00-About the S6300 Configuration Guides

HomeSupportResource CenterSwitchesH3C S6300 Switch SeriesH3C S6300 Switch SeriesTechnical DocumentsConfigureConfiguration GuidesH3C S6300 Switch Series Configuration Guides-Release 243x-6W10000-About the S6300 Configuration Guides
Download Book
Title Size Downloads
00-About the S6300 Configuration Guides.rar 14.53 MB
Table of Contents
Related Documents

About the H3C S6300 configuration guides

The H3C S6300 configuration guides describe the software features for the H3C S6300 Switch Series, and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.

 

Configuration guide

Content

Fundamentals Configuration Guide

Covers information about using the command line interface, logging in to and setting up the device, and using the basic management features.

This guide includes:

·          CLI (command line interface overview and how to use the CLI).

·          Logging in to the switch (log-in methods such as Telnet, and user interface configuration and access control).

·          RBAC.

·          FTP and TFTP.

·          File system management.

·          Configuration file management.

·          Software upgrade.

·          ISSU.

·          Emergency shell.

·          Device management.

·          Tcl.

·          Python.

·          Licenses management.

·          Preprovisioning.

·          Automatic configuration.

IRF Configuration Guide

Covers the features of the Intelligent Resilient Framework (IRF) technology that is proprietary to H3C. The IRF features include IRF and IRF 3.

·          IRF virtualizes multiple physical devices at the same layer into one virtual fabric to provide data center class availability and scalability. The switches that form the IRF fabric work in 1:N redundancy and appear as one unit in the network.

·          IRF 3 integrates multiple lower-layer devices (PEXs) with a higher-layer IRF fabric (parent fabric) to provide high-density, low-cost connectivity at the access layer. You can manage and configure the PEXs from the parent fabric as if they were interface modules on the parent fabric.

The IRF technology features improve management efficiency and streamline network topologies. They are suitable for highly reliable enterprise networks and data centers.

Layer 2—LAN Switching Configuration Guide

Covers Layer 2 technologies and features used on a LAN switched network, such as VLAN technology, port isolation, and spanning tree. You can use these features to divide broadcast domains, remove Layer 2 loops, isolate users within a VLAN, re-mark VLAN tags, or implement VLAN VPNs over the Internet.

This guide includes:

·          Ethernet interface.

·          Loopback, null, and inloopback interfaces.

·          Bulk interface configuration.

·          MAC address table and MAC Information.

·          Ethernet link aggregation.

·          Port isolation.

·          Spanning tree.

·          Loop detection.

·          VLAN (including VLAN, voice VLAN, and private VLAN).

·          MVRP.

·          QinQ.

·          VLAN mapping.

·          LLDP.

·          Cut-through forwarding.

Layer 3—IP Services Configuration Guide

Covers IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, and ARP.

This guide includes:

·          ARP (including gratuitous ARP, proxy ARP, ARP snooping, and ARP fast reply).

·          IP addressing.

·          DHCP (including DHCP overview, DHCP server, DHCP relay agent, DHCP client, DHCP snooping, and BOOTP client).

·          DNS and DDNS.

·          Basic IP forwarding and load sharing.

·          Fast forwarding.

·          IRDP.

·          IP performance optimization.

·          UDP helper.

·          Basic IPv6 settings.

·          DHCPv6 (including DHCPv6 overview, DHCPv6 server, DHCPv6 relay agent, DHCPv6 client, and DHCPv6 snooping).

·          IPv6 fast forwarding.

Layer 3—IP Routing Configuration Guide

Covers the routing technologies for IPv4 and IPv6 networks of different sizes and route filtering.

This guide includes:

·          Basic IP routing.

·          Static routing.

·          RIP.

·          OSPF.

·          IS-IS.

·          BGP.

·          IPv6 static routing.

·          RIPng.

·          OSPFv3.

·          IPv6 IS-IS.

IP Multicast Configuration Guide

Covers Layer 2 IPv4 multicast protocols (including IGMP snooping, PIM snooping, and multicast VLAN), Layer 3 IPv4 multicast protocols (including IGMP, PIM, and MSDP), Layer 2 IPv6 multicast protocols (including MLD snooping, IPv6 PIM snooping, and IPv6 multicast VLAN), and Layer 3 IPv6 multicast protocols (including MLD and IPv6 PIM).

This guide includes:

·          Multicast overview.

·          IGMP snooping.

·          PIM snooping.

·          Multicast VLAN.

·          Multicast routing and forwarding.

·          IGMP.

·          PIM.

·          MSDP.

·          MLD snooping.

·          IPv6 PIM snooping.

·          IPv6 multicast VLAN.

·          IPv6 multicast routing and forwarding.

·          MLD.

·          IPv6 PIM.

MCE Configuration Guide

Covers MCE fundamentals and configuration.

ACL and QoS Configuration Guide

Covers information about classifying traffic with ACLs, and allocating network resources and managing congestions with QoS technologies to improve network performance and network use efficiency. You can use ACLs to help feature modules (such as QoS and IP routing) classify or filter traffic.

This guide includes:

·          ACL.

·          QoS (including QoS overview, QoS policy, priority mapping, traffic policing, GTS, and rate limit, congestion management, congestion avoidance, traffic filtering, priority marking, nesting, traffic redirecting, aggregate CAR, class-based accounting, and appendixes).

·          Time range.

·          Data buffer.

·          QCN.

Security Configuration Guide

Covers security features. The major security features available on the switch include: identity authentication, secure management, and attack protection.

This guide includes:

·          AAA.

·          802.1X.

·          MAC authentication.

·          Portal authentication.

·          Port security.

·          Password control.

·          Public key management.

·          PKI.

·          IPsec, IKE, and IKEv2.

·          SSH.

·          SSL.

·          IP source guard.

·          ARP attack protection.

·          MFF.

·          Crypto engine.

·          FIPS.

·          User profile.

·          Attack detection and prevention.

·          ND attack defense.

·          Keychain.

High Availability Configuration Guide

Covers high availability technologies and features available on the switch for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery.

This guide includes:

·          Ethernet OAM.

·          CFD.

·          DLDP.

·          RRPP.

·          Smart Link.

·          Monitor Link.

·          VRRP.

·          BFD.

·          Track.

·          Process placement.

Network Management and Monitoring Configuration Guide

Covers features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity.

This guide includes:

·          System maintenance and debugging (ping, tracert, and system debugging).

·          NTP and SNTP.

·          PTP.

·          Information center.

·          SNMP.

·          RMON.

·          NQA.

·          Mirroring (including port mirroring and traffic mirroring).

·          sFlow.

·          Process monitoring and maintenance.

·          EAA.

·          CWMP.

·          NETCONF.

·          Packet capture.

FCoE Configuration Guide

Covers the application scenarios, fundamentals, and configuration of FCoE.

TRILL Configuration Guide

Covers the application scenarios, fundamentals, and configuration of TRILL.

EVB Configuration Guide

Covers the application scenarios, fundamentals, and configuration of EVB.

OpenFlow Configuration Guide

Covers the application scenarios, fundamentals, and configuration of OpenFlow.

Acronyms

Lists the significant acronyms in the configuration guides.