- Table of Contents
- Related Documents
-
About the H3C SecPath F50X0-D[F5000-AK] configuration guides
The H3C SecPath F50X0-D[F5000-AK] configuration guides describe the software features for the H3C SecPath F50X0-D and F5000-AK firewall series, and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.
Applicable hardware and software versions
The following matrix shows the hardware and software versions to which the configuration guides are applicable:
Hardware | Device type | Software version |
F5030-D, F5060-D, F5080-D | Distributed devices in IRF mode. | F9620P15 |
F5000-AK515, F5000-AK525 | Distributed devices in IRF mode. | F9620P15 |
Contents
Table 1 lists features included in each configuration guide. Support for the features depends on the device model.
Table 1 Configuration guide content
Configuration guide | Content |
Fundamentals Configuration Guide | Covers information about using the command line interface, logging in to and setting up the device, and using the basic management features. This guide includes: · CLI (command line interface overview and how to use the CLI) · RBAC · Logging in to the device (login methods such as telnet, and user interface configuration and access control) · FTP and TFTP · File system management · Configuration file management · Software upgrade · ISSU · Device management · Tcl · Python · License management |
Virtual Technologies Configuration Guide | Covers the configuration of virtual technologies. This guide includes: · IRF · Context |
Security Configuration Guide | Covers identity authentication, access security, secure management, SSL, and attack protection features. This guide includes: · Security zone · Security policy · ASPF · Session management · Object group · Object policy · IP source guard · AAA · User identification · Password control · Portal · MAC authentication · IPoE · Public key configuration · PKI · SSH · SSL · Connection limit · Attack detection and prevention · Server connection detection · ARP attack protection · ND attack defense · uRPF · IP-MAC binding · IP reputation · APR · Keychain · Crypto engine |
DPI Configuration Guide | Covers fundamentals and configuration of deep packet inspection. This guide includes: · DPI overview · DPI engine · IPS · URL filtering · Data filtering · File filtering · Anti-virus · Data analysis center · Proxy policy · WAF |
NAT Configuration Guide | Covers fundamentals and configuration of NAT. This guide includes: · NAT · AFT · NAT66 |
VPN Configuration Guide | Covers VPN-related features. This guide includes: · SSL VPN · IPsec, IKE, and IKEv2 · Tunneling · GRE · L2TP · ADVPN |
Internet Access Behavior Management Configuration Guide | Covers Internet access behavior management features. This guide includes: · Bandwidth management · NetShare control · Application audit and management |
Load Balancing Configuration Guide | Covers load balancing fundamentals, configuration procedures, and configuration examples. |
High Availability Configuration Guide | Covers high availability technologies and features available for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery. This guide includes: · Hot backup · RBM · VRRP · BFD · Track · Reth interface and redundancy group · Failover group · Interface collaboration · Interface backup · Monitor Link · Smart Link · Process placement |
Interface Configuration Guide | Covers the configuration of various interfaces. This guide includes: · Bulk interface · Ethernet interface · Loopback, null, and inloopback interface |
Layer 2—LAN Switching Configuration Guide | Covers Layer 2 technologies and features used on a LAN switched network. This guide includes: · MAC address table · Ethernet link aggregation · VLAN · VLAN termination · Spanning tree · LLDP · Layer 2 forwarding · Loop detection |
Layer 3—IP Services Configuration Guide | Covers IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, ARP, and interoperation between IPv4 and IPv6. This guide includes: · IP addressing · IP forwarding basics · Fast forwarding · ARP (including proxy ARP) · IPv6 basics · IPv6 fast forwarding · DHCP · DHCPv6 · DNS · IP performance optimization · Multi-CPU packet distribution · Adjacency table |
Layer 3—IP Routing Configuration Guide | Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route control, and policy based routing. This guide includes: · Basic IP routing · Static routing · IPv6 static routing · RIP · RIPng · OSPF · OSPFv3 · IS-IS · BGP · Policy-based routing · IPv6 policy-based routing · Routing policy · Guard route |
ACL and QoS Configuration Guide | Covers information about classifying traffic with ACLs, and controlling traffic and allocating network resources with QoS technologies to improve network performance and network use efficiency. This guide includes: · ACL · QoS (including QoS overview, QoS policy, traffic policing, traffic filtering, and priority marking) · Time range |
IP Multicast Configuration Guide | Covers the IP multicast features. This guide includes: · Multicast overview · Multicast routing and forwarding · PIM · IGMP |
PPP and PPPoE Configuration Guide | Covers fundamentals and configuration of PPP and PPPoE. |
· Network Management and Monitoring Configuration Guide | Covers features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity. This guide includes: · Information center · Flow log · Fast log output · Packet capture · NetStream · Mirroring · System maintenance and debugging (ping, tracert, and system debugging) · NQA · NTP · EAA · Process monitoring and maintenance · NETCONF · SNMP (including the MIB style configuration) · RMON · Event MIB · CWMP |
Service Chain Configuration Guide | Covers the service chain fundamentals, configuration procedures, and configuration examples. |
VXLAN Configuration Guide | Covers VXLAN fundamentals, configuration procedures, and configuration examples. |
VPN Instance Configuration Guide | Covers VPN instance fundamentals, configuration procedures, and configuration examples. |
Acronyms | Lists the significant acronyms in the configuration guides. |