- Table of Contents
- Related Documents
-
Title | Size | Download |
---|---|---|
01-Product Overview | 80.65 KB |
H3C Technologies Co., Ltd. provides various ways for you to obtain documentation, through which you can obtain the product documentations and those concerning newly added new features. The documentations are available in one of the following ways:
l CD-ROMs shipped with the devices
l H3C website
l Software release notes
CD-ROMs Shipped with the Devices
H3C delivers a CD-ROM together with each device. The CD-ROM contains a complete product document set, including the operation manual and command manual. After installing the reader program provided by the CD-ROM, you can search for the desired contents in a convenient way through the reader interface.
The contents in the manual are subject to update on an irregular basis due to product version upgrade or some other reasons. Therefore, the contents in the CD-ROM may not be the latest version. For the latest software documentation, go to the H3C website.
H3C Website
You can access the most up-to-date H3C product documentation on the World Wide Web at this URL: http://www.h3c.com.
Software Release Notes
With software upgrade, new software features may be added. You can acquire the information about the newly added software features through software release notes.
Introduction to Product
The S7500E switch is a cost-effective Layer 3 switch with high capacity. It is designed to operate at the core layer of small and medium-sized networks, convergence layer of large enterprise networks, and convergence layer and access layer of the metropolitan area networks (MANs).
Feature Lists
The S7500E series support abundant features and the related documents are divided into the volumes as listed in Table 2-1.
Volume |
Features |
|||
01-Access Volume |
Ethernet Interface |
Link Aggregation |
Port Isolation |
Service Loopback Group |
DLDP |
Smart Link |
LLDP |
VLAN |
|
GVRP |
QinQ |
BPDU Tunneling |
VLAN Mapping |
|
Ethernet OAM |
Connectivity Fault Detection |
EPON-OLT |
MSTP |
|
RRPP |
Mirroring |
|
|
|
02-IP Services Volume |
IP Addressing |
ARP |
DHCP |
DNS |
IP Performance |
UDP Helper |
URPF |
IPv6 Basics |
|
Dual Stack |
Tunneling |
sFlow |
|
|
03-IP Routing Volume |
IP Routing Overview |
Static Routing |
RIP |
OSPF |
IS-IS |
BGP |
IPv6 Static Routing |
IPv6 RIPng |
|
IPv6 OSPFv3 |
IPv6 IS-IS |
IPv6 BGP |
Routing Policy |
|
04-Multicast Volume |
Mulitcast Overview |
Multicast Routing and Forwarding |
IGMP |
PIM |
MSDP |
MBGP |
Multicast VPN |
IGMP Snooping |
|
Multicast VLAN |
IPv6 Multicast Routing and Forwarding |
MLD |
IPv6 PIM |
|
IPv6 MBGP |
MLD Snooping |
IPv6 Multicast VLAN |
|
|
05-MPLS Volume |
MCE |
MPLS Basics Configuration |
MPLS L2VPN |
MPLS L3VPN |
06-QoS Volume |
QoS |
|
|
|
07-Security Volume |
AAA |
802.1X |
MAC Authentication |
Portal |
Port Security |
IP Source Guard |
SSH2.0 |
ACL |
|
08-System Volume |
Login |
Basic System Configuration |
Device Management |
File System Management |
SNMP |
RMON |
MAC Address Table Management |
System Maintenance and Debugging |
|
Information Center |
PoE |
Track |
NQA |
|
NTP |
VRRP |
HA |
Hotfix |
|
GR Overview |
|
|
|
The following sections provide an overview of the main features of each module supported by the S7500E series.
