- Table of Contents
- Related Documents
-
Title | Size | Download |
---|---|---|
00-1Cover | 325 KB |
|
|
|
|
H3C SecBlade FW/VPN Cards |
Operation Manual |
|
|
|
Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com
Manual Version: T2-08164R-20070423-C-1.03 Product Version: S9500-CMW310-R1628 |
Copyright © 2006-2007, Hangzhou H3C Technologies Co., Ltd. and its licensors
All Rights Reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C, , Aolynk,
, H3Care,
, TOP G,
, IRF, NetPilot, Neocean, NeoVTL, SecPro, SecPoint,
SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V2G, VnG,
PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C
Technologies Co., Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners.
Notice
The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied.
To obtain the latest information, please access:
http://www. h3c.com
Technical Support
http://www. h3c.com
About This Manual
Related Documentation
In addition to this manual, each documentation set of the H3C SecBlade FW/VPN Cards includes the following:
Manual |
Description |
H3C SecBlade FW/VPN Card Command Manual |
It introduces all commands available in the configuration and operation on the SecBlade FW/VPN cards. The details include command name, complete command form, parameter, operation view, usage guide and operation example. |
Organization
H3C Operation Manual is organized as follows:
Part |
Contents |
1 Overview |
Profiles the characteristics and functions of the security gateway and firewall, and introduces SecBlade configuration. |
2 VPN |
Focuses on technical principles and application categories of VPNs. The configuration details include L2TP and GRE configuration, dynamic VPN configuration, IPSec and IKE configuration. |
3 Security |
Describes the configuration on hierarchical command protection, RADIUS/HWTACACS-based AAA, firewall and NAT, SSL and PKI, transparent firewall, Web and E-mail filtering, attack prevention and packet statistics, log maintenance, as well as ACL. |
4 Reliability |
Introduces VRRP configuration. The VRRP provides backup for devices. |
5 Appendix |
Offers the acronyms used in this manual |
Conventions
The manual uses the following conventions:
I. Command conventions
Convention |
Description |
Boldface |
The keywords of a command line are in Boldface. |
italic |
Command arguments are in italic. |
[ ] |
Items (keywords or arguments) in square brackets [ ] are optional. |
{ x | y | ... } |
Alternative items are grouped in braces and separated by vertical bars. One is selected. |
[ x | y | ... ] |
Optional alternative items are grouped in square brackets and separated by vertical bars. One or none is selected. |
{ x | y | ... } * |
Alternative items are grouped in braces and separated by vertical bars. A minimum of one or a maximum of all can be selected. |
[ x | y | ... ] * |
Optional alternative items are grouped in square brackets and separated by vertical bars. Many or none can be selected. |
&<1-n> |
The argument(s) before the ampersand (&) sign can be entered 1 to n times. |
# |
A line starting with the # sign is comments. |
II. GUI conventions
Convention |
Description |
Boldface |
Window names, button names, field names, and menu items are in Boldface. For example, the New User window appears; click OK. |
> |
Multi-level menus are separated by angle brackets. For example, File > Create > Folder. |
Convention |
Description |
< > |
Button names are inside angle brackets. For example, click <OK>. |
[ ] |
Window names, menu items, data table and field names are inside square brackets. For example, pop up the [New User] window. |
/ |
Multi-level menus are separated by forward slashes. For example, [File/Create/Folder]. |
III. Symbols
Convention |
Description |
|
Means reader be extremely careful. Improper operation may cause bodily injury. |
|
Means reader be careful. Improper operation may cause data loss or damage to equipment. |
& Note |
Means a complementary description. |