Sign In
Upload
Manuals
Brands
H3C Manuals
Firewall
H3C SecPath F1800-A
H3C H3C SecPath F1800-A Manuals
Manuals and User Guides for H3C H3C SecPath F1800-A. We have
3
H3C H3C SecPath F1800-A manuals available for free PDF download: Operation Manual, Installation Manual
H3C H3C SecPath F1800-A Operation Manual (626 pages)
H3C SecPath F1800-A Firewall
Brand:
H3C
| Category:
Firewall
| Size: 4 MB
Table of Contents
Table of Contents
6
About this Manual
3
Chapter 1 Firewall Overview
8
Overview of Network Security
8
Security Threats
8
Classification of Network Security Services
9
Implementation of Network Security Services
9
Overview of Firewall System
12
Evolution of the Firewall
12
First Safeguard
12
Overview of the Secpath F1800-A
14
Overview of the Secpath F1800-A
15
Function Features List of the Secpath F1800-A
16
Chapter 2 Basic Secpath F1800-A Configuration
19
Establishment of Configuration Environment through the Console Interface
19
Establishing Configuration Environment
19
Configuring Successful Ping between a Device and a Secpath F1800-A
22
Configuring Successful Ping between Two Devices Across a Secpath F1800-A
24
Establishment of Configuration Environment by Other Means
26
Establishment through the aux Interface
26
Establishment through Telnet
28
Establishment through SSH
31
Command-Line Interface Management
32
Command-Line Level
32
Command-Line View
33
Online Help of Command Line
44
Error Information of Command Line
45
History Commands
46
Display Feature
47
Edition Feature
47
Hotkey
48
Basic Configuration of the Secpath F1800-A
51
Changing Language Mode
51
Defining the Secpath F1800-A Name
51
Entering and Quitting System View
51
Configuring Command Privilege Level
52
Configuring System Clock
52
Displaying System Status Information
53
User Management
54
Overview of User Management
54
User Management Configuration
56
User Login Information Configuration
58
Typical Examples of Configuration
60
User Interface
60
User Interface Overview
60
Entering User Interface View
61
Configuring Asynchronous Interface Attributes
62
Configuring Terminal Attributes
64
Configuring Modem Attributes
65
Configuring Redirection
65
Configuring Call-In or Call-Out Restriction on VTY User Interface
67
Displaying and Debugging User Interface
67
Terminal Service
68
Configuring Terminal Service on the aux Port
68
Configuring Terminal Service on the Console Interface
68
Configuring Telnet Terminal Service
69
Configuring SSH Terminal Service
72
Chapter 3 Working Mode
78
Working Mode Overview
78
Introduction to Working Mode
78
Working Process of Route Mode
80
Working Process of Transparent Mode
81
Working Process of Composite Mode
85
Route Mode Configuration
85
Configuring the Secpath F1800-A to Work in Route Mode
85
Setting Other Parameters in Route Mode
86
Transparent Mode Configuration
86
Configuring Address Entries
86
Configuring Transparent Mode for the Secpath F1800-A
86
Configuring Processing Mode of IP Packets with Unknown MAC Address
87
Setting Aging Time of MAC Address Forwarding Table
87
Composite Mode Configuration
88
Configuring the Secpath F1800-A to Work in Composite Mode
88
Setting Other Parameters in Composite Mode
88
Displaying and Debugging Firewall Working Mode
88
Typical Example for Configuring Firewall Working Mode
89
Processing IP Packet with Unknown MAC Address
89
Connecting Multiple Lans with the Secpath F1800-A in Transparent Mode
90
System Maintenance Management/File Management
91
Chapter 1 System Maintenance Management
94
Content and Format of Configuration File
94
Displaying Current Configuration and Initial Configuration of the Firewall
94
Introduction to System Maintenance Management
94
Modifying and Saving the Current Configuration
95
Resetting the Configuration File
95
Configuring File Usage
96
Configuring Firewall Name and System Clock
97
Maintenance Debugging
97
Using Regular Expressions for Information Display
97
System Status Information Collection