Access Volume
Table 3-1 Features in Access volume
Features |
Description |
Ethernet Interface |
This document describes: l Basic Ethernet Interface Configuration l Configuring Flow Control on an Ethernet Interface l Configuring the Suppression Time of Physical-Link-State Change on an Ethernet Interface l Configuring Loopback Testing on an Ethernet Interface l Configuring an Auto-negotiation Transmission Rate l Configuring Storm Suppression l Setting the Interval for Collecting Ethernet Interface Statistics l Enabling Forwarding of Jumbo Frames l Enabling Loopback Detection on an Ethernet Interface l Configuring the MDI Mode for an Ethernet Interface l Testing the Cable on an Ethernet Interface l Configuring the Storm Constrain Function on an Ethernet Interface |
Link aggregation |
Link aggregation aggregates multiple physical Ethernet ports into one logical link. This document describes: l Basic Concepts of Link Aggregation l Configuring a Static Aggregation Group |
Port Isolation |
The port isolation feature allows you to isolate different ports within the same VLAN. This document describes: l Introduction to Port Isolation l Configuring the Isolation Group |
Service Loopback Group |
To increase service redirecting throughput, you can bundle multiple service loopback ports into a logical link, called a service loopback group. This document describes: l Introduction to Service Loopback Groups |
DLDP |
In the use of fibers, link errors, namely unidirectional links, are likely to occur. DLDP is designed to detect such errors. This document describes: l DLDP Introduction l Enabling DLDP l Setting DLDP Mode l Setting the Interval for Sending Advertisement Packets l Setting the DelayDown Timer l Setting the Port Shutdown Mode l Configuring DLDP Authentication l Resetting DLDP State |
Smart Link |
Smart Link is a solution for active-standby link redundancy backup and rapid transition in dual-uplink networking. This document describes: l Smart Link Overview l Configuring a Smart Link Device l Configuring an Associated Device |
LLDP |
LLDP enables a device to maintain and manage its own and its immediate neighbor’s device information, based on which the network management system detects and determines the conditions of the communications links. This document describes: l Introduction to LLDP l Performing Basic LLDP Configuration l Configuring the Encapsulation Format for LLDPDUs l Configuring the Encapsulation Format of the Management Address l Configuring CDP Compatibility l Configuring LLDP Trapping |
VLAN |
Using the VLAN technology, you can partition a LAN into multiple logical LANs. This document describes: l Introduction to VLAN l Types of VLAN l Introduction and Configuration of Super VLAN l Introduction and Configuration of Isolate-User-VLAN l Introduction and Configuration of Voice VLAN |
GVRP |
GVRP is a GARP application. This document describes: l GARP overview l GVRP configuration l GARP Timers configuration |
QinQ |
As defined in IEEE802.1Q, 12 bits are used to identify a VLAN ID, so a device can support a maximum of 4094 VLANs. The QinQ feature extends the VLAN space by allowing Ethernet frames to travel across the service provider network with double VLAN tags. This document describes: l Introduction to QinQ l Configuring basic QinQ l Configuring Selective QinQ l Configuring the TPID Value in VLAN Tags |
BPDU Tunnel |
BPDU tunneling enables transparently transmission of customer network BPDU frames over the service provider network. This document describes: l Introduction to BPDU Tunneling l Configuring BPDU Transparent Transmission l Configuring Destination Multicast MAC Address for BPDU Tunnel Frames |
VLAN Mapping |
The VLAN mapping feature maps CVLAN tags to SVLAN tags. This document describes: l Configuring One-to-One VLAN Mapping l Configuring Many-to-One VLAN Mapping l Configuring One-to-Two VLAN Mapping l Configuring Two-to-Two VLAN Mapping |
Ethernet OAM |
Ethernet OAM is a tool monitoring Layer-2 link status. It helps network administrators manage their networks effectively. This document describes: l Ethernet OAM overview l Configuring Basic Ethernet OAM Functions l Configuring Link Monitoring |
Connectivity Fault Detection |
Connectivity fault detection is an end-to-end, per-VLAN link-layer OAM mechanism for link connectivity detection, fault verification, and fault location. This document describes: l Connectivity Fault Detection Overview |
EPON-OLT |
EPON is a Passive Optical Network (PON) that carries Ethernet frames encapsulated in 802.3 standards. It is a combination of the Ethernet technology and the PON technology. This document describes: |
MSTP |
MSTP is used to eliminate loops in a LAN. It is compatible with STP and RSTP. This document describes: l Introduction to MSTP l Configuring the Root Bridge l Configuring Leaf Nodes l Performing mCheck l Configuring Digest Snooping l Configuring No Agreement Check l Configuring Protection Functions |
RRPP |
RRPP is a link layer protocol designed for Ethernet rings. RRPP can prevent broadcast storms caused by data loops when an Ethernet ring is healthy, and rapidly restore the communication paths between the nodes after a link is disconnected on the ring. This document describes: l RRPP overview l Configuring Master Node l Configuring Transit Node l Configuring Edge Node l Configuring Assistant Edge Node l Configuring Ring Group |
