- Released At: 19-11-2019
- Page Views:
- Downloads:
- Table of Contents
- Related Documents
-
About the H3C S6300 configuration guides
Configuration guide |
Content |
Fundamentals Configuration Guide |
Covers information about using the command line interface, logging in to and setting up the device, and using the basic management features. This guide includes: · CLI (command line interface overview and how to use the CLI). · Logging in to the switch (log-in methods such as Telnet, and user interface configuration and access control). · RBAC. · FTP and TFTP. · File system management. · Configuration file management. · Software upgrade. · ISSU. · Emergency shell. · Device management. · Tcl. · Python. · Licenses management. · Preprovisioning. |
IRF Configuration Guide |
Covers the features of the Intelligent Resilient Framework (IRF) technology that is proprietary to H3C. The IRF features include IRF and IRF 3. · IRF virtualizes multiple physical devices at the same layer into one virtual fabric to provide data center class availability and scalability. The switches that form the IRF fabric work in 1:N redundancy and appear as one unit in the network. · IRF 3 integrates multiple lower-layer devices (PEXs) with a higher-layer IRF fabric (parent fabric) to provide high-density, low-cost connectivity at the access layer. You can manage and configure the PEXs from the parent fabric as if they were interface modules on the parent fabric. The IRF technology features improve management efficiency and streamline network topologies. They are suitable for highly reliable enterprise networks and data centers. |
Layer 2—LAN Switching Configuration Guide |
Covers Layer 2 technologies and features used on a LAN switched network, such as VLAN technology, port isolation, and spanning tree. You can use these features to divide broadcast domains, remove Layer 2 loops, isolate users within a VLAN, re-mark VLAN tags, or implement VLAN VPNs over the Internet. This guide includes: · Ethernet interface. · Loopback, null, and inloopback interfaces. · Bulk interface configuration. · MAC address table and MAC Information. · Ethernet link aggregation. · Port isolation. · Spanning tree. · Loop detection. · VLAN (including VLAN, voice VLAN, and private VLAN). · MVRP. · QinQ. · VLAN mapping. · LLDP. · Cut-through forwarding. |
Layer 3—IP Services Configuration Guide |
Covers IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, and ARP. · ARP (including gratuitous ARP, proxy ARP, ARP snooping, and ARP fast reply). · IP addressing. · DHCP (including DHCP overview, DHCP server, DHCP relay agent, DHCP client, DHCP snooping, and BOOTP client). · Basic IP forwarding and load sharing. · Fast forwarding. · IRDP. · IP performance optimization. · DHCPv6 (including DHCPv6 overview, DHCPv6 server, DHCPv6 relay agent, DHCPv6 client, and DHCPv6 snooping). · IPv6 fast forwarding. |
Layer 3—IP Routing Configuration Guide |
Covers the routing technologies for IPv4 and IPv6 networks of different sizes and route filtering. This guide includes: · Basic IP routing. · Static routing. · RIP. · OSPF. · IS-IS. · BGP. · IPv6 static routing. · RIPng. · OSPFv3. · IPv6 IS-IS. |
IP Multicast Configuration Guide |
Covers Layer 2 IPv4 multicast protocols (including IGMP snooping, PIM snooping, and multicast VLAN), Layer 3 IPv4 multicast protocols (including IGMP, PIM, and MSDP), Layer 2 IPv6 multicast protocols (including MLD snooping, IPv6 PIM snooping, and IPv6 multicast VLAN), and Layer 3 IPv6 multicast protocols (including MLD and IPv6 PIM). This guide includes: · Multicast overview. · IGMP snooping. · PIM snooping. · Multicast VLAN. · Multicast routing and forwarding. · IGMP. · PIM. · MSDP. · MLD snooping. · IPv6 PIM snooping. · IPv6 multicast VLAN. · IPv6 multicast routing and forwarding. · MLD. · IPv6 PIM. |
MCE Configuration Guide |
Covers MCE fundamentals and configuration. |
ACL and QoS Configuration Guide |
Covers information about classifying traffic with ACLs, and allocating network resources and managing congestions with QoS technologies to improve network performance and network use efficiency. You can use ACLs to help feature modules (such as QoS and IP routing) classify or filter traffic. · ACL. · QoS (including QoS overview, QoS policy, priority mapping, traffic policing, GTS, and rate limit, congestion management, congestion avoidance, traffic filtering, priority marking, nesting, traffic redirecting, aggregate CAR, class-based accounting, and appendixes). · Time range. · Data buffer. · QCN. |
Security Configuration Guide |
Covers security features. The major security features available on the switch include: identity authentication, secure management, and attack protection. This guide includes: · AAA. · 802.1X. · MAC authentication. · Port security. · Password control. · Public key management. · PKI. · IPsec, IKE, and IKEv2. · SSH. · SSL. · IP source guard. · ARP attack protection. · FIPS. · User profile. · Attack detection and prevention. · ND attack defense. · Keychain. |
High Availability Configuration Guide |
Covers high availability technologies and features available on the switch for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery. This guide includes: · Ethernet OAM. · CFD. · DLDP. · RRPP. · Smart Link. · Monitor Link. · VRRP. · BFD. · Track. |
Network Management and Monitoring Configuration Guide |
Covers features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity. This guide includes: · System maintenance and debugging (ping, tracert, and system debugging). · RMON. · Mirroring (including port mirroring and traffic mirroring). · Process monitoring and maintenance. · CWMP. · Packet capture. |
FCoE Configuration Guide |
Covers the application scenarios, fundamentals, and configuration of FCoE. |
TRILL Configuration Guide |
Covers the application scenarios, fundamentals, and configuration of TRILL. |
EVB Configuration Guide |
Covers the application scenarios, fundamentals, and configuration of EVB. |
OpenFlow Configuration Guide |
Covers the application scenarios, fundamentals, and configuration of OpenFlow. |
Acronyms |
Lists the significant acronyms in the configuration guides. |