H3C MSR1000[2600][3600] Routers Configuration Examples All-in-One-R9141-6W100

HomeSupportConfigure & DeployConfiguration ExamplesH3C MSR1000[2600][3600] Routers Configuration Examples All-in-One-R9141-6W100
Table of Contents
Related Documents
50-Small and Medium-Sized Store Configuration Examples

 

 

H3C Routers

Small and Medium-Sized Store Configuration Examples

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Copyright © 2024 New H3C Technologies Co., Ltd. All rights reserved.

No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd.

Except for the trademarks of New H3C Technologies Co., Ltd., any trademarks that may be mentioned in this document are the property of their respective owners.

The information in this document is subject to change without notice.



Introduction

The following information provides an example for using a router in small- to medium-sized store networking.

Prerequisites

The following information applies to Comware 9-based routers. Procedures and information in the examples might be slightly different depending on the software or hardware version of the router.

The configuration examples were created and verified in a lab environment, and all the devices were started with the factory default configuration. When you are working on a live network, make sure you understand the potential impact of every command on your network.

The following information is provided based on the assumption that you have basic knowledge of DHCP, WLAN, PPPoE, and NAT.

Example: Configuring router settings for small and medium-sized store networking

Network configuration

As shown in Figure 1, the networking requirements for a small to medium-sized store are as follows:

·     The router acts as a DHCP server, allocating IP addresses to APs, wireless clients, and wired hosts.

·     Users in the administration zone can access the Internet through wired and wireless connections. Wireless users in the zone access the WLAN using the PSK authentication and key management mode.

·     The router acts as both the portal authentication server and portal Web server. It offers wireless users in the access zone a direct method for portal authentication to access the Internet.

·     The router acts as the exit gateway for Internet access through PPPoE dial-up. It must support NAT for private network address translation.

Figure 1 Network diagram

Access zoneAdministration zoneAccess zoneAdministration zone

 

1.     Terminal VLAN and address pool resource planning

Device

Corresponding VLAN

DHCP address pool and network segment

AP

100

1: 192.168.100.0/24

Wireless clients in the administration zone

200

2: 192.168.200.0/24

Wired terminals in the administration zone

101

3: 192.168.101.0/24

Wireless clients in the access zone

201

4: 192.168.201.0/24

 

Software versions used

This configuration example was created and verified on R9141P16 of the MSR2630E-X1 router.

Analysis

·     On the router, configure the AP to obtain the IP address of the AC through Option 43 carried in the DHCP response to complete Layer 3 registration.

·     Configure the wireless AC server on the router to ensure that wireless clients can access the network through the configured wireless service.

·     Configure direct portal authentication service on the router for users to enter a username and password to complete portal authentication before accessing the network.

·     Configure route settings between routers, switches, and APs to enable network interoperability.

Restrictions and guidelines

Use the serial ID labeled on the AP's rear panel to specify an AP.

Procedures

Configuring the router

Configuring the DHCP server

# Enable the DHCP service.

<Router> system-view

[Router] dhcp enable

# Create VLAN 102 and VLAN-interface 102, and configure an IP address for the interface. The AP will obtain the IP address to establish a CAPWAP tunnel with the AC.

[Router] vlan 102

[Router-vlan102] quit

[Router] interface Vlan-interface 102

[Router-Vlan-interface102] ip address 10.1.1.1 24

# Configure VLAN-interface 102 to operate in DHCP server mode.

[Router-Vlan-interface102] dhcp select server

[Router-Vlan-interface102] quit

# Configure GigabitEthernet 0/0/1 as a trunk port, and configure the interface to allow VLAN 102 to pass.

[Router] interface gigabitethernet 0/0/1

[Router-GigabitEthernet0/0/1] port link-mode bridge

[Router-GigabitEthernet0/0/1] port link-type trunk

[Router-GigabitEthernet0/0/1] port trunk permit vlan 102

[Router-GigabitEthernet0/0/1] quit

# Create VLANs 200 and 201 for wireless clients to access the wireless network. Configure the IP addresses for VLAN-interface 200 and VLAN-interface 201.

