00-About the S6800 Configuration Guides

HomeSupportResource CenterSwitchesH3C S6800 Switch SeriesH3C S6800 Switch SeriesTechnical DocumentsConfigureConfiguration GuidesH3C S6800 Switch Series Configuration Guides-Release 243x-6W10100-About the S6800 Configuration Guides
Download Book
Title Size Downloads
00-About the S6800 Configuration Guides.pdf 30.47 KB
Table of Contents
Related Documents

About the H3C S6800 configuration guides

The H3C S6800 configuration guides describe the software features for the H3C S6800 Switch Series, and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.

 

Configuration guide

Content

Fundamentals Configuration Guide

Describes how to use the command line interface of the switch, log in to and set up the switch, and use the basic management functions. This guide includes:

·     CLI

·     Login management (login methods such as Telnet, and user interface configuration and access control)

·     RBAC

·     FTP and TFTP

·     File system management

·     Configuration file management

·     Software upgrade

·     ISSU

·     Device management

·     Tcl

·     Python

·     License management

·     Preprovisioning

·     Automatic configuration

IRF Configuration Guide

Describes the H3C proprietary Intelligent Resilient Framework (IRF) technology, which provides data center class availability and scalability. IRF creates a fabric from multiple switches. The switches that form the IRF fabric work in 1:N redundancy and appear as one unit in the network. IRF improves management efficiency and streamlines network topologies. It is suitable for highly reliable enterprise networks and data centers.

Layer 2—LAN Switching Configuration Guide

Covers Layer 2 technologies and features used on a LAN switched network, such as VLAN technology, port isolation, and spanning tree. You can use these features to divide broadcast domains, remove Layer 2 loops, isolate users within a VLAN and so on. This guide includes:

·     Ethernet interface

·     Loopback, null, and inloopback interfaces

·     Bulk interface configuration

·     MAC address table and MAC Information

·     Ethernet link aggregation

·     Port isolation

·     Spanning tree

·     L2PT

·     Loop detection

·     VLAN (including VLAN, super VLAN, and private VLAN)

·     MVRP

·     QinQ

·     VLAN mapping

·     PBB

·     LLDP

·     Service loopback group

·     Cut-through forwarding

Layer 3—IP Services Configuration Guide

Describes how to configure ARP, IP addressing, IP performance optimization, IP forwarding basics, IPv6 basics, DHCP, DNS, UDP helper, DHCPv6, tunneling, and GRE. This guide includes:

·     ARP (ARP, gratuitous ARP, proxy ARP, ARP snooping, and ARP fast  reply)

·     IP addressing

·     DHCP (DHCP overview, DHCP server, DHCP relay agent, DHCP client, DHCP snooping, and BOOTP client)

·     DNS and DDNS

·     Basic IP forwarding and load sharing

·     Fast forwarding

·     IRDP

·     IP performance optimization

·     UDP helper

·     Basic IPv6 settings

·     DHCPv6 (DHCPv6 overview, DHCPv6 server, DHCPv6 relay agent, DHCPv6 client and DHCPv6 snooping)

·     IPv6 fast forwarding

·     Tunneling

·     GRE

Layer 3—IP Routing Configuration Guide

Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering. This guide includes:

·     Basic IP routing

·     Static routing

·     RIP

·     OSPF

·     IS-IS

·     BGP

·     Policy-based routing

·     IPv6 static routing

·     RIPng

·     OSPFv3

·     IPv6 IS-IS

·     IPv6 policy-based routing

·     Routing policy

IP Multicast Configuration Guide

Covers Layer 3 IPv4 multicast protocols (IGMP, PIM, MSDP, and multicast VPN), Layer 3 IPv6 multicast protocols (MLD and IPv6 PIM), Layer 2 IPv4 multicast protocols (IGMP snooping, PIM snooping, and multicast VLAN), and Layer 2 IPv6 multicast protocols (MLD snooping, IPv6 PIM snooping, and IPv6 multicast VLAN). This guide includes:

·     Multicast overview

·     IGMP snooping

·     PIM snooping

·     Multicast VLAN

·     Multicast routing and forwarding

·     IGMP

·     PIM

·     MSDP

·     Multicast VPN

·     MLD snooping

·     IPv6 PIM snooping

·     IPv6 multicast VLAN

·     IPv6 multicast routing and forwarding

·     MLD

·     IPv6 PIM

MPLS Configuration Guide

Describes fundamentals and configurations of MPLS and extended MPLS functions. This configuration guide includes:

·     Basic MPLS

·     Static LSP

·     LDP

·     MPLS TE

·     Static CRLSP

·     RSVP

·     Tunnel policy

·     MPLS L3VPN and IPv6 MPLS L3VPN

·     MPLS L2VPN

·     VPLS

·     MPLS OAM

·     MCE and IPv6 MCE

ACL and QoS Configuration Guide

Describes how to classify traffic with ACLs, and allocate network resources and manage congestions with QoS technologies to improve network performance and network use efficiency. You can use ACLs to help other function modules (such as QoS and IP routing) classify or filter traffic. This configuration guide includes:

·     ACL

·     QoS, including the following features:

?     QoS overview

?     QoS policy

?     Priority mapping

?     Traffic policing, GTS, and rate limit

?     Congestion management

?     Congestion avoidance

?     Traffic filtering

?     Priority marking

?     Nesting

?     Ttraffic redirecting

?     Aggregate CAR

?     Class-based accounting

·     Time range

·     Data buffer

·     QCN

·     Appendixes

Security Configuration Guide

Covers security features. The major security features available on the switch include: identity authentication, secure management, and attack protection. This guide includes:

·     AAA

·     802.1X

·     MAC authentication

·     Portal authentication

·     Port security

·     Password control

·     Public key management

·     PKI

·     IPsec and IKE

·     SSH

·     SSL

·     IP source guard

·     ARP attack protection

·     MFF

·     uRPF

·     Crypto engine

·     FIPS

·     User profile

·     Attack detection and prevention

·     ND attack defense

·     Keychain

·     MACSec

High Availability Configuration Guide

Describes high availability technologies and features available on the switch for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery. This guide includes:

·     Ethernet OAM

·     CFD

·     DLDP

·     RRPP

·     Smart Link

·     Monitor Link

·     VRRP

·     BFD

·     Track

·     Process placement

Network Management and Monitoring Configuration Guide

Describes features that help you manage and monitor your network, for example, manage system events, and test network connectivity. This guide includes:

·     System maintenance and debugging (ping, tracert, and system debugging)

·     NTP and SNTP

·     Information center

·     SNMP

·     RMON

·     NQA

·     Mirroring (including port mirroring and traffic mirroring)

·     sFlow

·     Process monitoring and maintenance

·     EAA

·     CWMP

·     NETCONF

·     Packet capture

FC and FCoE Configuration Guide

Describes the application scenarios, fundamentals, and configuration of FC and FCoE.

TRILL Configuration Guide

Describes the application scenarios, fundamentals, and configuration of TRILL.

EVB Configuration Guide

Describes the application scenarios, fundamentals, and configuration of EVB.

SPB Configuration Guide

Describes the application scenarios, fundamentals, and configuration of SPB.

OpenFlow Configuration Guide

Describes the application scenarios, fundamentals, and configuration of OpenFlow.

VXLAN Configuration Guide

Describes the application scenarios, fundamentals, and configuration of VXLAN.

Service Chain Configuration Guide

Describes the application scenarios, fundamentals, and configuration of Service Chain.

Acronyms

Lists the significant acronyms in the configuration guides.