100
Test Tool for Network Connection
100
Displaying Patch Software Upgrade
104
Patch Software Upgrade
104
Configuring Information Center
105
Information Center
105
Introduction to Information Center
105
Displaying Terminal Configuration
110
Introduction to Log
113
Log Maintenance
113
Binary Flow Log Configuration
114
Displaying and Debugging Log
115
Typical Examples for Configuring Log
115
Configuration File Management
94
Chapter 2 File Management
119
Directory Operation
119
File Operation
119
File System
119
Introduction to File System
119
File System Prompt Mode
120
Storage Device Operation
120
Ftp Configuration
121
Introduction to Ftp
121
Configuring the Ftp Server
122
Displaying and Debugging the Ftp Server
123
Typical Example for Configuring Ftp Connection
123
Introduction to Tftp
127
Tftp Configuration
127
Configuring Tftp
128
Chapter 3 Ntp Configuration
131
Introduction to Ntp
131
Configuring Ntp
132
Configuring Ntp Working Mode
132
Configuring Ntp Authentication
136
Configuring Ntp Authentication Key
136
Configuring Specified Key as Reliable
136
Configuring the Interface through Which Ntp Packets Are Sent
136
Configuring Ntp Master Clock
137
Enabling or Disabling the Interface to Receive Ntp Packets
137
Configuring Access Control Right for Local Firewall Service
138
Configuring the Number of Allowed Sessions
138
Displaying and Debugging Ntp
138
Configuring the Ntp Server
139
Typical Example for Configuring Ntp
139
Configuring Ntp Peer Mode
140
Configuring Ntp Broadcast Mode
142
Configuring Ntp Multicast Mode
143
Configuring Ntp Server Mode with Authentication
145
Chapter 4 Snmp Configuration
147
Introduction to Snmp
147
Snmp Versions and Mib
147
Snmp Configuration
149
Enabling or Disabling Snmp Agent Service
149
Configuring a Community Name
150
Configuring an Snmp Group
150
Enabling or Disabling Snmp Version
150
Adding a User to an Snmp Group
151
Configuring Syscontact
151
Enabling or Disabling Sending the Trap Packet
152
Setting Engine ID for the Local Device
152
Assigning the Address to the Host Receiving the Trap Packet
153
Configuring Syslocation
153
Creating or Updating View Information
153
Specifying the Source Address to Send the Trap Packet
153
Setting Length of a Message Queue Containing the Trap Packet
154
Setting Maximum Size of Snmp Messages Received by or Sent from Agent
154
Setting Saving Time for the Trap Packet
154
Displaying and Debugging Snmp
155
Typical Example for Configuring the Snmp
155
Table of Contents
158
Chapter 1 Interface Configuration Overview
160
Configuring Interfaces
161
Entering Interface View
161
Exiting Interface View
161
Setting Interface Description
161
Viewing All the Commands
161
Setting Advanced Parameters for Interfaces
162
Shutting down an Interface
162
Displaying and Debugging Interfaces
163
Interface Overview
160
Chapter 2 Ethernet Interface Configuration
164
Configuring the Ethernet Interface
164
Assigning the Ip Address to the Ethernet Interface
165
Configuring Static Arp Mapping Item
165
Entering Ethernet Interface View
165
Setting Mtu of the Ethernet Interface
166
Setting Operating Rate of the Ethernet Interface
166
Configuring Duplex Operating Mode of the Ethernet Interface
167
Configuring Loopback Mode
167
Configuring Flow Control Mode
168
Disabling or Enabling an Interface
168
Switching Interface Modes
168
Displaying and Debugging the Ethernet Interface
169
Typical Example for Configuring an Ethernet Interface
169
Troubleshooting the Ethernet Interface
170
Chapter 3 Aux Interface Configuration
172
Configuring the aux Interface
172
Configuring Link Establishment Mode
172
Entering aux Interface View
172
Configuring Level Detection
173
Configuring Loopback
173
Setting Link Layer Protocol Type
174
Chapter 4 Virtual Interface Configuration
175
Configuring Ethernet Sub-Interfaces
176
Virtual Template Interface and Virtual Access Interface
177
Configuring the Virtual Template Interface