[Router] vlan 200

[Router-vlan200] quit

[Router] interface vlan-interface 200

[Router-Vlan-interface101] ip address 192.168.200.1 24

[Router-Vlan-interface101] quit

[Router] vlan 201

[Router-vlan201] quit

[Router] interface vlan-interface 201

[Router-Vlan-interface201] ip address 192.168.201.1 24

[Router-Vlan-interface201] quit

# Configure DHCP address pool 1 to allocate addresses in subnet 192.168.100.0/24 for APs, with the gateway address set to 192.168.100.1.

[Router] dhcp server ip-pool 1

[Router-dhcp-pool-1] network 192.168.100.0 mask 255.255.255.0

[Router-dhcp-pool-1] gateway-list 192.168.100.1

# Specify the hexadecimal IP address of the router as the content of DHCP Option 43.

[Router-dhcp-pool-1] option 43 hex 80070000010a010101

[Router-dhcp-pool-1] quit

# Configure DHCP address pool 2 to allocate addresses in subnet 192.168.200.0/24 for wireless clients in the administration zone, with the gateway address set to 192.168.200.1.

[Router] dhcp server ip-pool 2

[Router-dhcp-pool-2] network 192.168.200.0 mask 255.255.255.0

[Router-dhcp-pool-2] gateway-list 192.168.200.1

[Router-dhcp-pool-2] quit

# Configure DHCP address pool 3 to allocate addresses in subnet 192.168.101.0/24 for wired terminals in the administration zone, with the gateway address set to 192.168.101.1.

[Router] dhcp server ip-pool 3

[Router-dhcp-pool-3] network 192.168.101.0 mask 255.255.255.0

[Router-dhcp-pool-3] gateway-list 192.168.101.1

[Router-dhcp-pool-3] quit

# Configure DHCP address pool 4 to allocate addresses in subnet 192.168.201.0/24 for wireless clients in the access zone, with the gateway address set to 192.168.201.1.

[Router] dhcp server ip-pool 4

[Router-dhcp-pool-4] network 192.168.201.0 mask 255.255.255.0

[Router-dhcp-pool-4] gateway-list 192.168.201.1

[Router-dhcp-pool-4] quit

# Configure static routes to each client network segment.

[Router] ip route-static 192.168.100.0 24 10.1.1.2

[Router] ip route-static 192.168.101.0 24 10.1.1.2

Configuring the AC

Table 1 Configure wireless service 1 for the administration zone

# Create wireless service template 1 and enter its view.

[Router] wlan service-template 1

# Set the SSID to employee.

[Router-wlan-st-1] ssid employee

# Specify the authentication and key management mode as PSK and set the PSK key to plaintext string 12345678.

[Router-wlan-st-1] akm mode psk

[Router-wlan-st-1] preshared-key pass-phrase simple 12345678

# Specify the cipher suite as CCMP and the security IE as RSN.

[Router-wlan-st-1] cipher-suite ccmp

[Router-wlan-st-1] security-ie rsn

# Specify the AC as the client data forwarder. You can skip this step if the AC is the default client data forwarder.

[Router-wlan-st-1] client forwarding-location ac

# Enable wireless service template 1.

[Router–wlan-st-1] service-template enable

[Router-wlan-st-1] quit

Table 2 Configure service template 2 for the access zone

# Create wireless service template 2 and enter its view.

[Router] wlan service-template 2

# Set the SSID to guest.

[Router-wlan-st-2] ssid guest

# Specify the AC as the client data forwarder. You can skip this step if the AC is the default client data forwarder.

[Router-wlan-st-1] client forwarding-location ac

# Enable wireless service template 2.

[Router–wlan-st-2] service-template enable

[Router-wlan-st-2] quit

Table 3 Configure the AP in the administrator zone

# Create an AP named ap1 and specify the AP model.

[Router] wlan ap ap1 model WA4320H

# Set the AP serial number to 219801A0YG819BE005JC.

[Router-wlan-ap-ap1] serial-id 219801A0YG819BE005JC

# Enter radio view of radio 1 on AP ap1, bind wireless service template 1 to radio 1, and configure clients coming online from the radio to join VLAN 200.