Mirroring |
Port mirroring copies packets passing through a port to another port connected with a monitoring device for packet analysis to help implement network monitoring and troubleshooting. Traffic mirroring is implemented by a QoS policy, which defines certain match criteria to match the packets to be mirrored and defines the action of mirroring such packets to the specified destination. This document describes: l Port Mirroring overview l Local port mirroring configuration l Remote port mirroring configuration l Traffic mirroring l Remote traffic mirroring |
IP Services Volume
Table 3-2 Features in the IP Services volume
Features |
Description |
IP Address |
An IP address is a 32-bit address allocated to a network interface on a device that is attached to the Internet. This document describes: l Introduction to IP addresses l IP address configuration |
ARP |
Address Resolution Protocol (ARP) is used to resolve an IP address into a data link layer address. This document describes: l ARP Overview l Configuring ARP l Configuring Gratuitous ARP l Proxy ARP and Local Proxy ARP configuration l ARP Attack Defense configuration |
DHCP |
DHCP is built on a client-server model, in which the client sends a configuration request and then the server returns a reply to send configuration parameters such as an IP address to the client. This document describes: l DHCP overview l DHCP server configuration l DHCP relay agent configuration l DHCP Client configuration l DHCP Snooping configuration |
DNS |
Used in the TCP/IP application, Domain Name System (DNS) is a distributed database which provides the translation between domain name and the IP address. This document describes: l Introduction to DNS l Configuring the DNS Client l Configuring the DNS Proxy |
IP Performance |
In some network environments, you need to adjust the IP parameters to achieve best network performance. This document describes: l IP performance overview l Enabling Reception and Forwarding of Directed Broadcasts to a Directly Connected Network l Configuring TCP Attributes l Configuring ICMP to Send Error Packets |
UDP Helper |
UDP Helper functions as a relay agent that converts UDP broadcast packets into unicast packets and forwards them to a specified server. This document describes: l UDP Helper overview l UDP Helper configuration |
URPF |
Unicast Reverse Path Forwarding (URPF) protects a network against source address spoofing attacks. This document describes: l URPF overview l URPF configuration |
IPv6 Basics |
Internet protocol version 6 (IPv6), also called IP next generation (IPng), was designed by the Internet Engineering Task Force (IETF) as the successor to Internet protocol version 4 (IPv4). This document describes: l IPv6 overview l Basic IPv6 functions configuration l IPv6 NDP configuration l PMTU discovery configuration l IPv6 TCP properties configuration l ICMPv6 packet sending configuration l IPv6 DNS Client configuration |
Dual Stack |
A network node that supports both IPv4 and IPv6 is called a dual stack node. A dual stack node configured with an IPv4 address and an IPv6 address can have both IPv4 and IPv6 packets transmitted. This document describes: l Dual stack overview l Dual stack configuration |
Tunneling |
Tunneling is an encapsulation technique, which utilizes one network transport protocol to encapsulate packets of another network transport protocol and transfer them over the network. This document describes: l Tunneling overview l IPv6 manually tunnel configuration l 6to4 tunnel configuration l ISATAP tunnel configuration |
sFlow |
Based on packet sampling, Sampled Flow (sFlow) is a traffic monitoring technology mainly used to collect and analyze traffic statistics. This document describes: l sFlow Configuration |
IP Routing Volume
Table 3-3 Features in the IP Routing volume
Features |
Description |
IP Routing Overview |
This document describes: l Introduction to IP routing and routing table l Routing protocol overview |
Static Routing |
A static route is manually configured by the administrator. The proper configuration and usage of static routes can improve network performance and ensure bandwidth for important network applications. This document describes: l Static route configuration |
RIP |
Routing Information Protocol (RIP) is a simple Interior Gateway Protocol (IGP), mainly used in small-sized networks. This document describes: l RIP basic functions configuration l RIP advanced functions configuration l RIP network optimization configuration |
OSPF |
Open Shortest Path First (OSPF) is an Interior Gateway Protocol based on the link state developed by IETF. This document describes: l Configuring OSPF Network Types l Configuring OSPF Route Control |
IS-IS |
Intermediate System-to-Intermediate System (IS-IS) is a link state protocol, which uses the shortest path first (SPF) algorithm. This document describes: l Configuring IS-IS Basic Functions l Configuring IS-IS Routing Information Control l Tuning and Optimizing IS-IS Networks l Configuring IS-IS Authentication l Configuring System ID to Host Name Mappings |