177
Displaying and Debugging the Virtual Template Interface
180
Troubleshooting the Virtual Template Interface
180
Typical Example for Configuring the Virtual Template Interface
180
Loopback Interface
181
Configuring the Loopback Interface
181
Displaying and Debugging the Loopback Interface
181
Typical Example for Configuring the Loopback Interface
182
Null Interface
182
Configuring the Null Interface
182
Displaying and Debugging the Null Interface
182
Typical Example for Configuring the Null Interface
183
Table of Contents
184
Chapter 1 Vlan Configuration
186
Introduction to Vlan
186
The Potential Problems in Lan Interconnecting
186
Why Using Vlan
187
Vlan Aggregation
188
Configuring Vlan
189
Adding a Port
190
Creating a Vlan and Entering Vlan View
190
Creating an Ethernet Sub-Interface
190
Entering Vlan Interface View When a Vlan Is Created
190
Configuring a Trunk Port
191
Setting Sub-Interface Encapsulation Type and Related Vlan ID
191
Displaying and Debugging Vlan
191
Typical Example for Configuring Vlan
192
Chapter 2 Ppp Configuration
195
Ppp Overview
195
Configuring Ppp
197
Configuring Link Layer Protocol for Interface Encapsulation as Ppp
197
Setting Polling Interval
197
Setting Ppp Authentication Mode User Name and User Password
198
Configuring Ppp Authentication Mode of Aaa
200
Setting Ppp Negotiation Parameters
200
Configuring Ppp Compression
201
Configuring Ppp Link Quality Monitoring
201
Configuring Callback
202
Configuring the Dialing String Needed for Firewall Callback
202
Configuring Dns Address Negotiation
203
Configuring Vj Tcp Header Compression
203
Displaying and Debugging Ppp
204
Typical Example for Configuring Ppp
204
Pap Authentication Example
204
Chap Authentication Example
205
Troubleshooting Ppp
205
Chapter 3 Pppoe Configuration
207
Pppoe Overview
207
Introduction to Pppoe Application
207
Introduction to the Pppoe Protocol
207
Pppoe Server Configuration
208
Enabling or Disabling Pppoe
208
Setting Pppoe Parameters
209
Configuring Pppoe Client
209
Configuring a Dialer Interface
209
Configuring a Pppoe Session
210
Resetting or Deleting a Pppoe Session
211
Displaying and Debugging Pppoe
211
Typical Examples for Configuring Pppoe
212
IP Routing Protocol Overview
214
Ip Address Overview
218
Assigning Ip Addresses
222
Assigning Ip Addresses to Interfaces
222
Displaying and Debugging the Ip Address
224
Typical Example for Assigning the Ip Address
224
Configuring Arp
225
Introduction to Dynamical Arp
225
Introduction to Static Arp
225
Introduction to Arp Proxy
226
Configuring Arp Proxy
228
Configuring Static Arp
228
Displaying and Debugging Arp
228
Troubleshooting
225
Configuring Dns
229
Dns Overview
229
Configuring Static Domain Name Resolution
230
Dhcp Relay
231
Introduction to Dhcp Relay
231
Configuring Dhcp Relay
232
Displaying and Debugging Dhcp Relay
233
Example for Configuring Dhcp Relay
234
Troubleshooting Dhcp Relay
235
Configuring Ip Performance
235
Setting Mtu
235
Setting Tcp Attributes
235
Displaying and Debugging Ip Performance
236
Troubleshooting Ip Performance
237
Chapter 2 Ip Routing Protocol Overview
240
Introduction to Ip Route and Routing Table
240
Ip Route and Route Segment
240
Routing through the Routing Table
241
Routing Management Policy
242
Routing Protocols and the Preferences of the Discovered Routes
243
Supporting Load Balancing and Route Backup
243
Routes Shared between Routing Protocols
244
Routing Function of the Secpath F1800-A
244
Chapter 3 Static Route Configuration
246
Attributes and Functions of Static Route
246
Default Route
246
Introduction to Static Route
246
Configuring a Default Route
247
Configuring a Static Route
247
Configuring Static Route
247
Displaying and Debugging the Routing Table
247
Typical Example for Configuring Static Route
248
Troubleshooting Static Route
249
Chapter 4 Rip Configuration
250
Rip Operating Principle
250
Rip Overview
250
Configuring Rip
251