[Router-wlan-ap-ap1] radio 1

[Router-wlan-ap-ap1-radio-1] service-template 1 vlan 200

# Enable radio 1.

[Router-wlan-ap-ap1-radio-1] radio enable

[Router-wlan-ap-ap1-radio-1] return

Table 4 Configure the AP group for the access zone

# Create AP ap2 and AP ap3, and specify the AP models and serial numbers.

<Router> system-view

[Router] wlan ap ap2 model WA4320H

[Router-wlan-ap-ap2] serial-id 219801A0YG8198E0064J

[Router-wlan-ap-ap2] quit

[Router] wlan ap ap3 model WA4320H

[Router-wlan-ap-ap3] serial-id 219801A0YG8198E0078C

[Router-wlan-ap-ap3] quit

# Create AP group group1 and add APs ap2 and ap3 to the group.

[Router] wlan ap-group group1

[Router-wlan-ap-group-group1] ap ap2 ap3

# Bind wireless service template 2 to radio 2 on APs in AP group group1, and configure clients coming online from the radio to join VLAN 201.

[Router-wlan-ap-group-group1] ap-model WA4320H

[Router-wlan-ap-group-group1-ap-model-WA4320H] radio 2

[Router-wlan-ap-group-group1-ap-model-WA4320H-radio-2] service-template 2 vlan 201

# Enable radio 1.

[Router-wlan-ap-group-group1-ap-model-WA4320H-radio-2] radio enable

[Router-wlan-ap-group-group1-ap-model-WA4320H-radio-2] return

Configuring the portal authentication server and portal Web server

Table 1 Configuring AAA

# Create an ISP domain named dm1 and enter its view.

<Router> system-view

[Router] domain dm1

# Set the AAA authentication method to local for portal users.

[Router-isp-dm1] authentication portal local

# Set the AAA authorization method for portal users to none.

[Router-isp-dm1] authorization portal none

# Set the AAA accounting method for portal users to none.

[Router-isp-dm1] accounting portal none

Set the idle timeout for users in the ISP domain dm1 to 15 minutes and the minimum traffic to 1024 bytes.

[Router-isp-dm1] authorization-attribute idle-cut 15 1024

[Router-isp-dm1] quit

Table 2 Configure portal authentication

# Specify the URL of the portal Web server as http://192.168.201.1/portal.

[Router] portal web-server newpt

[Router-portal-websvr-newpt] url http://192.168.201.1/portal

[Router-portal-websvr-newpt] quit

# Configure two destination-based portal authentication-free rules to allow traffic to the DNS server.

[Router] portal free-rule 1 destination ip any udp 53

[Router] portal free-rule 2 destination ip any tcp 53

# Enable direct portal authentication on wireless service template 2.

[Router] wlan service-template 2

[Router–wlan-st-2] portal enable method direct

# Apply portal Web server newpt to wireless service template 2.

[Router–wlan-st-2] portal apply web-server newpt

[Router–wlan-st-2] quit

# Create an HTTP-based local portal Web service and enter its view.

[Router] portal local-web-server http

# Configure the local portal Web server to use the default authentication paging file bendi.zip. Make sure the file already exist in the root directory of the device storage media.

[Router–portal-local-websvr-http] default-logon-page bendi.zip

[Router–portal-local-websvr-http] quit

# Configure the username and password for local portal authentication.

[Router] local-user guest class network

[Router-luser-network-guest] password simple abc123

[Router-luser-network-guest] service-type portal

[Router-luser-network-guest] quit

# Enable intra-VLAN roaming for portal users.

[Router] portal roaming enable

# Disable the Rule ARP entry feature for portal clients.

[Router] undo portal refresh arp enable

# Enable validity check on wireless portal clients.

[Router] portal host-check enable

Configuring PPPoE dial-up for Internet access

# Create dialer group 1.

[Router] dialer-group 1 rule ip permit

# Create a dialer interface, and configure dialer parameters, IP address negotiation, and PAP authentication.

[Router] interface dialer 0

[Router-Dialer0] dialer bundle enable

[Router-Dialer0] dialer-group 1

[Router-Dialer0] ip address ppp-negotiate

[Router-Dialer0] ppp pap local-user aaa password simple abc123

[Router-Dialer0] quit

# Configure a PPPoE session corresponding to Dialer bundle 1 on GigabitEthernet 0/0/2.

[Router] interface gigabitethernet 0/0/2

[Router-GigabitEthernet0/0/2] pppoe-client dial-bundle-number 1

[Router-GigabitEthernet0/0/2] quit

Configuring NAT

# Configure NAT.

[Router] interface dialer 0

[Router-Dialer0] nat outbound

[Router-Dialer0] quit

# Configure a default static route with egress interface Dialer0.

[Router] ip route-static 0.0.0.0 0 Dialer0

[Router] quit

Configuring the switch

Table 3 Configure VLANs and VLAN interfaces.