BGP |
Border gateway protocol (BGP) is an inter-autonomous system (inter-AS) dynamic route discovery protocol. This document describes: l Configuring BGP Basic Functions l Controlling Route Generation l Controlling Route Distribution and Reception l Configuring BGP Route Attributes l Tuning and Optimizing BGP Networks |
IPv6 Static Routing |
Static routes are special routes that are manually configured by network administrators. Similar to IPv4 static routes, IPv6 static routes work well in simple IPv6 network environments. This document describes: l IPv6 static route configuration |
IPv6 RIPng |
RIP next generation (RIPng) is an extension of RIP-2 for IPv4. RIPng for IPv6 is IPv6 RIPng. This document describes: l Configuring RIPng Basic Functions l Configuring RIPng Route Control |
IPv6 OSPFv3 |
OSPFv3 is OSPF version 3 for short, supporting IPv6 and compliant with RFC2740 (OSPF for IPv6). This document describes: l Configuring OSPFv3 Area Parameters l Configuring OSPFv3 Network Types l Configuring OSPFv3 Routing Information Control l Tuning and Optimizing OSPFv3 Networks |
IPv6 IS-IS |
The IS-IS routing protocol supports multiple network protocols, including IPv6. IS-IS with IPv6 support is called IPv6 IS-IS dynamic routing protocol. This document describes: l Configuring IPv6 IS-IS Basic Functions l Configuring IPv6 IS-IS Routing Information Control |
IPv6 BGP |
To support multiple network layer protocols, IETF extended BGP-4 by introducing IPv6 BGP. This document describes: l Configuring IPv6 BGP Basic Functions l Controlling Route Distribution and Reception l Configuring IPv6 BGP Route Attributes |
Routing Policy |
Routing policy is used on the router for route inspection, filtering, attributes modifying when routes are received, advertised, or redistributed. This document describes: l Route policy configuration |
Multicast Volume
Table 3-4 Features in Multicast volume
Features |
Description |
Multicast Overview |
This document describes the main concepts in multicast: l Multicast Models l Multicast Architecture l Multicast Packets Forwarding Mechanism |
Multicast Routing and Forwarding |
Multicast routing and forwarding refer to some policies that filter RPF routing information for IP multicast support. This document describes: l Multicast routing and forwarding overview l Multicast routing and forwarding configuration |
IGMP |
Internet Group Management Protocol (IGMP) is a protocol in the TCP/IP suite responsible for management of IP multicast members. This document describes: l IGMP overview l Configuring basic functions of IGMP l Configuring IGMP performance parameters |
PIM |
PIM leverages the unicast routing table created by any unicast routing protocol to provide routing information for IP multicast. This document describes: l Configuring PIM-DM l Configuring PIM-SM l Configuring PIM-SSM l Configuring PIM Common Features |
MSDP |
Multicast source discovery protocol (MSDP) describes interconnection mechanism of multiple PIM-SM domains. It is used is to discover multicast source information in other PIM-SM domains. This document describes: l MSDP configuration l Configuring an MSDP Peer Connection l Configuring SA Messages Related Parameters |
MBGP |
As a multicast extension of MP-BGP, MBGP enables BGP to provide routing information for multicast applications. This document describes: l Configuring MBGP Basic Functions |
Multicast VPN |
l Multicast VPN overview l How MD-VPN works |
IGMP Snooping |
Running at the data link layer, IGMP Snooping is a multicast control mechanism on the Layer 2 Ethernet switch and it is used for multicast group management and control. This document describes: l Configuring Basic Functions of IGMP Snooping l Configuring IGMP Snooping Port Functions l Configuring IGMP Snooping Querier l Configuring IGMP Snooping Policy |
Multicast VLAN |
Multicast VLAN configuration |
IPv6 Multicast Routing and Forwarding |
IPv6 multicast routing and forwarding refer to some policies that filter RPF routing information for IPv6 multicast support. This document describes: l IPv6 Multicast routing and forwarding overview l IPv6 Multicast routing and forwarding configuration |
MLD |
MLD is used by an IPv6 router or a Ethernet Switch to discover the presence of multicast listeners on directly-attached subnets. This document describes: |
IPv6 PIM |
IPv6 PIM discovers multicast source and delivers information to the receivers. This document describes: l Configuring IPv6 PIM-DM l Configuring IPv6 PIM-SM l Configuring IPv6 PIM-SSM |
IPv6 MBGP |
As an IPv6 multicast extension of MP-BGP, IPv6 MBGP enables BGP to provide routing information for IPv6 multicast applications. This document describes: l Configuring IPv6 MBGP Basic Functions |
MLD Snooping |
Multicast Listener Discovery Snooping (MLD Snooping) is an IPv6 multicast constraining mechanism that runs on Layer 2 devices to manage and control IPv6 multicast groups. This document describes: l Configuring Basic Functions of MLD Snooping l Configuring MLD Snooping Port Functions l Configuring MLD Snooping Querier l Configuring MLD Snooping Policy |
IPv6 Multicast VLAN |
IPv6 Multicast VLAN configuration |