Rip Startup and Operation
251
Enabling Rip and Entering Rip View
252
Enabling Rip Interface
252
Configuring Unicast of a Packet
253
Specifying Rip Version of an Interface
253
Configuring Zero Field Checking over Interface Packets
254
Specifying the Operating State of the Interface
254
Configuring Rip Packet Authentication
255
Configuring Route Aggregation
255
Disabling Host Route
255
Configuring Split Horizon
256
Configuring Default Routing Metric
257
Importing Routes of Other Protocols
257
Setting the Rip Preference
257
Configuring Rip Timer
258
Configuring Additional Metric
259
Configuring Route Filtering
259
Displaying and Debugging Rip
260
Configuring the Operating State of the Specified Interface
261
Typical Example for Configuring Rip
261
Troubleshooting Rip
262
Ospf Overview
263
Chapter 5 Ospf Configuration
263
Introduction to Ospf
263
Process of Ospf Route Calculation
263
Basic Concepts Related to Ospf
264
Ospf Packets
266
Types of Ospf Lsas
267
Ospf Features Supported by Vrp
268
Configuring Ospf
268
Setting Router ID
269
Enabling Ospf Process
270
Entering Ospf Area View
270
Configuring Ospf Virtual Link
271
Enabling Ospf on the Specified Network Segment
271
Setting the Network Type on the Ospf
272
Configuring the Adjacent Point
273
Configuring Ospf to Import Routes
274
Configuring Ospf Route Filtering
276
Configuring the Route Aggregation of Ospf
277
Configuring Ospf Timer
278
Setting Ospf Route Preference
278
Setting the Priority for Dr Election
280
Setting an Interval Required for Sending Lsu Packets
281
Setting Spf Calculation Interval for Ospf
281
Setting the Cost for Sending Packets on an Interface
281
Configuring Ospf Authentication
282
Disabling the Interface to Send Ospf Packets
283
Configuring Stub Area of Ospf
284
Setting Nssa Area Parameter of Ospf
285
Configuring Cooperation with Network Management System
286
Enabling Opaque Capability of Ospf
286
Resetting an Ospf Process
287
Displaying and Debugging Ospf
288
Typical Examples for Configuring Ospf
289
Configuring Ospf Multi-Process
289
Configuring Dr Election Based on Ospf Priority
291
Configuring Virtual Link
293
Configuring Ospf Peer Authentication
294
Troubleshooting Ospf
296
Chapter 6 Bgp/Mbgp Configuration
298
Bgp/Mbgp Overview
298
Introduction to Bgp
298
Message Types of Bgp
299
Route Mechanism of Bgp
299
Bgp Peer and Peer Group
301
Configuring Bgp
302
Enabling Bgp
303
Entering Extended Address Family View
303
Configuring Basic Features of Bgp Peer
304
Configuring Bgp Multiple Instances
304
Configuring Application Features of Bgp Peer
307
Configuring Route Filtering of Bgp Peer
311
Configuring Network Routes Advertised by Bgp
313
Configuring the Interaction between Bgp and Igp
313
Configuring Bgp Route Aggregation
314
Configuring Bgp Route Filtering
314
Configuring Bgp Route Dampening
316
Setting the Bgp Preference
316
Configuring the Bgp Timer
317
Configuring the Local Preference
317
Comparing Med Routing Costs from the Peers in Different Ass
318
Setting Med for as
318
Setting Bgp as Confederation Attribute
322
Configuring Bgp Route Refresh
324
Resetting Bgp Connection
324
Displaying and Debugging Bgp
325
Typical Examples for Configuring Bgp
327
Setting Bgp as Confederation Attributes
327
Configuring Bgp Routing
331
Configuring Iteration-Based Bgp Load Balancing
336
Configuring Mbgp Route Reflector
339
Troubleshooting Bgp
341
Chapter 7 Policy Routing Configuration
343
Policy Routing Overview
343
Configuring Policy Routing
343
Defining Acl Rules
343
Defining Class and Classification Rules
343
Defining Policy Routing Behavior
344
Applying a Policy
345
Defining a Policy
345
Setting Traffic Policing Parameters
346
Typical Example for Configuring Policy Routing
347
Acl/Security Policy
349
Chapter 1 Acl
353
Introduction to Acl
353
Acl Application
353
Acl Definition
353
Basic Procedure of Acl Application
355
Acl on the Secpath F1800-A
355
Acl Classification and Creation Procedure
355
