6 fast forwarding

·     DHCP

·     DHCPv6

·     DNS

·     IP performance optimization

·     Multi-CPU packet distribution

·     Adjacency table

Layer 3—IP Routing Configuration Guide

Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route control, and policy based routing. This guide includes:

·     Basic IP routing

·     Static routing

·     IPv6 static routing

·     RIP

·     RIPng

·     OSPF

·     OSPFv3

·     IS-IS

·     BGP

·     Policy-based routing

·     IPv6 policy-based routing

·     Routing policy

·     Guard route

ACL and QoS Configuration Guide

Covers information about classifying traffic with ACLs, and controlling traffic and allocating network resources with QoS technologies to improve network performance and network use efficiency. This guide includes:

·     ACL

·     QoS (including QoS overview, QoS policy, traffic policing, traffic filtering, and priority marking)

·     Time range

IP Multicast Configuration Guide

Covers the IP multicast features. This guide includes:

·     Multicast overview

·     Multicast routing and forwarding

·     PIM

·     IGMP

PPP and PPPoE Configuration Guide

Covers fundamentals and configuration of PPP and PPPoE.

·     Network Management and Monitoring Configuration Guide

Covers features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity. This guide includes:

·     Information center

·     Flow log

·     Fast log output

·     Packet capture

·     NetStream

·     Mirroring

·     System maintenance and debugging (ping, tracert, and system debugging)

·     NQA

·     NTP

·     EAA

·     Process monitoring and maintenance

·     NETCONF

·     SNMP (including the MIB style configuration)

·     RMON

·     Event MIB

·     CWMP

Service Chain Configuration Guide

Covers the service chain fundamentals, configuration procedures, and configuration examples.

VXLAN Configuration Guide

Covers VXLAN fundamentals, configuration procedures, and configuration examples.

VPN Instance Configuration Guide

Covers VPN instance fundamentals, configuration procedures, and configuration examples.

Acronyms

Lists the significant acronyms in the configuration guides.

 

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网