MPLS Volume
Table 3-5 Features in the MPLS volume
Features |
Description |
MCE Configuration |
Multi-CE (MCE) enables a switch to function as the CEs of multiple VPN instances in a BGP/MPLS VPN network, thus reducing the investment on network equipment. |
MPLS Basics Configuration |
MPLS (Multiprotocol Label Switching) brings together the advantages of the connectionless control with IP and the connection-oriented forwarding with ATM. In addition to the support from IP routing and control protocols, its powerful and flexible routing functions allows it to accommodate to various emerging applications. This document describes: l LDP Overview l Configuring MPLS Basic Capability l Configuring Static LSP l Configuring MPLS LDP l Configuring LDP Instances l Configuring MPLS IP TTL Processing l Configuring MPLS Statistics |
MPLS L2VPN |
MPLS L2VPN provides Layer 2 VPN services on the MPLS network. This document describes: l MPLS L2VPN Overview l Configuring MPLS L2VPN l Configuring a PE Interface Connecting a CE l Configuring CCC MPLS L2VPN l Configuring SVC MPLS L2VPN l Configuring Martini MPLS L2VPN l Configuring Kompella MPLS L2VPN |
MPLS L3VPN |
MPLS L3VPN is a kind of PE-based L3VPN technology for service provider VPN solutions. This document describes: l MPLS L3VPN Overview l Configuring VPN Instances l Configuring Basic MPLS L3VPN l Configuring Inter-Provider VPN l Configuring Nested VPN l Configuring OSPF Sham Link l Configuring BGP AS Number Substitution |
QoS Volume
Table 3-6 Features in the QoS ACL volume
Features |
Description |
QoS |
This document describes: l QoS overview l Traffic classification configuration l Traffic policing Configuration l Traffic shaping Configuration l Line rate configuration l QoS policy configuration l Congestion avoidance configuration l Priority mapping configuration l QoS in an EPON system |
Security Volume
Table 3-7 Features in the Security volume
Features |
Description |
AAA |
Authentication, Authorization and Accounting (AAA) provide a uniform framework used for configuring these three security functions to implement the network security management. This document describes: l Introduction to AAA, RADIUS and HWTACACS l AAA configuration l RADIUS configuration l HWTACACS configuration |
802.1X |
IEEE 802.1X (hereinafter simplified as 802.1X) is a port-based network access control protocol that is used as the standard for LAN user access authentication. This document describes: l 802.1X overview l 802.1X configuration l 802.1X Guest-VLAN configuration |
MAC Authentication |
MAC authentication provides a way for authenticating users based on ports and MAC addresses; it requires no client software to be installed on the hosts. This document describes: |
Portal |
Portal authentication, as its name implies, helps control access to the Internet. This document describes: l Portal overview l Portal configuration |
Port Security |
Port security is a MAC address-based security mechanism for network access controlling. It is an extension to the existing 802.1X authentication and MAC authentication. This document describes: l Setting the Maximum Number of Secure MAC Addresses l Setting the Port Security Mode l Configuring Port Security Features |
IP Source Guard |
By filtering packets on a per-port basis, IP source guard prevents illegal packets from traveling through, thus improving the network security. This document describes: l Configuring a Static Binding Entry l Configuring Dynamic Binding Function |
SSH2.0 |
SSH ensures secure login to a remote device in a non-secure network environment. By encryption and strong authentication, it protects the device against attacks. This document describes: l Configuring the Device as an SSH Server |
ACL |
An ACL is used for identifying traffic based on a series of preset matching criteria. This document describes: l ACL overview and ACL types l ACL configuration |
System Volume
Table 3-8 Features in the System volume
Features |
Description |
Login |
Upon logging into a device, you can configure user interface properties and manage the system conveniently. This document describes: l How to log in to your Ethernet switch l Introduction to the user interface and common configurations l Logging In Through the Console Port l Logging In Through Telnet l Logging In Using Modem l Specifying Source IP address/Interface for Telnet Packets l Controlling Login Users |
Basic System Configuration |
Basic system configuration involves the configuration of device name, system clock, welcome message, and user privilege levels. This document describes: l Configuring the device name, the system clock and a Banner l Configuring CLI Hotkeys l Configuring User Privilege Levels and Command Levels l Introduction to CLI |
Device Management |
Through the device management function, you can view the current condition of your device and configure running parameters. This document describes: l Device management overview l Rebooting a device l Configuring the scheduled automatic execution function l Specifying a file for the next device boot l Upgrading Boot ROM l Configuring a detection interval l Configuring temperature alarm thresholds for a board l Clearing the 16-bit interface indexes not used in the current system l Configuring the system load sharing function l Configuring the traffic forwarding mode of SRPUs l Configuring the working mode of EA LPUs l Enabling the port down function globally l Enabling expansion memory data recovery function on a board l Identifying and diagnosing pluggable transceivers |