Entering Acl View
356
Basic Acl Rule
357
Advanced Acl Rule
358
Acl Step
363
Firewall Acl Rule
363
Acl Configuration
364
Creating Basic Acl
364
Creating Advanced Acl
365
Configuring Acl Effective Time Range
366
Creating Firewall Acl
366
Configuring Acl Step
367
Displaying Acl
367
Typical Example for Configuring Acl
367
Chapter 2 Security Policy
370
Security Zone
370
Introduction to Security Zone
370
Security Zone on the Secpath F1800-A
370
Security Zone Configuration
373
Displaying and Debugging Security Zone
375
Typical Example for Configuring Security Zone
376
Session Table Configuration
377
Introduction to Session Table
377
Configuring Timeout Time of the Session Table
378
Displaying and Debugging Session Table
379
Packet Filter
379
Introduction to Packet Filter
379
Packet Filter Configuration
379
Displaying Default Packet Filter Rules
380
Introduction to Attack Defence and Packet Statistics
381
Typical Example for Configuring Packet Filter
381
Attack Defence Configuration
384
System Statistics Configuration
394
IP Statistics Configuration
396
Displaying and Debugging Attack Defence and Packets Statistics
399
Typical Examples for Configuring Attack Defence and Packet Statistics
399
Troubleshooting the Attack Defence
403
Aspf
403
Introduction to ASPF
403
ASPF Configuration
405
Typical Example for Configuring ASPF
406
Black List
408
Introduction to Black List
408
Black List Configuration
410
Displaying Black List
411
Typical Example for Configuring Black List
411
MAC and IP Address Binding
412
Introduction to MAC and IP Address Binding
412
MAC and IP Address Binding Configuration
413
Displaying MAC and IP Address Binding
414
Typical Example for Configuring MAC and IP Address Binding
414
Port Identification
415
Configuring Port Mapping
415
Introduction to Port Identification
415
Displaying Port Mapping
416
Typical Example for Configuring Port Mapping
417
Chapter 3 NAT
419
Introduction to NAT
419
NAT on the Secpath F1800-A
420
NAT Mechanism on the Secpath F1800-A
420
Many-To-Many NAT and NAT Control
421
Napt
423
Internal Server
424
Alg
426
Gratuitous ARP Packets
427
NAT Configuration
427
Defining a NAT Address Pool
427
Associating an ACL with an Address Pool
428
Configuring an Internal Server
429
Configuring NAT ALG
429
Sending Gratuitous ARP Packets
430
Displaying NAT
430
Typical Example for Configuring NAT
430
Chapter 4 IDS Cooperation
433
Introduction to the IDS Cooperation
433
IDS Cooperation Configuration
434
Configuring the External IDS Server Address
434
Configuring a Firewall Port Communicating with the External IDS Server
435
Configuring the Packet Authentication Mode
435
Enabling or Disabling the External IDS
436
Displaying and Debugging IDS Cooperation
436
Typical Example for Configuring IDS Cooperation
437
Chapter 5 AAA
438
AAA Overview
438
Introduction to AAA
438
Introduction to RADIUS Protocol
439
Introduction to the HWTACACS Protocol
442
Introduction to Domain
443
Introduction to Local User Management
443
AAA Configuration
443
Configuring an Authentication Scheme
444
Entering AAA View
444
Configuring an Authorization Scheme
445
Configuring a Recording Scheme
446
Assigning an IP Address to a PPP User
448
Setting Parameters for a CAR Level
448
RADIUS Configuration
450
Configuring a RADIUS Authentication Server
451
Creating a RADIUS Server Template
451
Configuring a Key for the RADIUS Server
452
Configuring a Protocol Version for the RADIUS Server
452
Configuring a Traffic Unit for the RADIUS Server
453
Configuring a User Name Format for the RADIUS Server
453
Configuring a NAS Port for the RADIUS Server
454
Configuring Retransmission for the RADIUS Server
454
HWTACACS Configuration
455
Creating an HWTACACS Server Template
455
Configuring an HWTACACS Authentication Server
456
Configuring a Key for the HWTACACS Server
457
Configuring a User Name Format for the HWTACACS Server
457
Configuring an HWTACACS Authorization Server
457
