Title | Size | Downloads |
---|---|---|
00-About the Configuration Guides-book.pdf | 24.25 KB |
- Table of Contents
About the H3C S5560S-EI & S5130S-HI[EI] & S5110V2 & S3100V3-EI configuration guides
Configuration guide |
Content |
Fundamentals Configuration Guide |
Covers information about using the command line interface, logging in to and setting up the device, and using the basic management features. This guide includes: · CLI (command line interface overview and how to use the CLI). · RBAC. · Logging in to the device (login methods such as Telnet, and user interface configuration and access control). · FTP and TFTP. · File system management. · Configuration file management. · Software upgrade. · Device management. |
IRF Configuration Guide |
Covers Intelligent Resilient Framework (IRF) technology, which provides data center class availability and scalability. IRF creates a large virtual device from multiple devices. The IRF member devices work in 1:N redundancy and appear as one unit in the network. IRF improves management efficiency and streamlines network topology. It is suitable for highly reliable enterprise networks and data centers. |
Layer 2—LAN Switching Configuration Guide |
Covers Layer 2 technologies and features used on a LAN switched network, such as VLAN technology, port isolation, and spanning tree. You can use these features to divide broadcast domains, remove Layer 2 loops, isolate users within a VLAN, re-mark VLAN tags, or implement VLAN VPNs over the Internet. This guide includes: · Ethernet interface. · Loopback, null, and inloopback interfaces. · Bulk interface configuration. · MAC address table and MAC Information. · Ethernet link aggregation. · Port isolation. · Spanning tree. · Loop detection. · VLAN (including VLAN and voice VLAN). · MVRP. · QinQ. · VLAN mapping. · LLDP. |
Layer 3—IP Services Configuration Guide |
Covers IP addressing (including static and dynamic IPv4 and IPv6 address assignment), network performance optimization, and ARP. · ARP (including gratuitous ARP, proxy ARP, and ARP snooping). · IP addressing. · DHCP (including DHCP overview, DHCP server, DHCP relay agent, DHCP client, DHCP snooping, and BOOTP client). · Basic IP forwarding. · IRDP. · IP performance optimization. · DHCPv6 (including DHCPv6 overview, DHCPv6 server, DHCPv6 relay agent, DHCPv6 client, and DHCPv6 snooping). |
Layer 3—IP Routing Configuration Guide |
Covers the routing technologies for IPv4 and IPv6 networks of different sizes, route filtering, route control, and policy-based routing. This guide includes: · Basic IP routing. · Static routing. · Default route. · RIP. · OSPF. · IPv6 static routing. · RIPng. · OSPFv3. · Routing policy. |
IP Multicast Configuration Guide |
Covers Layer 2 IPv4 multicast protocols (including IGMP snooping, PIM snooping, and multicast VLAN) and Layer 2 IPv6 multicast protocols (including MLD snooping, IPv6 PIM snooping, and IPv6 multicast VLAN). This guide includes: · Multicast overview. · IGMP snooping. · PIM snooping. · Multicast VLAN. · MLD snooping. · IPv6 PIM snooping. · IPv6 multicast VLAN. |
ACL and QoS Configuration Guide |
Covers information about classifying traffic with ACLs, and allocating network resources and managing congestions with QoS technologies to improve network performance and network use efficiency. You can use ACLs to help feature modules (such as QoS and IP routing) classify or filter traffic. · ACL. · QoS (including QoS overview, QoS policy, priority mapping, traffic policing, GTS and rate limit, congestion management, traffic filtering, priority marking, nesting, traffic redirecting, global CAR, class-based accounting, and appendixes). · Data buffer. |
Security Configuration Guide |
Covers security features. The major security features available on the switch include: identity authentication (AAA and PKI), access security (802.1X, MAC authentication, and port security), secure management (SSH), SSL, and attack protection (IP source guard and ARP attack protection). This guide includes: · AAA. · 802.1X. · MAC authentication. · Web authentication. · Triple authentication. · Port security. · User profile. · Password control. · Public key management. · PKI. · IPsec (including IPsec, IKE, and IKEv2). · SSH. · SSL. · Attack detection and prevention. · IP source guard. · ARP attack protection. · FIPS. |
High Availability Configuration Guide |
Covers high availability technologies and features available on the switch for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery. This guide includes: · DLDP. · RRPP. · Smart Link. · Monitor Link. · BFD. · Track. |
Network Management and Monitoring Configuration Guide |
Covers features that help you manage and monitor your network, for example, manage system events, collect traffic statistics, sample packets, assess network performance, and test network connectivity. This guide includes: · System maintenance and debugging (ping, tracert, and system debugging). · NQA. · PoE. · RMON. · NETCONF. · CWMP. · EAA. · Process monitoring and maintenance. · Mirroring (including both port and traffic mirroring). · Information center. · Packet capture. |
Acronyms |
Lists the significant acronyms in the configuration guides. |