00-About the Configuration Guides

HomeSupportConfigure & DeployConfiguration GuidesH3C SecPath Firewall Series Configuration Guides(V7)-6W40000-About the Configuration Guides
Table of Contents
Related Documents

About the H3C SecPath firewall series configuration guides

The H3C SecPath firewall series configuration guides describe the software features for the H3C SecPath firewall series, and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.

Applicable hardware and software versions

The following matrix shows the hardware and software versions to which the configuration guides are applicable:

 

Series

Device model

Software version

F1000-X-G3 series

F1000-A-G3, F1000-C-G3, F1000-E-G3, F1000-S-G3

E8601

F100-X-G3 series

F100-A-G3, F100-E-G3

E9345

F100-C-G3, F100-M-G3, F100-S-G3

E9536

F1000-X-VG series

F1000-E-VG

E9345

F1000-S-VG

E9536

F1000-X-G2 series

F1000-A-G2, F1000-C-G2, F1000-E-G2, F1000-S-G2

E9345

F100-X-G2 series

F100-A-G2, F100-E-G2

E9345

F100-C-G2, F100-M-G2, F100-S-G2

E9536

F1000-C-EI[F100-A-SI][F100-X-EI] series

F1000-C-EI, F100-A-EI, F100-A-SI, F100-C-EI

E9345

F100-E-EI

E9536

F100-WiNet series

F100-A80-WiNet

E9345

F100-C80-WiNet, F100-C60-WiNet, F100-C50-WiNet, F100-S80-WiNet

E9536

F1000-C81X0 series

F1000-C8180, F1000-C8170, F1000-C8160

E9345

F1000-C8150, F1000-C8130, F1000-C8120, F1000-C8110

E9536

F100-C-A series

F100-C-A3, F100-C-A5, F100-C-A6

E9536

F100-C-A-W series

F100-C-A6-WL, F100-C-A5-W, F100-C-A3-W

E9602

F1000-C-HI[F100-X-HI] series

F1000-C-HI, F100-A-HI

E9345

F100-C-HI, F100-S-HI

E9536

F1000-9X0-AI series

F1000-990-AI, F1000-980-AI, F1000-970-AI, F1000-960-AI, F1000-950-AI, F1000-930-AI, F1000-920-AI

E9345

SecBlade IV NGFW modules

LSPM6FWD8

E8535

LSQM2FWDSC8

E8520

 

Contents

Table 1 lists features included in each configuration guide. Support for the features depends on the device model.

Table 1 Configuration guide content

Configuration guide

Content

Fundamentals Configuration Guide

Covers information about using the command line interface, logging in to and setting up the device, and using the basic management features. This guide includes:

·     CLI (command line interface overview and how to use the CLI)

·     RBAC

·     Logging in to the device (login methods such as telnet, and user interface configuration and access control)

·     FTP and TFTP

·     File system management

·     Configuration file management

·     Software upgrade

·     ISSU

·     Automatic configuration

·     Device management

·     Tcl

·     Python

·     License management

·     MAC address learning through a Layer 3 device

Virtual Technologies Configuration Guide

Covers the configuration of virtual technologies. This guide includes:

·     IRF

·     Context

Security Configuration Guide

Covers identity authentication, access security, secure management, SSL, and attack protection features. This guide includes:

·     Security zone

·     Security policy

·     Object group

·     Object policy

·     AAA

·     Portal

·     User identification

·     Password control

·     Public key configuration

·     PKI

·     SSH

·     SSL

·     ASPF

·     APR

·     Session management

·     Connection limit

·     Attack detection and prevention

·     IP source guard

·     ARP attack protection

·     ND attack defense

·     uRPF

·     Crypto engine

·     IP-MAC binding

·     IPoE

·     IP reputation

·     Keychain

·     MAC authentication

·     Server connection detection

DPI Configuration Guide

Covers fundamentals and configuration of deep packet inspection. This guide includes:

·     DPI overview

·     DPI engine

·     IPS

·     URL filtering

·     Data filtering

·     File filtering

·     Anti-virus

·     Data analysis center

·     Proxy policy

·     WAF

NAT Configuration Guide

Covers fundamentals and configuration of NAT and AFT. This guide includes:

·     NAT

·     AFT

·     NAT66

VPN Configuration Guide

Covers VPN-related features. This guide includes:

·     IPsec, IKE, and IKEv2

·     SSL VPN

·     ADVPN

·     Tunneling

·     GRE

·     L2TP

Internet Access Behavior Management Configuration Guide

Covers Internet access behavior management features. This guide includes:

·     Bandwidth management

·     Application audit and management

·     NetShare control

Load Balancing Configuration Guide

Covers fundamentals, configuration procedures, and configuration examples of load balancing features.

Interface Configuration Guide

Covers the configuration of various interfaces. This guide includes:

·     Bulk interface

·     Ethernet interface

·     Loopback, null, and inloopback interfaces

Layer 2—LAN Switching Configuration Guide

Covers Layer 2 technologies and features used on a LAN switched network. This guide includes:

·     MAC address table

·     Ethernet link aggregation

·     VLAN

·     VLAN termination

·     Spanning tree

·     LLDP

·     Layer 2 forwarding

Layer 2—WAN Access Configuration Guide

Covers the Layer 2 WAN access features. This guide includes:

·     PPP

·     3G and 4G modem management

Layer 3—IP Services Configuration Guide

Covers IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, ARP, and interoperation between IPv4 and IPv6. This guide includes:

·     ARP (including proxy ARP)

·     IP addressing

·     DHCP

·     DNS

·     IP forwarding basics and load sharing

·     Fast forwarding

·     Multi-CPU packet distribution

·     Adjacency table

·     IP performance optimization

·     IPv6 basics

·     DHCPv6

·     IPv6 fast forwarding

Layer 3—IP Routing Configuration Guide

Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route control, and policy based routing. This guide includes:

·     Basic IP routing

·     Static routing

·     RIP

·     OSPF

·     IS-IS

·     BGP

·     Policy-based routing

·     IPv6 static routing

·     IPv6 policy-based routing

·     RIPng

·     OSPFv3

·     Routing policy

ACL and QoS Configuration Guide

Covers information about classifying traffic with ACLs, and controlling traffic and allocating network resources with QoS technologies to improve network performance and network use efficiency. This guide includes:

·     ACL

·     QoS (including QoS overview, QoS policy, traffic policing, traffic filtering, and priority marking)

·     Time range

IP Multicast Configuration Guide

Covers the IP multicast features. This guide includes:

·     Multicast overview

·     Multicast routing and forwarding

·     PIM

·     IGMP

High Availability Configuration Guide

Covers high availability technologies and features available for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery. This guide includes:

·     VRRP

·     Reth interface and redundancy group

·     BFD

·     Track

·     Process placement

·     Interface collaboration

·     Monitor Link

·     Interface backup

·     RBM

·     Smart Link

·     Hot backup

Network Management and Monitoring Configuration Guide

Covers features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity. This guide includes:

·     System maintenance and debugging (ping, tracert, and system debugging)

·     NQA

·     NTP

·     EAA

·     Process monitoring and maintenance

·     NETCONF

·     CWMP

·     Information center.

·     SNMP (including the MIB style configuration)

·     NetStream

·     RMON

·     Flow log

·     Event MIB

·     Packet capture

·     Fast log output

·     Mirroring

VPN Instance Configuration Guide

Covers VPN instance fundamentals and configuration procedures.

Acronyms

Lists the significant acronyms in the configuration guides.

 

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网