Assigning a Source IP Address for the HWTACACS Server
458
Configuring a Traffic Unit for the HWTACACS Server
458
Configuring a Timer for the HWTACACS Server
459
Domain Configuration
459
Configuring a RADIUS Server Template to the Domain
460
Configuring Authentication, Authorization in the Domain
460
Creating a Domain
460
Configuring Address Relative Attributes to the Domain
461
Configuring an HWTACACS Server Template to the Domain
461
Configuring the Domain State
462
Configuring a Priority to a Domain User
463
Configuring a Traffic Level for the Domain
463
Setting an Access Limit to the Domain
463
Applying an ACL to Domain Users
464
Configuring a Web Authentication Server in the Domain
464
Local User Management Configuration
465
Creating a Local User Account
465
Configuring a Callback Number for a Local User
466
Configuring a Service Type for a Local User
466
Configuring a Call Number for a Local User
467
Configuring an FTP Directory to a Local User
467
Configuring Callback Check to Local Users
467
Configuring Local User States
468
Setting Traffic Levels for Local Users
468
Configuring an Access Limit to a Local User
469
Setting a Priority for a Local User
469
Configuring a MAC Address Binding for a Local User
470
Online User Management
470
Displaying and Debugging AAA
472
Typical Examples for Configuring AAA
473
Example I for Authenticating Access Users
473
Example II for Authenticating Access Users
475
Authenticating Telnet Users
476
AAA Troubleshooting
476
Table of Contents
479
Chapter 1 VPN Overview
481
Introduction to VPN
481
VPN Primary Technology
482
VPN Classification
485
Chapter 2 L2TP Configuration
487
L2TP Overview
487
Introduction to VPDN
487
Introduction to L2TP
488
Access to VPN Supported by L2TP
494
Configuring L2TP
495
LNS Configuration
495
Displaying and Debugging L2TP
504
Typical Examples for Configuring L2TP
505
L2TP Configuration
505
Configuration of Rental Secpath F1800-A
507
Complex Networking
511
L2TP Troubleshooting
511
Chapter 3 Ipsec Configuration
513
Ipsec Overview
513
Introduction to Ipsec Protocol
513
Introduction to IKE Protocol
514
Ipsec Basic Concepts
517
Implementing Ipsec on the Secpath F1800-A
520
NAT Traversal of Ipsec
520
Ipsec on Encryption Card Hardware
523
Ipsec Configuration
524
Configuring ACL
526
Configuring Ipsec Proposal
527
Configuring Ipsec Policy
530
Applying Ipsec Policy Group to Interface
536
Other Ipsec Configurations
536
Setting Local ID Used in IKE Negotiation
538
Specifying Attributes of IKE Peer
539
Creating IKE Ipsec Proposal
542
Other Configurations of IKE
545
Displaying and Debugging Ipsec
546
Displaying and Debugging IKE
547
Deleting an SA
548
Resetting Ipsec Packet Statistics
548
Displaying and Resetting Ipsec Card
549
Typical Example for Configuring Ipsec
550
Creating SA in Manual Mode
550
Creating SA in Isakmp Mode
553
Typical Example for Configuring IKE
556
IKE Troubleshooting
559
Route Redundancy Backup
562
Chapter 1 Route Redundancy Backup
564
VRRP Overview
564
Introduction to VRRP
564
Stand-Alone Default Route
564
Route Redundancy Backup on the Secpath F1800-A
566
Disadvantages of Traditional VRRP on Secpath F1800-A Backup
566
VGMP Overview
568
Backup Mode Classification
573
Routing Redundancy Backup in Composite Mode
578
VRRP Backup Group Configuration
578
Assigning Virtual IP Address to Backup Group
579
Setting Priority for the Backup Group
580
Setting Preemption Mode and Delay Time for Backup Group
581
Configuring Authentication Mode and Authentication Key for Backup Groups
582
Monitoring Interface State
583
Setting VRRP Timer for Backup Groups
583
Detecting TTL of VRRP Packets
584
VRRP Management Group Configuration
585
Creating a VRRP Management Group
585
Adding a Backup Group to the VRRP Management Group
586
Enabling the VRRP Management Group
586
Setting Priority for the VRRP Management Group
587
Enabling Preemption of the VRRP Management Group
589
Setting Interval at Which Hello Messages Are Sent
