01-Product Overview
Chapters Download (75.87 KB)
Table of Contents
H3C Technologies Co., Ltd. provides various ways for you to obtain documentation, through which you can obtain the product documentations and those concerning newly added new features. The documentations are available in one of the following ways:
l H3C website
l Software release notes
Perform the following steps to query and download the product documentation from the H3C website.
Table 1-1 Download documentation from the H3C website
How to apply for an account |
Access the homepage of H3C at http://www.h3c.com and click Registration at the top right. In the displayed page, provide your information and click Submit to register. |
How to get documentation |
In the homepage, select Technical Support & Document > Technical Documents from the navigation bar at the top. Select a product for its documents. |
With software upgrade, new software features may be added. You can acquire the information about the newly added software features through software release notes.
The H3C S5810 series switches (hereinafter referred to as the S5810 series) are Gigabit Ethernet switches developed by H3C Technologies Co., Ltd. The S5810 series provide rich features. They provide the enhanced forwarding function and 10GE ports. Optimized for data center applications, the S5810 series provide powerful egress/ingress packet buffering capabilities, powerful IPv4/IPv6 QoS/ACL features, and double pluggable redundant power modules, thus meeting top-of-rack application requirements in the data center.
The S5810 series support abundant features and the related documents are divided into the volumes as listed in Table 2-1.
Volume |
Features |
|||
01-Access Volume |
Ethernet Interface |
Link Aggregation |
Port Isolation |
Loopback Interface and Null Interface |
DLDP |
LLDP |
MSTP |
Smart Link |
|
Monitor Link |
VLAN |
GVRP |
Port Mirroring |
|
02-IP Services Volume |
IP Addressing |
IP Performance Optimization |
ARP |
DHCP |
DNS |
FTP and TFTP |
|
|
|
03-IP Routing Volume |
IP Routing Overview |
Static Routing |
|
|
04-Multicast Volume |
Mulitcast Overview |
IGMP Snooping |
Multicast VLAN |
|
05-QoS Volume |
QoS |
|
|
|
06-Security Volume |
AAA |
IP Source Guard |
SSH2.0 |
PKI |
SSL |
Public Key |
ACL |
|
|
07-System Volume |
Login |
Basic System Configuration |
Device Management |
File System Management |
HTTP |
SNMP |
RMON |
MAC Address Table Management |
|
System Maintaining and Debugging |
Information Center |
Track |
NTP |
|
VRRP |
Cluster Management |
Stack Management |
Automatic Configuration |
The following sections provide an overview of the main features of each module supported by the S5810 series.
Table 3-1 Features in Access volume
Features |
Description |
Ethernet Interface |
This document describes: l Basic Ethernet Interface Configuration l Configuring Flow Control on an Ethernet Interface l Configuring the Suppression Time of Physical-Link-State Change on an Ethernet Interface l Configuring Loopback Testing on an Ethernet Interface l Configuring Storm Suppression l Setting the Interval for Collecting Ethernet Interface Statistics l Enabling Forwarding of Jumbo Frames l Enabling Loopback Detection on an Ethernet Interface l Configuring the MDI Mode for an Ethernet Interface l Testing the Cable on an Ethernet Interface l Configuring the Storm Constrain Function on an Ethernet Interface |
Link aggregation |
Link aggregation aggregates multiple physical Ethernet ports into one logical link. This document describes: l Basic Concepts of Link Aggregation l Configuring a Static Aggregation Group l Configuring a Dynamic Aggregation Group l Configuring an Aggregate Interface l Configuring a Load Sharing Mode for Load-Sharing Link Aggregation Groups |
Port Isolation |
The port isolation feature allows you to isolate different ports within the same VLAN. This document describes: l Introduction to Port Isolation l Configuring the Isolation Group |
Loopback Interface and Null Interface |
l Introduction to Loopback Interface l Configuring a Loopback Interface |
DLDP |
In the use of fibers, link errors, namely unidirectional links, are likely to occur. DLDP is designed to detect such errors. This document describes: l DLDP Introduction l Enabling DLDP l Setting DLDP Mode l Setting the Interval for Sending Advertisement Packets l Setting the DelayDown Timer l Setting the Port Shutdown Mode l Configuring DLDP Authentication l Resetting DLDP State |
LLDP |
LLDP enables a device to maintain and manage its own and its immediate neighbor’s device information, based on which the network management system detects and determines the conditions of the communications links. This document describes: l Introduction to LLDP l Performing Basic LLDP Configuration l Configuring LLDP Trapping |
MSTP |
MSTP is used to eliminate loops in a LAN. It is compatible with STP and RSTP. This document describes: l Introduction to MSTP l Configuring the Root Bridge l Configuring Leaf Nodes l Performing mCheck l Configuring the VLAN Ignore Feature l Configuring Digest Snooping l Configuring No Agreement Check l Configuring Protection Functions |
Smart Link |
Smart Link is a solution for active-standby link redundancy backup and rapid transition in dual-uplink networking. This document describes: l Smart Link Overview l Configuring a Smart Link Device l Configuring an Associated Device |