File System Management |
A major function of the file system is to manage storage devices, mainly including creating the file system, creating, deleting, modifying and renaming a file or a directory and opening a file. This document describes: l File system management l Configuration File Management l FTP configuration l TFTP configuration |
SNMP |
Simple network management protocol (SNMP) offers a framework to monitor network devices through TCP/IP protocol suite. This document describes: l SNMP overview |
RMON |
RMON provides an efficient means of monitoring subnets and allows SNMP to monitor remote network devices in a more proactive and effective way. This document describes: l RMON overview l RMON configuration (event group, history group, alarm group, private alarm group) |
MAC Address Table Management |
A switch maintains a MAC address table for fast forwarding packets. This document describes: l MAC address table overview l Configuring MAC Address Entries l Disabling Global MAC Address Learning l Disabling MAC Address Learning on an Ethernet Port or Port Group l Configuring MAC Address Aging Timer l Configuring the Maximum Number of MAC Addresses an Ethernet Port or a Port Group Can Learn |
System Maintenance and Debugging |
For the majority of protocols and features supported, the system provides corresponding debugging information to help users diagnose errors. This document describes: l Maintenance and debugging overview l Maintenance and debugging configuration |
Information Center |
As the system information hub, Information Center classifies and manages all types of system information. This document describes: l Information Center Overview l Setting to Output System Information to the Console l Setting to Output System Information to a Monitor Terminal l Setting to Output System Information to a Log Host l Setting to Output System Information to the Trap Buffer l Setting to Output System Information to the Log Buffer l Setting to Output System Information to the SNMP Module l Setting to Save System Information to a Log File l Configuring Synchronous Information Output |
PoE |
The Power over Ethernet (PoE) feature enables the power sourcing equipment (PSE) to feed powered devices (PDs) from Ethernet ports through twisted pair cables. This document describes: l PoE overview l Configuring PoE power supply l Configuring the PSE l Configuring the PoE interface l Configuring PoE power management l Configuring the PoE monitoring function l Online upgrading the PSE processing software l Enabling the PSE to detect nonstandard PDs |
Track |
The track module is used to implement collaboration between different modules through established collaboration objects. The detection modules trigger the application modules to perform certain operations through the track module. This document describes: l Configuring Collaboration Between the Track Module and the Detection Modules l Configuring Collaboration Between the Track Module and the Application Modules |
NQA |
NQA analyzes network performance, services and service quality by sending test packets to provide you with network performance and service quality parameters. This document describes: l Configuring an NQA Test Group l Configuring the Collaboration Function l Configuring Optional Parameters Common to an NQA Test Group |
NTP |
Network Time Protocol (NTP) is the TCP/IP that advertises the accurate time throughout the network. This document describes: l NTP overview l Configuring the Operation Modes of NTP l Configuring the Local Clock as a Reference Source l Configuring Optional Parameters of NTP l Configuring Access-Control Rights l Configuring NTP Authentication |
VRRP |
Virtual Router Redundancy Protocol (VRRP) combines a group of switches (including a master and multiple backups) on a LAN into a virtual router called VRRP group. VRRP streamlines host configuration while providing high reliability. This document describes: l VRRP overview l IPv4-Based VRRP configuration l IPv6-Based VRRP configuration |
HA |
High Availability (HA) is to achieve a high availability of the system. Devices supporting HA are typically equipped with two SRPUs to provide active-standby backup. This document describes: l HA overview l Restarting the SMB l Manually Configuring Switchover Between the AMB and SMB |
Hotfix |
Hotfix is a fast, cost-effective method to fix software defects of the device without interrupting the running services. This document describes: l Hotfix Overview l Hotfix Operations (including loading, activating, running, deactivating, and deleting patch files) |
Graceful Restart ensures the continuity of packet forwarding when a protocol restarts. This document describes: l Introduction to Graceful Restart l Basic Concepts in Graceful Restart l Graceful Restart Communication Procedure l Graceful Restart Mechanism for Several Commonly Used Protocols |