<Sysname> system-view

[Switch] vlan 100

[Switch-vlan100] quit

[Switch] interface vlan-interface 100

[Switch-Vlan-interface100] ip address 192.168.100.1 24

[Switch-Vlan-interface100] quit

[Switch] vlan 101

[Switch] interface vlan-interface 101

[Switch-Vlan-interface101] ip address 192.168.101.1 24

[Switch-Vlan-interface101] quit

[Switch] vlan 102

[Switch-vlan102] quit

[Switch] interface vlan-interface 102

[Switch-Vlan-interface102] ip address 10.1.1.2 24

[Switch-Vlan-interface102] quit

Table 4 Configure GigabitEthernet 0/0/1 connecting the switch to the router as a trunk port and allow VLAN 102 to pass.

[Switch] interface gigabitethernet 0/0/1

[Switch-GigabitEthernet0/0/1] port link-type trunk

[Switch-GigabitEthernet0/0/1] port trunk permit vlan 102

[Switch-GigabitEthernet0/0/1] quit

Table 5 Configure GigabitEthernet 0/0/2 connecting the switch to wired terminals in the administration zone as an access port and add the port to VLAN 101.

[Switch] interface gigabitethernet 0/0/2

[Switch-GigabitEthernet0/0/2] port link-type access

[Switch-GigabitEthernet0/0/2] port access vlan 101

[Switch-GigabitEthernet0/0/2] quit

Table 6 # Configure GigabitEthernet 0/0/3 connecting the switch to APs in the administration zone as a trunk port, block VLAN 1, and allow VLAN 100 to pass.

[Switch] interface gigabitethernet 0/0/3

[Switch-GigabitEthernet0/0/3] port link-type trunk

[Switch-GigabitEthernet0/0/3] undo port trunk permit vlan 1

[Switch-GigabitEthernet0/0/3] port trunk permit vlan 100

[Switch-GigabitEthernet0/0/3] port trunk pvid vlan 100

[Switch-GigabitEthernet0/0/3] quit

Table 7 Configure GigabitEthernet 0/0/4 and GigabitEthernet 0/0/5 as trunk ports, block VLAN 1, and allow VLAN 100 to pass.

[Switch] interface gigabitethernet 0/0/4

[Switch-GigabitEthernet0/0/4] port link-type trunk

[Switch-GigabitEthernet0/0/4] undo port trunk permit vlan 1

[Switch-GigabitEthernet0/0/4] port trunk permit vlan 100

[Switch-GigabitEthernet0/0/4] port trunk pvid vlan 100

[Switch-GigabitEthernet0/0/4] quit

[Switch] interface gigabitethernet 0/0/5

[Switch-GigabitEthernet0/0/5] port link-type trunk

[Switch-GigabitEthernet0/0/5] undo port trunk permit vlan 1

[Switch-GigabitEthernet0/0/5] port trunk permit vlan 100

[Switch-GigabitEthernet0/0/5] port trunk pvid vlan 100

[Switch-GigabitEthernet0/0/5] quit

Table 8 Configure the switch to act as a DHCP relay and specify IP address 10.1.1.1 of the router as the DHCP server address.

[Switch] dhcp enable

[Switch] interface vlan-interface 100

[Switch-Vlan-interface100] dhcp select relay

[Switch-Vlan-interface100] dhcp relay server-address 10.1.1.1

[Switch-Vlan-interface100] quit

[Switch] interface vlan-interface 101

[Switch-Vlan-interface101] dhcp select relay

[Switch-Vlan-interface101] dhcp relay server-address 10.1.1.1

[Switch-Vlan-interface101] quit

Table 9 Configure a default route.

[Switch] ip route-static 0.0.0.0 0 10.1.1.1

Verifying the configuration

Table 1 View the IP address allocation information for the address pool on the router.