589
Configuring Packet Group Transmit Flag
590
Associating VLAN with VGMP Group Number (in Composite Mode)
591
Permitting Backup Forward (in Composite Mode)
591
Displaying and Debugging Route Redundancy Backup
592
Typical Example for Configuring Route Redundancy Backup
592
Networking of VRRP Management Group in Master/Backup Mode
592
Networking of VRRP Management Group in Load Balancing Mode
595
Using Master/Backup Networking in VRRP Management Groups in Composite Mode
597
Using Master/Backup Networking in VRRP Management Groups in Composite Mode
599
VRRP Troubleshooting
600
Chapter 2 Dual-System Hot Backup
602
Dual-System Hot Backup Overview
602
Introduction to HRP
602
Relation between VRRP Backup Group, Management Group and HRP
604
Dual-System Hot Backup in Composite Mode
605
Dual-System Hot Backup Configuration
605
Enabling Dual-System Hot Backup
606
Enabling Automatic Backup
607
Enabling Manual Batch Backup
609
Configuring the Channel Interface of Backup Session Table
610
Displaying and Debugging Dual-System Hot Backup
610
Typical Example of Dual-System Hot Backup Networking
611
Dual-System Hot Backup Networking in Composite Mode
611
Typical Networking of Dual-System Hot Backup in Routing Mode
611
Dual-System Hot Backup Troubleshooting
612
Advertisement
H3C H3C SecPath F1800-A Operation Manual (30 pages)
Link Layer Protocol
Brand:
H3C
| Category:
Firewall
| Size: 0 MB
Table of Contents
Table of Contents
1
Chapter 1 VLAN Configuration
3
Introduction to VLAN
3
The Potential Problems in LAN Interconnecting
3
Why Using VLAN
4
VLAN Aggregation
5
Configuring VLAN
6
Creating an Ethernet Sub-Interface
7
Creating a VLAN and Entering VLAN View
7
Entering VLAN Interface View When a VLAN Is Created
7
Adding a Port
7
Configuring a Trunk Port
8
Setting Sub-Interface Encapsulation Type and Related VLAN ID
8
Displaying and Debugging VLAN
8
Typical Example for Configuring VLAN
9
Chapter 2 PPP Configuration
12
PPP Overview
12
Configuring PPP
14
Configuring Link Layer Protocol for Interface Encapsulation as PPP
14
Setting Polling Interval
14
Setting PPP Authentication Mode User Name and User Password
15
Configuring PPP Authentication Mode of AAA
17
Setting PPP Negotiation Parameters
17
Configuring PPP Compression
18
Configuring PPP Link Quality Monitoring
18
Configuring Callback
19
Configuring the Dialing String Needed for Firewall Callback
19
Configuring DNS Address Negotiation
20
Configuring VJ TCP Header Compression
20
Displaying and Debugging PPP
21
Typical Example for Configuring PPP
21
PAP Authentication Example
21
CHAP Authentication Example
22
Troubleshooting PPP
22
Chapter 3 Pppoe Configuration
24
Pppoe Overview
24
Introduction to the Pppoe Protocol
24
Introduction to Pppoe Application
24
Pppoe Server Configuration
25
Enabling or Disabling Pppoe
25
Setting Pppoe Parameters
26
Configuring Pppoe Client
26
Configuring a Dialer Interface
26
Configuring a Pppoe Session
27
Displaying and Debugging Pppoe
28
Typical Examples for Configuring Pppoe
29
H3C H3C SecPath F1800-A Installation Manual (13 pages)
Brand:
H3C
| Category:
Firewall
| Size: 0 MB
Table of Contents
Table of Contents
1
Installation Flow
2
Mounting a Secpath to a Specified Place
3
Mounting a Secpath into the Rack
3
Mounting a Secpath Onto the Workbench
4
Connecting the
5
Connecting Power Cable
6
Connecting AC Power Cable
6
Connecting DC Input Power Cable
7
Connecting the Console Terminal
8
Connecting the Secpath to a LAN
10
Connecting the Secpath to a WAN
11
Installation Verification
13
Advertisement
Advertisement
Related Products
H3C H3C SECPATH F100-A
H3C SecPath F100-C-EI
H3C SecPath F1005
H3C SecPath F1010
H3C SecPath F1005-L
H3C SecPath F1000-AK109
H3C SecPath F1000-AK125
H3C SecPath F100-C-A
H3C SecPath F1000-AI-75
H3C SecPath F10X0
H3C Categories
Switch
Network Router
Wireless Access Point
Control Unit
Server
More H3C Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL