Configuration Fundamentals; Basic Configuration Procedures; Command Line Interface - H3C SecPath V1000-A Installation Manual

Table of Contents

Advertisement

Installation Manual
H3C SecPath V1000-A Security Gateway

4.2 Configuration Fundamentals

4.2.1 Basic Configuration Procedures

Following are the basic steps that you can follow to configure your security gateway:
Step 1: Figure out detailed networking requirements, including networking objectives,
the role of the security gateway in the network, transmission medium, security policy,
and network reliability.
Step 2: Draw a network topology based on the requirements.
Step 3: Configure IP addresses of the interfaces on the security gateway.
Step 4: Configure routes, and if a dynamic routing protocol is enabled, the parameters
related to the protocol.
Step 5: Configure security settings as required.
Step 6: Configure reliability settings as required.
For more information on the configuration of protocols and functions for the security
gateway, see the Operation Manual and Command Manual of the corresponding
product.

4.2.2 Command Line Interface

I. Features of the CLI
The CLI of the security gateway offers lots of configuration commands for you to
configure and manage the security gateway. The CLI allows you to:
Configure the device through the console port at the local.
Telnet to access and manage the local and remote devices.
Get online help whenever you enter <?>.
Test network connectivity quickly with network diagnostic tools, such as tracert
and ping.
Have detailed debugging information for network troubleshooting.
Enter a command by only entering the conflict-free keyword portion, because the
CLI interpreter supports fuzzy keyword search. For example, you simply need to
enter "dis" for the display command.
II. CLI
In system view, all the commands are put into several groups for the convenience of
management. You can switch between the views by executing the proper commands.
In normal circumstances, you can only execute the commands appropriate to the view
that you access. However, you are allowed to execute in any view some commands in
common use, such as ping, display current-configuration, and interface.
Chapter 4 Booting and Configuration
4-6

Advertisement

Table of Contents
loading

Table of Contents