H3C SecPath Firewall Series Configuration Guides(V7)-6W400-book_CHM.rar(29.35 MB)
H3C SecPath Firewall Series Configuration Guides(V7)-6W400-book.pdf(26.12 MB)
- Released At: 29-08-2023
- Page Views:
- Downloads:
- Table of Contents
- Related Documents
-
About the H3C SecPath firewall series configuration guides
The H3C SecPath firewall series configuration guides describe the software features for the H3C SecPath firewall series, and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios.
Applicable hardware and software versions
The following matrix shows the hardware and software versions to which the configuration guides are applicable:
Series | Device model | Software version |
F1000-X-G3 series | F1000-A-G3, F1000-C-G3, F1000-E-G3, F1000-S-G3 | E8601 |
F100-X-G3 series | F100-A-G3, F100-E-G3 | E9345 |
F100-C-G3, F100-M-G3, F100-S-G3 | E9536 | |
F1000-X-VG series | F1000-E-VG | E9345 |
F1000-S-VG | E9536 | |
F1000-X-G2 series | F1000-A-G2, F1000-C-G2, F1000-E-G2, F1000-S-G2 | E9345 |
F100-X-G2 series | F100-A-G2, F100-E-G2 | E9345 |
F100-C-G2, F100-M-G2, F100-S-G2 | E9536 | |
F1000-C-EI[F100-A-SI][F100-X-EI] series | F1000-C-EI, F100-A-EI, F100-A-SI, F100-C-EI | E9345 |
F100-E-EI | E9536 | |
F100-WiNet series | F100-A80-WiNet | E9345 |
F100-C80-WiNet, F100-C60-WiNet, F100-C50-WiNet, F100-S80-WiNet | E9536 | |
F1000-C81X0 series | F1000-C8180, F1000-C8170, F1000-C8160 | E9345 |
F1000-C8150, F1000-C8130, F1000-C8120, F1000-C8110 | E9536 | |
F100-C-A series | F100-C-A3, F100-C-A5, F100-C-A6 | E9536 |
F100-C-A-W series | F100-C-A6-WL, F100-C-A5-W, F100-C-A3-W | E9602 |
F1000-C-HI[F100-X-HI] series | F1000-C-HI, F100-A-HI | E9345 |
F100-C-HI, F100-S-HI | E9536 | |
F1000-9X0-AI series | F1000-990-AI, F1000-980-AI, F1000-970-AI, F1000-960-AI, F1000-950-AI, F1000-930-AI, F1000-920-AI | E9345 |
SecBlade IV NGFW modules | LSPM6FWD8 | E8535 |
LSQM2FWDSC8 | E8520 |
Contents
Table 1 lists features included in each configuration guide. Support for the features depends on the device model.
Table 1 Configuration guide content
Configuration guide | Content |
Fundamentals Configuration Guide | Covers information about using the command line interface, logging in to and setting up the device, and using the basic management features. This guide includes: · CLI (command line interface overview and how to use the CLI) · RBAC · Logging in to the device (login methods such as telnet, and user interface configuration and access control) · FTP and TFTP · File system management · Configuration file management · Software upgrade · ISSU · Automatic configuration · Device management · Tcl · Python · License management · MAC address learning through a Layer 3 device |
Virtual Technologies Configuration Guide | Covers the configuration of virtual technologies. This guide includes: · IRF · Context |
Security Configuration Guide | Covers identity authentication, access security, secure management, SSL, and attack protection features. This guide includes: · Security zone · Security policy · Object group · Object policy · AAA · Portal · User identification · Password control · Public key configuration · PKI · SSH · SSL · ASPF · APR · Session management · Connection limit · Attack detection and prevention · IP source guard · ARP attack protection · ND attack defense · uRPF · Crypto engine · IP-MAC binding · IPoE · IP reputation · Keychain · MAC authentication · Server connection detection |
DPI Configuration Guide | Covers fundamentals and configuration of deep packet inspection. This guide includes: · DPI overview · DPI engine · IPS · URL filtering · Data filtering · File filtering · Anti-virus · Data analysis center · Proxy policy · WAF |
NAT Configuration Guide | Covers fundamentals and configuration of NAT and AFT. This guide includes: · NAT · AFT · NAT66 |
VPN Configuration Guide | Covers VPN-related features. This guide includes: · IPsec, IKE, and IKEv2 · SSL VPN · ADVPN · Tunneling · GRE · L2TP |
Internet Access Behavior Management Configuration Guide | Covers Internet access behavior management features. This guide includes: · Bandwidth management · Application audit and management · NetShare control |
Load Balancing Configuration Guide | Covers fundamentals, configuration procedures, and configuration examples of load balancing features. |
Interface Configuration Guide | Covers the configuration of various interfaces. This guide includes: · Bulk interface · Ethernet interface · Loopback, null, and inloopback interfaces |
Layer 2—LAN Switching Configuration Guide | Covers Layer 2 technologies and features used on a LAN switched network. This guide includes: · MAC address table · Ethernet link aggregation · VLAN · VLAN termination · Spanning tree · LLDP · Layer 2 forwarding |
Layer 2—WAN Access Configuration Guide | Covers the Layer 2 WAN access features. This guide includes: · PPP · 3G and 4G modem management |
Layer 3—IP Services Configuration Guide | Covers IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, ARP, and interoperation between IPv4 and IPv6. This guide includes: · ARP (including proxy ARP) · IP addressing · DHCP · DNS · IP forwarding basics and load sharing · Fast forwarding · Multi-CPU packet distribution · Adjacency table · IP performance optimization · IPv6 basics · DHCPv6 · IPv6 fast forwarding |
Layer 3—IP Routing Configuration Guide | Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route control, and policy based routing. This guide includes: · Basic IP routing · Static routing · RIP · OSPF · IS-IS · BGP · Policy-based routing · IPv6 static routing · IPv6 policy-based routing · RIPng · OSPFv3 · Routing policy |
ACL and QoS Configuration Guide | Covers information about classifying traffic with ACLs, and controlling traffic and allocating network resources with QoS technologies to improve network performance and network use efficiency. This guide includes: · ACL · QoS (including QoS overview, QoS policy, traffic policing, traffic filtering, and priority marking) · Time range |
IP Multicast Configuration Guide | Covers the IP multicast features. This guide includes: · Multicast overview · Multicast routing and forwarding · PIM · IGMP |
High Availability Configuration Guide | Covers high availability technologies and features available for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery. This guide includes: · VRRP · Reth interface and redundancy group · BFD · Track · Process placement · Interface collaboration · Monitor Link · Interface backup · RBM · Smart Link · Hot backup |
Network Management and Monitoring Configuration Guide | Covers features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity. This guide includes: · System maintenance and debugging (ping, tracert, and system debugging) · NQA · NTP · EAA · Process monitoring and maintenance · NETCONF · CWMP · Information center. · SNMP (including the MIB style configuration) · NetStream · RMON · Flow log · Event MIB · Packet capture · Fast log output · Mirroring |
VPN Instance Configuration Guide | Covers VPN instance fundamentals and configuration procedures. |
Acronyms | Lists the significant acronyms in the configuration guides. |