Title | Size | Downloads |
---|---|---|
00 About the S5500-HI Configuration Guides-book.pdf | 50.98 KB |
- Table of Contents
About the S5500-HI Configuration Guides
The H3C S5500-HI configuration guides are part of the H3C S5500-HI documentation set. They describe the software features for the H3C S5500-HI Switch Series Release 5501, and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply the software features to different network scenarios. The H3C S5500-HI documentation set includes 12 configuration guides:
Configuration guide |
Content |
01 Fundamentals Configuration Guide |
Describes how to use the command line interface of the switch, log in to and set up the switch. This guide includes: · Using the CLI · Login overview · Logging in to the CLI · Logging in to the Web interface · Logging in through SNMP · Controlling user logins · FTP · TFTP · Managing the file system · Managing configuration files · Upgrading software · Performing ISSU · ISSU upgrade example · Managing the device · Automatic configuration |
02 IRF Configuration Guide |
Describes the H3C proprietary Intelligent Resilient Framework (IRF) technology, which provides data center class availability and scalability. IRF creates a fabric from multiple switches. The switches that form the IRF fabric work in 1:N redundancy and appear as one unit in the network. IRF improves management efficiency and streamlines network topologies. It is suitable for highly reliable enterprise networks and data centers. |
03 Layer 2 – LAN Switching Configuration Guide |
Covers Layer 2 technologies and features used on a LAN switched network, such as VLAN technology, port isolation, Spanning Tree. You can use these features to divide broadcast domains, remove Layer 2 loops, isolate users within a VLAN, remark VLAN tags, This guide includes: · Ethernet interface · Bulk interface configuration · MAC address table · MAC information · Ethernet link aggregation · Port isolation · Spanning tree protocols · BPDU tunneling · VLAN · Super VLAN · Isolate-user-VLAN · Voice VLAN · GVRP · QinQ · VLAN mapping · LLDP · Service loopback group · MVRP |
04 Layer 3 – IP Services Configuration Guide |
Describes how to configure IP addressing, DHCP, IP performance optimization, ARP, DNS, IPv6 basics, DHCPv6,and Tunneling. This guide includes: · ARP · Gratuitous ARP · Proxy ARP · IP addressing · DHCP overview · DHCP server · DHCP relay agent · DHCP client · DHCP snooping · IPv4 DNS · IRDP · IP performance optimization · UDP helper · IPv6 basics · DHCPv6 overview · DHCPv6 relay agent · DHCPv6 client · Tunneling · GRE |
05 Layer 3 – IP Routing Configuration Guide |
Covers the routing technologies for IPv4 and IPv6 networks of different sizes. This guide includes: · Static routing · RIP · OSPF · IS-IS · BGP · IPv6 static routing · RIPng · OSPFv3 · IPv6 IS-IS · IPv6 BGP · Routing policy · Policy-based routing |
06 IP Multicast Configuration Guide |
Describes Layer 2 and Layer 3 multicast fundamentals and configuration. This guide includes: · Mulitcast overview · IGMP snooping · Multicast VLAN · Multicast routing and forwarding · Multicast VPN · MLD snooping · IPv6 multicast VLAN |
07 MPLS Configuration Guide |
Describes fundamentals and configuration of MPLS and its extended functions, including MCE, IPv6 MCE, MPLS basics, MPLS TE tunnels, VPLS, L2VPN, L3VPN and IPv6 L3VPN implemented by using MPLS labels. This guide includes: · MCE · IPv6 MCE · Basic MPLS · MPLS TE · VPLS · MPLS L2VPN · MPLS L3VPN · IPv6 MPLS L3VPN |
08 ACL and QoS Configuration Guide |
Describes how to classify traffic with ACLs, and allocate network resources and manage congestions with QoS technologies to improve network performance and network use efficiency. This guide includes: · QoS overview · QoS configuration approaches · Traffic policing, traffic shaping, and rate limit · Traffic filtering · Priority marking · Traffic redirecting · Class-based accounting · Appendix A Default priority mapping tables · Appendix B Packet precedences |
09 Security Configuration Guide |
Covers security features. The major security features available on the switch include identity authentication (AAA), access security (802.1X, MAC authentication, portal, and port security), secure management (SSH), and attack protection (IP source guard, ARP attack protection, and URPF). This guide includes: · AAA · 802.1X overview · 802.1X · EAD fast deployment · MAC authentication · Portal authentication · Triple authentication · Port security · User profile · Password control · HABP · Public key · PKI · IPsec · IKE · SSH2.0 · SFTP · SCP · SSL · IP source guard · URPF · MFF · Blacklist · FIPS |
10 High Availability Configuration Guide |
Describes high availability technologies and features available on the switch for failure detection and failover. Failure detection technologies focus on fault detection and isolation. Failover technologies focus on network recovery. This guide includes: · Ethernet OAM · CFD · DLDP · RRPP · Smart Link · Monitor Link · VRRP · Stateful failover · BFD · Track |
11 Network Management and Monitoring Configuration Guide |
Describes features that help you manage and monitor your network, for example, manage system events, sample packets, assess network performance, synchronize the clock for all devices with the clock in the network, supply power for attached devices by using PoE, and test network connectivity. This guide includes: · Using ping, tracert, and system debugging · NetStream · IPv6 NetStream · Sampler · PoE · Cluster management |
12 OpenFlow Configuration Guide |
Describes the application scenarios, fundamentals, and configuration of OpenFlow. |