<Router> display dhcp server ip-in-use

IP address       Client identifier/    Lease expiration      Type

                 Hardware address

192.168.100.2    0194-292f-9314-c0     Sep  2 15:32:28 2022  Auto(C)

192.168.100.3    0154-2bde-fd4b-a0     Sep  2 15:32:30 2022  Auto(C)

192.168.100.4    0102-6121-250c-0e     Sep  2 15:32:30 2022  Auto(C)

192.168.101.2    0035-6361-352e-6339-  Sep  2 15:58:42 2022  Auto(C)

                 6330-2e30-3330-362d-

                 4745-302f-302f-31

192.168.200.2    018e-7170-24dd-21     Sep  2 15:45:13 2022  Auto(C)

192.168.201.2    011a-95ad-b5a7-08     Sep  2 15:44:57 2022  Auto(C)

192.168.201.3    0112-2016-7f1b-01     Sep  2 15:44:16 2022  Auto(C)

Table 2 View the AP registration information on the AC.

# Verify that the AP state is R/M, which indicates that the AP has been successfully registered with the AC.

<Router> display wlan ap all

Total number of APs: 3

Total number of connected APs: 3

Total number of connected manual APs: 3

Total number of connected auto APs: 0

Total number of connected common APs: 3

Total number of connected WTUs: 0

Total number of inside APs: 0

Maximum supported APs: 16

Remaining APs: 13

Total AP licenses: 128

Local AP licenses: 128

Server AP licenses: 0

Remaining Local AP licenses: 125

Sync AP licenses: 0

 

                                 AP information

 State : I = Idle,      J  = Join,       JA = JoinAck,    IL = ImageLoad

         C = Config,    DC = DataCheck,  R  = Run,   M = Master,  B = Backup

 

AP name                        APID  State Model           Serial ID

ap1                            1     R/M   WA4320H         219801A0YG819BE005JC

ap2                            2     R/M   WA4320H         219801A0YG8198E0064J

ap3                            3     R/M   WA4320H         219801A0YG8198E0078C

Table 3 View client information on the AC.

# Verify that the client has come online from radio 1.

<Router> display wlan client

Total number of clients: 3

 

MAC address    User name            AP name               R IP address      VLAN

8e71-7024-dd21 N/A                  ap1                   1 192.168.200.2   200

1a95-adb5-a708 N/A                  ap2                   2 192.168.201.2   201

1220-167f-1b01 N/A                  ap2                   2 192.168.201.3   201

Table 4 Verify that the wireless client has obtained an IP address and come online.

Use a wireless client in the administration zone as an example:

 

Table 5 Verify that users in the access zone can perform portal authentication through a Web page. Before authentication, all web access initiated by a user is redirected to the portal authentication page (http://192.168.201.1/portal), as shown in the figure below:

 

A user must enter the username and password manually at the first-time portal authentication. For subsequent network access, the user can directly access Internet resources without noticing the portal authentication process.

View the information about online portal users generated on the router.

<Router> display portal user all

Total portal users: 2

Username: guest

  AP name: ap2

  Radio ID: 2

  SSID: guest

  Portal server: N/A

  State: Online

  VPN instance: N/A

  MAC             IP                    VLAN    Interface

  1a95-adb5-a708  192.168.201.2         201     WLAN-BSS0/4

  Authorization information:

    DHCP IP pool: N/A

    User profile: N/A

    Session group profile: N/A

    ACL number/name: N/A

    Inbound CAR: N/A

    Outbound CAR: N/A

 

Username: guest

  AP name: ap2

  Radio ID: 2

  SSID: guest

  Portal server: N/A

  State: Online

  VPN instance: N/A

  MAC             IP                    VLAN    Interface

  1220-167f-1b01  192.168.201.3         201     WLAN-BSS0/4

  Authorization information:

    DHCP IP pool: N/A

    User profile: N/A

    Session group profile: N/A

    ACL number/name: N/A

    Inbound CAR: N/A

    Outbound CAR: N/A

Configuration files

·     Router

#

 dhcp enable

#

vlan 102

#

vlan 200 to 201

#

dhcp server ip-pool 1

 gateway-list 192.168.100.1

 network 192.168.100.0 mask 255.255.255.0

 option 43 hex 80070000010a010101

#

dhcp server ip-pool 2

 gateway-list 192.168.200.1

 network 192.168.200.0 mask 255.255.255.0

#

dhcp server ip-pool 3

 gateway-list 192.168.101.1

 network 192.168.101.0 mask 255.255.255.0

#

dhcp server ip-pool 4

 gateway-list 192.168.201.1

 network 192.168.201.0 mask 255.255.255.0

#

wlan service-template 1

 ssid employee

 akm mode psk

 preshared-key pass-phrase cipher $c$3$mczcUlpjginwHwJ3vABq97tR3kLdRI823mKv

 cipher-suite ccmp

 security-ie rsn

 service-template enable

#

wlan service-template 2

 ssid guest

 portal enable method direct

 portal apply web-server newpt

 service-template enable

#

interface Dialer0

 ppp pap local-user h3c password cipher $c$3$Z3pvO6H0my2Z6Yq5QfmoMO5SrTDn7A==

 dialer bundle enable

 dialer-group 1

 ip address ppp-negotiate

 nat outbound

#

interface Vlan-interface102

 ip address 10.1.1.1 255.255.255.0

#

interface Vlan-interface200

 ip address 192.168.200.1 255.255.255.0

#

interface Vlan-interface201

 ip address 192.168.201.1 255.255.255.0

#

interface GigabitEthernet0/0/2

 port link-mode route

 pppoe-client dial-bundle-number 1

#

interface GigabitEthernet0/0/1

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan 102

#

 ip route-static 0.0.0.0 0 Dialer0

 ip route-static 192.168.100.0 24 10.1.1.2

 ip route-static 192.168.101.0 24 10.1.1.2

#

domain dm1

 authorization-attribute idle-cut 15 1024

 authentication portal local

 authorization portal none

 accounting portal none

#

local-user guest class network

 password cipher $c$3$N+s6HOuF0o1QxOe48Ly+kHVQrT21UBXNgA==

 service-type portal

#

 portal host-check enable

 portal free-rule 1 destination ip any udp 53

 portal free-rule 2 destination ip any tcp 53

#

portal web-server newpt

 url http://192.168.201.1:8080/portal

#

portal local-web-server http

 default-logon-page bendi.zip

#

wlan ap-group group1

wlan ap-group group1

 vlan 1

 ap ap2

 ap ap3

 ap-model WA4320H

  radio 1

  radio 2

   radio enable

   service-template 2 vlan 201

#

wlan ap ap1 model WA4320H

 serial-id 219801A0YG819BE005JC

 vlan 1

 radio 1

  radio enable

  service-template 1 vlan 200

 radio 2

#

wlan ap ap2 model WA4320H

 serial-id 219801A0YG819BE0064J

 vlan 1

 radio 1

 radio 2

#

wlan ap ap3 model WA4320H

 serial-id 219801A0YG819BE0078C

 vlan 1

 radio 1

 radio 2

#

·     Switch

#

dhcp enable

#

vlan 100 to 102

#

interface Vlan-interface100

 ip address 192.168.100.1 255.255.255.0

 dhcp select relay

 dhcp relay server-address 10.1.1.1

#

interface Vlan-interface101

 ip address 192.168.101.1 255.255.255.0

 dhcp select relay

 dhcp relay server-address 10.1.1.1

#

interface Vlan-interface102

 ip address 10.1.1.2 255.255.255.0

#

interface GigabitEthernet0/0/1

 port link-mode bridge

 port link-type trunk

 port trunk permit vlan 102

#

interface GigabitEthernet0/0/2

 port link-mode bridge

 port access vlan 101

#

interface GigabitEthernet0/0/3

 port link-mode bridge

 port link-type trunk

 undo port trunk permit vlan 1

 port trunk permit vlan 100

 port trunk pvid vlan 100

#

interface GigabitEthernet0/0/4

 port link-mode bridge

 port link-type trunk

 undo port trunk permit vlan 1

 port trunk permit vlan 100

 port trunk pvid vlan 100

#

interface GigabitEthernet0/3

 port link-mode bridge

 port link-type trunk

 undo port trunk permit vlan 1

 port trunk permit vlan 100

 port trunk pvid vlan 100

#

ip route-static 0.0.0.0 0 10.1.1.1

#

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网