- Table of Contents
- Related Documents
-
Title | Size | Download |
---|---|---|
00-1Cover | 325 KB |
|
|
|
|
H3C SecBlade FW/VPN Cards |
Command Manual |
|
|
|
Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com
Manual Version: T2-081945-20070423-C-1.03 Product Version: S9500-CMW310-R1628 |
Copyright © 2006-2007, Hangzhou H3C Technologies Co., Ltd. and its licensors
All Rights Reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C, , Aolynk,
, H3Care,
, TOP G,
, IRF, NetPilot, Neocean, NeoVTL, SecPro, SecPoint,
SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V2G, VnG,
PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C
Technologies Co., Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners.
Notice
The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied.
To obtain the latest information, please access:
http://www. h3c.com
Technical Support
http://www. h3c.com
About This Manual
Related Documentation
In addition to this manual, each documentation set of the H3C SecBlade FW/VPN Cards includes the following:
Manual |
Description |
H3C SecBlade FW/VPN Cards Operation Manual |
It describes the features, working principles, configuration and operations of SecBlade FW/VPN cards of H3C series routing switches. |
Organization
H3C Command Manual is organized as follows:
Part |
Contents |
1 Overview |
Describes the SecBlade configuration commands. |
2 VPN |
Describes the VPN-related commands, including those concerning L2TP and GRE configuration, dynamic VPN configuration, IPSec and IKE configuration. |
3 Security |
Describes the commands concerning security, including RADIUS/AAA configuration command, ACL configuration command, firewall and NAT configuration commands, Web and E-mail filtering command, attack prevention and packet statistics commands, and log maintenance and statistics commands. |
4 Reliability |
Describes the VRRP configuration commands. |
5 Appendix |
describes the Command Index. |
Conventions
The manual uses the following conventions:
I. Command conventions
Convention |
Description |
Boldface |
The keywords of a command line are in Boldface. |
italic |
Command arguments are in italic. |
[ ] |
Items (keywords or arguments) in square brackets [ ] are optional. |
{ x | y | ... } |
Alternative items are grouped in braces and separated by vertical bars. One is selected. |
[ x | y | ... ] |
Optional alternative items are grouped in square brackets and separated by vertical bars. One or none is selected. |
{ x | y | ... } * |
Alternative items are grouped in braces and separated by vertical bars. A minimum of one or a maximum of all can be selected. |
[ x | y | ... ] * |
Optional alternative items are grouped in square brackets and separated by vertical bars. Many or none can be selected. |
&<1-n> |
The argument(s) before the ampersand (&) sign can be entered 1 to n times. |
# |
A line starting with the # sign is comments. |
II. GUI conventions
Convention |
Description |
Boldface |
Window names, button names, field names, and menu items are in Boldface. For example, the New User window appears; click OK. |
> |
Multi-level menus are separated by angle brackets. For example, File > Create > Folder. |
Convention |
Description |
< > |
Button names are inside angle brackets. For example, click <OK>. |
[ ] |
Window names, menu items, data table and field names are inside square brackets. For example, pop up the [New User] window. |
/ |
Multi-level menus are separated by forward slashes. For example, [File/Create/Folder]. |
III. Symbols
Convention |
Description |
|
Means reader be extremely careful. Improper operation may cause bodily injury. |
|
Means reader be careful. Improper operation may cause data loss or damage to equipment. |
& Note |
Means a complementary description. |