00-Product Overview

01-Product Overview

Chapters Download  (75.87 KB)

01-Product Overview


H3C Technologies Co., Ltd. provides various ways for you to obtain documentation, through which you can obtain the product documentations and those concerning newly added new features. The documentations are available in one of the following ways:

l          H3C website

l          Software release notes

H3C Website

Perform the following steps to query and download the product documentation from the H3C website.

Table 1-1 Download documentation from the H3C website

How to apply for an account

Access the homepage of H3C at http://www.h3c.com and click Registration at the top right. In the displayed page, provide your information and click Submit to register.

How to get documentation

In the homepage, select Technical Support & Document > Technical Documents from the navigation bar at the top.

Select a product for its documents.

 

Software Release Notes

With software upgrade, new software features may be added. You can acquire the information about the newly added software features through software release notes.

 


Introduction to Product

The H3C S5810 series switches (hereinafter referred to as the S5810 series) are Gigabit Ethernet switches developed by H3C Technologies Co., Ltd. The S5810 series provide rich features. They provide the enhanced forwarding function and 10GE ports. Optimized for data center applications, the S5810 series provide powerful egress/ingress packet buffering capabilities, powerful IPv4/IPv6 QoS/ACL features, and double pluggable redundant power modules, thus meeting top-of-rack application requirements in the data center.

Feature Lists

The S5810 series support abundant features and the related documents are divided into the volumes as listed in Table 2-1.

Table 2-1 Feature list

Volume

Features

01-Access Volume

Ethernet Interface

Link Aggregation

Port Isolation

Loopback Interface and Null Interface

DLDP

LLDP

MSTP

Smart Link

Monitor Link

VLAN

GVRP

Port Mirroring

02-IP Services Volume

IP Addressing

IP Performance Optimization

ARP

DHCP

DNS

FTP and TFTP

 

 

03-IP Routing Volume

IP Routing Overview

Static Routing

 

 

04-Multicast Volume

Mulitcast Overview

IGMP Snooping

Multicast VLAN

 

05-QoS Volume

QoS

 

 

 

06-Security Volume

AAA

IP Source Guard

SSH2.0

PKI

SSL

Public Key

ACL

 

07-System Volume

Login

Basic System Configuration

Device Management

File System Management

HTTP

SNMP

RMON

MAC Address Table Management

System Maintaining and Debugging

Information Center

Track

NTP

VRRP

Cluster Management

Stack Management

Automatic Configuration


Features

The following sections provide an overview of the main features of each module supported by the S5810 series.

Access Volume

Table 3-1 Features in Access volume

Features

Description

Ethernet Interface

This document describes:

l      Basic Ethernet Interface Configuration

l      Combo Port Configuration

l      Configuring Flow Control on an Ethernet Interface

l      Configuring the Suppression Time of Physical-Link-State Change on an Ethernet Interface

l      Configuring Loopback Testing on an Ethernet Interface

l      Configuring a Port Group

l      Configuring Storm Suppression

l      Setting the Interval for Collecting Ethernet Interface Statistics

l      Enabling Forwarding of Jumbo Frames

l      Enabling Loopback Detection on an Ethernet Interface

l      Configuring the MDI Mode for an Ethernet Interface

l      Testing the Cable on an Ethernet Interface

l      Configuring the Storm Constrain Function on an Ethernet Interface

Link aggregation

Link aggregation aggregates multiple physical Ethernet ports into one logical link. This document describes:

l      Basic Concepts of Link Aggregation

l      Configuring a Static Aggregation Group

l      Configuring a Dynamic Aggregation Group

l      Configuring an Aggregate Interface

l      Configuring a Load Sharing Mode for Load-Sharing Link Aggregation Groups

Port Isolation

The port isolation feature allows you to isolate different ports within the same VLAN. This document describes:

l      Introduction to Port Isolation

l      Configuring the Isolation Group

Loopback Interface and Null Interface

This document describes:

l      Introduction to Loopback Interface

l      Configuring a Loopback Interface

l      Introduction to Null Interface

l      Configuring Null 0 Interface

DLDP

In the use of fibers, link errors, namely unidirectional links, are likely to occur. DLDP is designed to detect such errors. This document describes:

l      DLDP Introduction

l      Enabling DLDP

l      Setting DLDP Mode

l      Setting the Interval for Sending Advertisement Packets

l      Setting the DelayDown Timer

l      Setting the Port Shutdown Mode

l      Configuring DLDP Authentication

l      Resetting DLDP State

LLDP

LLDP enables a device to maintain and manage its own and its immediate neighbor’s device information, based on which the network management system detects and determines the conditions of the communications links. This document describes:

l      Introduction to LLDP

l      Performing Basic LLDP Configuration

l      Configuring LLDP Trapping

MSTP

MSTP is used to eliminate loops in a LAN. It is compatible with STP and RSTP. This document describes:

l      Introduction to MSTP

l      Configuring the Root Bridge

l      Configuring Leaf Nodes

l      Performing mCheck

l      Configuring the VLAN Ignore Feature

l      Configuring Digest Snooping

l      Configuring No Agreement Check

l      Configuring Protection Functions

Smart Link

Smart Link is a solution for active-standby link redundancy backup and rapid transition in dual-uplink networking. This document describes:

l      Smart Link Overview

l      Configuring a Smart Link Device

l      Configuring an Associated Device

Monitor Link

Monitor link is a port collaboration function used to enable a device to be aware of the up/down state change of the ports on an indirectly connected link. This document describes:

l      Monitor Link Overview

l      Configuring Monitor Link

VLAN

Using the VLAN technology, you can partition a LAN into multiple logical LANs. This document describes:

l      Introduction to VLAN

l      Types of VLAN

l      Isolate-user-vlan configuration

l      Introduction and Configuration of Voice  VLAN

GVRP

GVRP is a GARP application. This document describes:

l      GARP overview

l      GVRP configuration

l      GARP Timers configuration

Port Mirroring

Port mirroring copies packets passing through a port to another port connected with a monitoring device for packet analysis to help implement network monitoring and troubleshooting. This document describes:

l      Port Mirroring overview

l      Local port mirroring configuration

l      Remote port mirroring configuration

 

IP Services Volume

Table 3-2 Features in the IP Services volume

Features

Description

IP Address

An IP address is a 32-bit address allocated to a network interface on a device that is attached to the Internet. This document describes:

l      Introduction to IP addresses

l      IP address configuration

IP Performance Optimization

In some network environments, you need to adjust the IP parameters to achieve best network performance. This document describes:

l      Enabling Reception and Forwarding of Directed Broadcasts to a Directly Connected Network

l      Configuring TCP Attributes

l      Configuring ICMP to Send Error Packets

ARP

Address Resolution Protocol (ARP) is used to resolve an IP address into a data link layer address. This document describes:

l      ARP Overview

l      Configuring ARP

l      Configuring Gratuitous ARP

l      ARP Attack Defense configuration

DHCP

DHCP is built on a client-server model, in which the client sends a configuration request and then the server returns a reply to send configuration parameters such as an IP address to the client. This document describes:

l      DHCP Client configuration

l      DHCP Snooping configuration

l      BOOTP Client configuration

DNS

Used in the TCP/IP application, Domain Name System (DNS) is a distributed database which provides the translation between domain name and the IP address. This document describes:

l      Configuring the DNS Client

FTP and TFTP

The File Transfer Protocol (FTP) is an application layer protocol for sharing files between server and client over a TCP/IP network. The Trivial File Transfer Protocol (TFTP) provides functions similar to those provided by FTP. This document describes:

l      FTP Configuration

l      TFTP Configuration

 

IP Routing Volume

Table 3-3 Features in the IP Routing volume

Features

Description

IP Routing Overview

This document describes:

l      Introduction to IP routing and routing table

l      Routing protocol overview

Static Routing

A static route is manually configured by the administrator. The proper configuration and usage of static routes can improve network performance and ensure bandwidth for important network applications. This document describes:

l      Static route configuration

l      Detecting Reachability of the Static Route’s Nexthop

 

IP Multicast Volume

Table 3-4 Features in IP Multicast volume

Features

Description

Multicast Overview

This document describes the main concepts in multicast:

l      Introduction to Multicast

l      Multicast Models

l      Multicast Architecture

l      Multicast Packets Forwarding Mechanism

IGMP Snooping

Running at the data link layer, IGMP Snooping is a multicast control mechanism on the Layer 2 Ethernet switch and it is used for multicast group management and control. This document describes:

l      Configuring Basic Functions of IGMP Snooping

l      Configuring IGMP Snooping Port Functions

l      Configuring IGMP Snooping Querier

l      Configuring IGMP Snooping Proxying

l      Configuring IGMP Snooping Policy

Multicast VLAN

Multicast VLAN configuration

l      Configuring sub-VLAN-based multicast VLAN

l      Configuring port-based multicast VLAN

 

QoS Volume

Table 3-5 Features in the QoS ACL volume

Features

Description

QoS

This document describes:

l      QoS overview

l      QoS policy configuration

l      Priority mapping configuration

l      Traffic policing Configuration

l      Traffic shaping Configuration

l      Aggregation CAR Configuration

l      Congestion management

l      Traffic mirroring configuration

l      Port buffer configuration

 

Security Volume

Table 3-6 Features in the Security volume

Features

Description

AAA

Authentication, Authorization and Accounting (AAA) provide a uniform framework used for configuring these three security functions to implement the network security management. This document describes:

l      Introduction to AAA, RADIUS and HWTACACS

l      AAA configuration

l      RADIUS configuration

l      HWTACACS configuration

IP Source Guard

By filtering packets on a per-port basis, IP source guard prevents illegal packets from traveling through, thus improving the network security. This document describes:

l      Configuring a Static Binding Entry

l      Configuring Dynamic Binding Function

SSH2.0

SSH ensures secure login to a remote device in a non-secure network environment. By encryption and strong authentication, it protects the device against attacks. This document describes:

l      Configuring Asymmetric Keys

l      Configuring the Device as an SSH Server

l      Configuring the Device as an SSH Client

l      Configuring an SFTP Server

l      Configuring an SFTP Client

PKI

The Public Key Infrastructure (PKI) is a hierarchical framework designed for providing information security through public key technologies and digital certificates and verifying the identities of the digital certificate owners. This document describes PKI related configuration.

SSL

Secure Sockets Layer (SSL) is a security protocol providing secure connection service for TCP-based application layer protocols, this document describes SSL related configuration.

Public Key Configuration

This document describes Public Key Configuration.

ACL

An ACL is used for identifying traffic based on a series of preset matching criteria. This document describes:

l      ACL overview and ACL types

l      ACL configuration

l      ACL Application for Packet Filtering

 

System Volume

Table 3-7 Features in the System volume

Features

Description

Login

Upon logging into a device, you can configure user interface properties and manage the system conveniently. This document describes:

l      How to log in to your Ethernet switch

l      Introduction to the user interface and common configurations

l      Logging In Through the Console Port

l      Logging In Through Telnet

l      Logging In Using Modem

l      Logging in Through Web-based Network Management System

l      Logging In Through NMS

l      Specifying Source IP address/Interface for Telnet Packets

l      Controlling Login Users

Basic System Configuration

Basic system configuration involves the configuration of device name, system clock, welcome message, user privilege levels and so on. This document describes:

l      Configuration display

l      Basic configurations

l      CLI features

Device Management

Through the device management function, you can view the current condition of your device and configure running parameters. This document describes:

l      Device management overview

l      Configuring the Exception Handling Method

l      Rebooting a device

l      Configuring the scheduled automatic execution function

l      Upgrading Device Software

l      Configuring Temperature Alarm Thresholds for a Card

l      Clearing the 16-bit interface indexes not used in the current system

l      Identifying and Diagnosing Pluggable Transceivers

File System Management

A major function of the file system is to manage storage devices, mainly including creating the file system, creating, deleting, modifying and renaming a file or a directory and opening a file. This document describes:

l      File system management

l      Configuration File Management

HTTP

Hypertext Transfer Protocol (HTTP) is used for transferring web page information across the Internet. This document describes:

l      HTTP Configuration

l      HTTPS Configuration

SNMP

Simple network management protocol (SNMP) offers a framework to monitor network devices through TCP/IP protocol suite. This document describes:

l      SNMP overview

l      Basic SNMP function configuration

l      SNMP log configuration

l      Trap configuration

l      MIB style configuration

RMON

RMON provides an efficient means of monitoring subnets and allows SNMP to monitor remote network devices in a more proactive and effective way. This document describes:

l      RMON overview

l      RMON configuration

MAC Address Table Management

A switch maintains a MAC address table for fast forwarding packets. This document describes:

l      MAC address table overview

l      Configuring MAC Address Entries

l      Configuring MAC Address Aging Timer

l      Configuring the MAC Learning Limit

System Maintenance and Debugging

For the majority of protocols and features supported, the system provides corresponding debugging information to help users diagnose errors. This document describes:

l      Maintenance and debugging overview

l      Maintenance and debugging configuration

Information Center

As the system information hub, Information Center classifies and manages all types of system information. This document describes:

l      Information Center Overview

l      Setting to Output System Information to the Console

l      Setting to Output System Information to a Monitor Terminal

l      Setting to Output System Information to a Log Host

l      Setting to Output System Information to the Trap Buffer

l      Setting to Output System Information to the Log Buffer

l      Setting to Output System Information to the SNMP Module

l      Configuring Synchronous Information Output

l      Disabling a Port from Generating Link Up/Down Logging Information

Track

The track module is used to implement collaboration between different modules through established collaboration objects. The detection modules trigger the application modules to perform certain operations through the track module. This document describes:

l      Track Overview

l      Configuring Collaboration Between the Track Module and the Detection Modules

l      Configuring Collaboration Between the Track Module and the Application Modules

NTP

Network Time Protocol (NTP) is the TCP/IP that advertises the accurate time throughout the network. This document describes:

l      NTP overview

l      Configuring the Operation Modes of NTP

l      Configuring Optional Parameters of NTP

l      Configuring Access-Control Rights

l      Configuring NTP Authentication

VRRP

Virtual Router Redundancy Protocol (VRRP) combines a group of switches (including a master and multiple backups) on a LAN into a virtual router called VRRP group. VRRP streamlines host configuration while providing high reliability. This document describes:

l      VRRP overview

l      IPv4-Based VRRP configuration

l      IPv6-Based VRRP configuration

Cluster Management

A cluster is a group of network devices. Cluster management is to implement management of large numbers of distributed network devices. This document describes:

l      Cluster Management Overview

l      Configuring the Management Device

l      Configuring the Member Devices

l      Configuring Access Between the Management Device and Its Member Devices

l      Adding a Candidate Device to a Cluster

l      Configuring Advanced Cluster Functions

Stack Management

A stack is a set of network devices. Administrators can group multiple network devices into a stack and manage them as a whole. Therefore, stack management can help reduce customer investments and simplify network management. This document describes:

l      Stack Configuration Overview

l      Configuring the Master Device of a Stack

l      Configuring Stack Ports of a Slave Device

l      Logging In to the CLI of a Slave from the Master

Automatic Configuration

Automatic configuration enables a device to automatically obtain and execute the configuration file when it starts up without loading the configuration file. This document describes:

l      Introduction to Automatic Configuration

l      Typical Networking of Automatic Configuration

l      How Automatic Configuration Works

 

H3C reserves the right to modify its collaterals without any prior notice. For the latest information of the collaterals, please consult H3C sales or call 400 hotline.