Chapters Download
Product series |
Model |
H3C SecPath F50X0 firewalls |
F5010/F5020/F5030/F5040/F5060/F5080/F5000-M |
H3C SecPath F10X0 firewalls |
F1005/F1010/F1020/F1030/F1050/F1060/F1070/F1080 |
H3C SecPath F1000-AK firewalls |
AK108/AK109/AK110/AK115/AK120/AK125/AK130/AK135/AK140/AK145/AK150/AK155/AK160/AK165/AK170/AK175/AK180/AK185 |
H3C SecBlade III FW cards |
LSU3FWCEA0/LSUM1FWCEAB0/LSX1FWCEA1 |
H3C SecBlade IV NGFW cards |
LSXM1FWDF1/LSUM1FWDEC0/IM-NGFWX-IV/LSQM1FWDSC0/LSWM1FWD0/LSPM6FWD |
The following matrix shows the software versions used by the firewall devices:
Table 1 Hardware and software compatibility matrix
Device model |
Software version |
F5030/F5060/F5080/F5000-M |
R9606 |
F5010/F5020/F5040 |
R9320 |
F1020/F1030/F1050/F1060/F1070/F1080 |
R9323 |
F1000-AK115-F1000-AK125/F1005/F1010/AK108/AK109/AK110/AK120 |
R9514 |
AK130/AK135/AK140/AK145/AK150/AK155/AK160/AK165/AK170/AK175/AK180/AK185 |
R9323 |
LSU3FWCEA0/LSUM1FWCEAB0/LSX1FWCEA1 |
R8219 |
LSPM6FWD |
R8513 |
LSXM1FWDF1/LSUM1FWDEC0/IM-NGFWX-IV/LSQM1FWDSC0/LSWM1FWD0 |
R8514 |
Table 2 lists features included in each configuration guide. Support for the features depends on device model
Table 2 Configuration guide content
Configuration guide |
Content |
Fundamentals Configuration Guide |
Describes how to use the command line interface of the device, log in to and set up the device, and use the basic management functions. This guide includes: · CLI (command line interface overview and how to use the CLI) · RBAC · Logging In to the firewall devices · FTP and TFTP · File system management · Configuration file management · Software upgrade · ISSU · Automatic · Device management · Tcl · Python · License |
Virtual Technologies Configuration Guide |
Covers the configuration of Virtual Technologies. This guide includes: · IRF configuration · Context configuration |
Security Configuration Guide |
Covers security features. This guide includes: Security zone Security policy Object group Object policy AAA Portal User identification Password control Public key configuration PKI Ipsec SSH SSL ASPF APR Session Connection limit Attack detection and prevention IP source guard ARP attack protection ND attack defense uRPF Crypto engine |
DPI Configuration Guide |
Describes fundamentals and configuration of deep packet inspection (DPI). DPI inspects application layer payloads to protect the network against application layer malicious activities.This guide includes: DPI overview DPI engine IPS URL filtering Data filtering File filtering Antivirus |
NAT Configuration Guide |
Describes fundamentals and configuration of NAT , including NAT and AFT. This guide includes: NAT AFT |
VPN Configuration Guide |
Covers the configuration of VPN , including Tunneling, L2TP, SSL VPN,GRE. This guide includes: · Tunneling · L2TP · SSL VPN · GRE |
Internet Access Behavior Management Configuration Guide |
Describes the fundamentals, configuration procedures, and configuration examples for bandwidth management and application audit and management features. This guide includes: · Bandwidth management · Application audit and management |
Interface Configuration Guide |
Covers the configuration of various interfaces. This guide includes: · Bulk interface · Ethernet interface · Loopback, null, and inloopback interface |
Layer 2—LAN Switching Configuration Guide |
Covers Layer 2 technologies and features used on a LAN switched network This guide includes: · MAC address table · Ethernet link aggregation · VLAN · VLAN termination · Spanning tree · LLDP · Layer 2 forwarding |
Layer 3—IP Services Configuration Guide |
Describes IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, ARP, and interoperation between IPv4 and IPv6. This guide includes: · ARP · IP addressing · DHCP · DNS · IP forwarding · Fast forwarding · Flow classification · Adjacency table · IP performance optimization · IPv6 basics · DHCPv6 · IPv6 fast forwarding |
Layer 3—IP Routing Configuration Guide |
Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route control, and policy based routing. This guide includes: Static routing RIP OSPF IS-IS BGP Policy-based routing IPv6 static routing IPv6 policy-based routing RIPng OSPFv3 IPv6 IS-IS Routing policy |
ACL and QoS Configuration Guide |
Describes how to classify traffic with ACLs, and allocate network resources and manage congestions with QoS technologies to improve network performance and network use efficiency. You can use ACLs to help other function modules (such as QoS and IP routing) classify or filter traffic. This guide includes: ACL QoS Time range |
IP Multicast Configuration Guide |
Describes the IP multicast fundamentals, configuration procedures, and configuration examples. It covers the multicast overview, multicast routing and forwarding, and PIM features.This guide includes: Multicast Overview Multicast routing and forwarding PIM |
PPP and PPPoE Configuration Guide |
Describes fundamentals and configuration of PPP and PPPoE. This guide includes: PPP and PPPoE |
High Availability Configuration Guide |
Describes high availability technologies and features available on the device for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery. This guide includes: · VRRP · Reth interface and redundancy group · BFD · Track · Process placement · Load balancing · Interface collaboration · Monitor Link |
Network Management and Monitoring Configuration Guide |
Describes features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity. This guide includes: · System maintenance and debugging · NQA · NTP · EAA · Process monitoring and maintenance · NETCONF · CWMP · Information center · SNMP · Session-based NetStream · RMON · Flow log · Event MIB · Packet capture · Fast log output |
Service Chain Configuration Guide |
Describes the service chain fundamentals, configuration procedures, and configuration examples.This guide includes: Service chain |
VPN Instance Configuration Guide |
Describes fundamentals and configuration of VPN Instance.This guide includes: · VPN instance |