Monitor Link |
Monitor link is a port collaboration function used to enable a device to be aware of the up/down state change of the ports on an indirectly connected link. This document describes: l Monitor Link Overview l Configuring Monitor Link |
VLAN |
Using the VLAN technology, you can partition a LAN into multiple logical LANs. This document describes: l Introduction to VLAN l Types of VLAN l Isolate-user-vlan configuration l Introduction and Configuration of Voice VLAN |
GVRP |
GVRP is a GARP application. This document describes: l GARP overview l GVRP configuration l GARP Timers configuration |
Port Mirroring |
Port mirroring copies packets passing through a port to another port connected with a monitoring device for packet analysis to help implement network monitoring and troubleshooting. This document describes: l Port Mirroring overview l Local port mirroring configuration l Remote port mirroring configuration |
Table 3-2 Features in the IP Services volume
Features |
Description |
IP Address |
An IP address is a 32-bit address allocated to a network interface on a device that is attached to the Internet. This document describes: l Introduction to IP addresses l IP address configuration |
IP Performance Optimization |
In some network environments, you need to adjust the IP parameters to achieve best network performance. This document describes: l Enabling Reception and Forwarding of Directed Broadcasts to a Directly Connected Network l Configuring TCP Attributes l Configuring ICMP to Send Error Packets |
ARP |
Address Resolution Protocol (ARP) is used to resolve an IP address into a data link layer address. This document describes: l ARP Overview l Configuring ARP l Configuring Gratuitous ARP l ARP Attack Defense configuration |
DHCP |
DHCP is built on a client-server model, in which the client sends a configuration request and then the server returns a reply to send configuration parameters such as an IP address to the client. This document describes: l DHCP Client configuration l DHCP Snooping configuration l BOOTP Client configuration |
DNS |
Used in the TCP/IP application, Domain Name System (DNS) is a distributed database which provides the translation between domain name and the IP address. This document describes: l Configuring the DNS Client |
FTP and TFTP |
The File Transfer Protocol (FTP) is an application layer protocol for sharing files between server and client over a TCP/IP network. The Trivial File Transfer Protocol (TFTP) provides functions similar to those provided by FTP. This document describes: l TFTP Configuration |
Table 3-3 Features in the IP Routing volume
Features |
Description |
IP Routing Overview |
This document describes: l Introduction to IP routing and routing table l Routing protocol overview |
Static Routing |
A static route is manually configured by the administrator. The proper configuration and usage of static routes can improve network performance and ensure bandwidth for important network applications. This document describes: l Static route configuration |
Table 3-4 Features in IP Multicast volume
Table 3-5 Features in the QoS ACL volume
Features |
Description |
QoS |
This document describes: l QoS overview l QoS policy configuration l Priority mapping configuration l Traffic policing Configuration l Traffic shaping Configuration l Aggregation CAR Configuration l Traffic mirroring configuration l Port buffer configuration |
Table 3-6 Features in the Security volume
Features |
Description |
AAA |
Authentication, Authorization and Accounting (AAA) provide a uniform framework used for configuring these three security functions to implement the network security management. This document describes: l Introduction to AAA, RADIUS and HWTACACS l AAA configuration l RADIUS configuration l HWTACACS configuration |
IP Source Guard |
By filtering packets on a per-port basis, IP source guard prevents illegal packets from traveling through, thus improving the network security. This document describes: l Configuring a Static Binding Entry l Configuring Dynamic Binding Function |
SSH2.0 |
SSH ensures secure login to a remote device in a non-secure network environment. By encryption and strong authentication, it protects the device against attacks. This document describes: l Configuring the Device as an SSH Server |
PKI |
The Public Key Infrastructure (PKI) is a hierarchical framework designed for providing information security through public key technologies and digital certificates and verifying the identities of the digital certificate owners. This document describes PKI related configuration. |
SSL |
Secure Sockets Layer (SSL) is a security protocol providing secure connection service for TCP-based application layer protocols, this document describes SSL related configuration. |
Public Key Configuration |
This document describes Public Key Configuration. |
ACL |
An ACL is used for identifying traffic based on a series of preset matching criteria. This document describes: l ACL overview and ACL types l ACL configuration |
Table 3-7 Features in the System volume
Features |
Description |
Login |
