00-About the H3C firewall devices Configuration Guides

Chapters Download

About the H3C firewall devices configuration guides

The H3C firewall devices configuration guides (Comware V7) describe the software features and configuration procedures for the Comware V7-based firewall devices in "Applicable devices."

Applicable devices

Product series

Model

H3C SecPath F50X0 firewalls

F5010/F5020/F5030/F5040/F5060/F5080/F5000-M

H3C SecPath F10X0 firewalls

F1005/F1010/F1020/F1030/F1050/F1060/F1070/F1080

H3C SecPath F1000-AK firewalls

AK108/AK109/AK110/AK115/AK120/AK125/AK130/AK135/AK140/AK145/AK150/AK155/AK160/AK165/AK170/AK175/AK180/AK185

H3C SecBlade III FW cards

LSU3FWCEA0/LSUM1FWCEAB0/LSX1FWCEA1

H3C SecBlade IV NGFW cards

LSXM1FWDF1/LSUM1FWDEC0/IM-NGFWX-IV/LSQM1FWDSC0/LSWM1FWD0/LSPM6FWD

 

Software versions used

The following matrix shows the software versions used by the firewall devices:

Table 1 Hardware and software compatibility matrix

Device model

Software version

F5030/F5060/F5080/F5000-M

R9606

F5010/F5020/F5040

R9320

F1020/F1030/F1050/F1060/F1070/F1080

R9323

F1000-AK115-F1000-AK125/F1005/F1010/AK108/AK109/AK110/AK120

R9514

AK130/AK135/AK140/AK145/AK150/AK155/AK160/AK165/AK170/AK175/AK180/AK185

R9323

LSU3FWCEA0/LSUM1FWCEAB0/LSX1FWCEA1

R8219

LSPM6FWD

R8513

LSXM1FWDF1/LSUM1FWDEC0/IM-NGFWX-IV/LSQM1FWDSC0/LSWM1FWD0

R8514

 

Configuration guide content

Table 2 lists features included in each configuration guide. Support for the features depends on device model

Table 2 Configuration guide content

Configuration guide

Content

Fundamentals Configuration Guide

Describes how to use the command line interface of the device, log in to and set up the device, and use the basic management functions. This guide includes:

·          CLI (command line interface overview and how to use the CLI)

·          RBAC

·          Logging In to the firewall devices

·          FTP and TFTP

·          File system management

·          Configuration file management

·          Software upgrade

·          ISSU

·          Automatic

·          Device management

·          Tcl

·          Python

·          License

Virtual Technologies Configuration Guide

Covers the configuration of Virtual Technologies. This guide includes:

·          IRF configuration

·          Context configuration

Security Configuration Guide

Covers security features. This guide includes:

Security zone

Security policy

Object group

Object policy

AAA

Portal

User identification

Password control

Public key configuration

PKI

Ipsec

SSH

SSL

ASPF

APR

Session

Connection limit

Attack detection and prevention

IP source guard

ARP attack protection

ND attack defense

uRPF

Crypto engine

DPI Configuration Guide

Describes fundamentals and configuration of deep packet inspection (DPI). DPI inspects application layer payloads to protect the network against application layer malicious activities.This guide includes:

DPI overview

DPI engine

IPS

URL filtering

Data filtering

File filtering

Antivirus

NAT Configuration Guide

Describes fundamentals and configuration of NAT , including NAT and AFT. This guide includes:

NAT

AFT

VPN Configuration Guide

Covers  the configuration of VPN , including Tunneling, L2TP, SSL VPN,GRE. This guide includes:

·          Tunneling

·          L2TP

·          SSL VPN

·          GRE

Internet Access Behavior Management Configuration Guide

Describes the fundamentals, configuration procedures, and configuration examples for bandwidth management and application audit and management features. This guide includes:

·          Bandwidth management

·          Application audit and management

Interface Configuration Guide

Covers the configuration of various interfaces. This guide includes:

·          Bulk interface

·          Ethernet interface

·          Loopback, null, and inloopback interface

Layer 2—LAN Switching Configuration Guide

Covers Layer 2 technologies and features used on a LAN switched network This guide includes:

·          MAC address table

·          Ethernet link aggregation

·          VLAN

·          VLAN termination

·          Spanning tree

·          LLDP

·          Layer 2 forwarding

Layer 3—IP Services Configuration Guide

Describes IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, ARP, and interoperation between IPv4 and IPv6.

This guide includes:

·          ARP

·          IP addressing

·          DHCP

·          DNS

·          IP forwarding

·          Fast forwarding

·          Flow classification

·          Adjacency table

·          IP performance optimization

·          IPv6 basics

·          DHCPv6

·          IPv6 fast forwarding

Layer 3—IP Routing Configuration Guide

Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route control, and policy based routing. This guide includes:

Basic IP routing basics

Static routing

RIP

OSPF

IS-IS

BGP

Policy-based routing

IPv6 static routing

IPv6 policy-based routing

RIPng

OSPFv3

IPv6 IS-IS

Routing policy

ACL and QoS Configuration Guide

Describes how to classify traffic with ACLs, and allocate network resources and manage congestions with QoS technologies to improve network performance and network use efficiency. You can use ACLs to help other function modules (such as QoS and IP routing) classify or filter traffic. This guide includes:

ACL

QoS

Time range

IP Multicast Configuration Guide

Describes the IP multicast fundamentals, configuration procedures, and configuration examples. It covers the multicast overview, multicast routing and forwarding, and PIM features.This guide includes:

Multicast Overview

Multicast routing and forwarding

PIM

PPP and PPPoE Configuration Guide

Describes fundamentals and configuration of PPP and PPPoE.

This guide includes:

PPP and PPPoE

High Availability Configuration Guide

Describes high availability technologies and features available on the device for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery. This guide includes:

·          VRRP

·          Reth interface and redundancy group

·          BFD

·          Track

·          Process placement

·          Load balancing

·          Interface collaboration

·          Monitor Link

Network Management and Monitoring Configuration Guide

Describes features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity. This guide includes:

·          System maintenance and debugging

·          NQA

·          NTP

·          EAA

·          Process monitoring and maintenance

·          NETCONF

·          CWMP

·          Information center

·          SNMP

·          Session-based NetStream

·          RMON

·          Flow log

·          Event MIB

·          Packet capture

·          Fast log output

Service Chain Configuration Guide

Describes the service chain fundamentals, configuration procedures, and configuration examples.This guide includes:

Service chain

VPN Instance Configuration Guide

Describes fundamentals and configuration of VPN Instance.This guide includes:

·          VPN instance