Upon logging into a device, you can configure user interface properties and manage the system conveniently. This document describes: l How to log in to your Ethernet switch l Introduction to the user interface and common configurations l Logging In Through the Console Port l Logging In Through Telnet l Logging in Through Web-based Network Management System l Specifying Source IP address/Interface for Telnet Packets l Controlling Login Users |
Basic System Configuration |
Basic system configuration involves the configuration of device name, system clock, welcome message, user privilege levels and so on. This document describes: l Configuration display l Basic configurations l CLI features |
Device Management |
Through the device management function, you can view the current condition of your device and configure running parameters. This document describes: l Device management overview l Configuring the Exception Handling Method l Rebooting a device l Configuring the scheduled automatic execution function l Configuring Temperature Alarm Thresholds for a Card l Clearing the 16-bit interface indexes not used in the current system |
File System Management |
A major function of the file system is to manage storage devices, mainly including creating the file system, creating, deleting, modifying and renaming a file or a directory and opening a file. This document describes: l File system management |
HTTP |
Hypertext Transfer Protocol (HTTP) is used for transferring web page information across the Internet. This document describes: l HTTPS Configuration |
SNMP |
Simple network management protocol (SNMP) offers a framework to monitor network devices through TCP/IP protocol suite. This document describes: l SNMP overview l Basic SNMP function configuration l SNMP log configuration l Trap configuration |
RMON |
RMON provides an efficient means of monitoring subnets and allows SNMP to monitor remote network devices in a more proactive and effective way. This document describes: l RMON overview l RMON configuration |
MAC Address Table Management |
A switch maintains a MAC address table for fast forwarding packets. This document describes: l MAC address table overview l Configuring MAC Address Entries |
System Maintenance and Debugging |
For the majority of protocols and features supported, the system provides corresponding debugging information to help users diagnose errors. This document describes: l Maintenance and debugging overview l Maintenance and debugging configuration |
Information Center |
As the system information hub, Information Center classifies and manages all types of system information. This document describes: l Information Center Overview l Setting to Output System Information to the Console l Setting to Output System Information to a Monitor Terminal l Setting to Output System Information to a Log Host l Setting to Output System Information to the Trap Buffer l Setting to Output System Information to the Log Buffer l Setting to Output System Information to the SNMP Module l Configuring Synchronous Information Output l Disabling a Port from Generating Link Up/Down Logging Information |
Track |
The track module is used to implement collaboration between different modules through established collaboration objects. The detection modules trigger the application modules to perform certain operations through the track module. This document describes: l Configuring Collaboration Between the Track Module and the Detection Modules l Configuring Collaboration Between the Track Module and the Application Modules |
NTP |
Network Time Protocol (NTP) is the TCP/IP that advertises the accurate time throughout the network. This document describes: l NTP overview l Configuring the Operation Modes of NTP l Configuring Optional Parameters of NTP l Configuring Access-Control Rights l Configuring NTP Authentication |
VRRP |
Virtual Router Redundancy Protocol (VRRP) combines a group of switches (including a master and multiple backups) on a LAN into a virtual router called VRRP group. VRRP streamlines host configuration while providing high reliability. This document describes: l VRRP overview l IPv4-Based VRRP configuration l IPv6-Based VRRP configuration |
Cluster Management |
A cluster is a group of network devices. Cluster management is to implement management of large numbers of distributed network devices. This document describes: l Cluster Management Overview l Configuring the Management Device l Configuring the Member Devices l Configuring Access Between the Management Device and Its Member Devices l Adding a Candidate Device to a Cluster l Configuring Advanced Cluster Functions |
Stack Management |
A stack is a set of network devices. Administrators can group multiple network devices into a stack and manage them as a whole. Therefore, stack management can help reduce customer investments and simplify network management. This document describes: l Stack Configuration Overview l Configuring the Master Device of a Stack |
Automatic Configuration |
Automatic configuration enables a device to automatically obtain and execute the configuration file when it starts up without loading the configuration file. This document describes: l Introduction to Automatic Configuration l Typical Networking of Automatic Configuration l How Automatic Configuration Works |