Sign In
Upload
Manuals
Brands
H3C Manuals
Switch
S5120-HI Series
H3C S5120-HI Series Manuals
Manuals and User Guides for H3C S5120-HI Series. We have
6
H3C S5120-HI Series manuals available for free PDF download: Security Configuration Manual, Installation Manual, Configuration Manual, Compliance And Safety Manual, Quick Start
H3C S5120-HI Series Security Configuration Manual (379 pages)
Brand:
H3C
| Category:
Switch
| Size: 3.31 MB
Table of Contents
Table of Contents
8
Configuring AAA
18
AAA Overview
18
Radius
19
Hwtacacs
24
Domain-Based User Management
26
RADIUS Server Feature of the Switch
27
Protocols and Standards
28
RADIUS Attributes
28
FIPS Compliance
31
AAA Configuration Considerations and Task List
31
Configuring AAA Schemes
33
Configuring Local Users
33
Configuring RADIUS Schemes
37
Configuring HWTACACS Schemes
49
Configuring AAA Methods for ISP Domains
55
Configuration Prerequisites
55
Creating an ISP Domain
55
Configuring ISP Domain Attributes
56
Configuring AAA Authentication Methods for an ISP Domain
57
Configuring AAA Authorization Methods for an ISP Domain
59
Configuring AAA Accounting Methods for an ISP Domain
60
Tearing down User Connections
62
Configuring a NAS ID-VLAN Binding
62
Configuring a Switch as a RADIUS Server
62
RADIUS Server Functions Configuration Task List
62
Configuring a RADIUS User
63
Specifying a RADIUS Client
63
Displaying and Maintaining AAA
64
AAA Configuration Examples
64
AAA for Telnet Users by an HWTACACS Server
64
AAA for Telnet Users by Separate Servers
65
Authentication/Authorization for Ssh/Telnet Users by a RADIUS Server
67
AAA for 802.1X Users by a RADIUS Server
70
Level Switching Authentication for Telnet Users by an HWTACACS Server
77
RADIUS Authentication and Authorization for Telnet Users by a Switch
80
Troubleshooting AAA
82
Troubleshooting RADIUS
82
Troubleshooting HWTACACS
83
802.1X Overview
84
802.1X Architecture
84
Controlled/Uncontrolled Port and Port Authorization Status
84
802.1X-Related Protocols
85
Packet Formats
86
EAP over RADIUS
87
Initiating 802.1X Authentication
87
802.1X Client as the Initiator
87
Access Device as the Initiator
88
802.1X Authentication Procedures
88
A Comparison of EAP Relay and EAP Termination
89
EAP Relay
89
EAP Termination
92
Configuring 802.1X
93
H3C Implementation of 802.1X
93
Access Control Methods
93
Using 802.1X Authentication with Other Features
93
Configuration Prerequisites
98
802.1X Configuration Task List
99
Enabling 802.1X
99
Configuration Guidelines
99
Configuration Procedure
100
Enabling EAP Relay or EAP Termination
100
Setting the Port Authorization State
101
Specifying an Access Control Method
101
Setting the Maximum Number of Concurrent 802.1X Users on a Port
102
Setting the Maximum Number of Authentication Request Attempts
102
Setting the 802.1X Authentication Timeout Timers
103
Configuring the Online User Handshake Function
103
Configuration Guidelines
103
Configuration Procedure
104
Configuring the Authentication Trigger Function
104
Configuration Guidelines
104
Configuration Procedure
105
Specifying a Mandatory Authentication Domain on a Port
105
Configuring the Quiet Timer
105
Enabling the Periodic Online User Re-Authentication Function
106
Configuration Guidelines
106
Configuration Procedure
106
Configuring a Port to Send EAPOL Frames Untagged
107
Setting the Maximum Number of 802.1X Authentication Attempts for MAC Authentication Users
107
Configuring a VLAN Group
107
Configuring an 802.1X Guest VLAN
108
Configuration Guidelines
108
Configuration Prerequisites
108
Configuration Procedure
109
Configuring an 802.1X Auth-Fail VLAN
109
Configuration Guidelines
109
Configuration Prerequisites
110
Configuration Procedure
110
Configuring an 802.1X Critical VLAN
110
Configuration Guidelines
110
Configuration Procedure
111
Specifying Supported Domain Name Delimiters
111
Displaying and Maintaining 802.1X
112
802.1X Authentication Configuration Example
112
Network Requirements
112
Configuration Procedure
112
Verifying the Configuration
114
With Guest VLAN and VLAN Assignment Configuration Example
114
Network Requirements
114
Configuration Procedure
115
Verifying the Configuration
116
With ACL Assignment Configuration Example
117
Network Requirements
117
Configuration Procedure
117
Verifying the Configuration
118
Configuring EAD Fast Deployment
119
Overview
119
Free IP
119
URL Redirection
119
Configuration Prerequisites
119
Configuring a Free IP
119
Configuring the Redirect URL
120
Setting the EAD Rule Timer
120
Displaying and Maintaining EAD Fast Deployment
121
EAD Fast Deployment Configuration Example
121
Network Requirements
121
Configuration Procedure
122
Verifying the Configuration
122
Troubleshooting EAD Fast Deployment
123
Web Browser Users Cannot be Correctly Redirected
123
Configuring MAC Authentication
124
Overview
124
User Account Policies
124
Authentication Approaches
124
MAC Authentication Timers
125
Using MAC Authentication with Other Features
125
VLAN Assignment
125
ACL Assignment
125
Guest VLAN
125
Critical VLAN
126
Configuration Task List
126
Basic Configuration for MAC Authentication
126
Configuring MAC Authentication Globally
127
Configuring MAC Authentication on a Port
127
Specifying a MAC Authentication Domain
128
Configuring a MAC Authentication Guest VLAN
128
Configuring a MAC Authentication Critical VLAN
129
Configuring MAC Authentication Delay
130
Enabling MAC Authentication Multi-VLAN Mode
130
Displaying and Maintaining MAC Authentication
131
MAC Authentication Configuration Examples
131
Local MAC Authentication Configuration Example
131
RADIUS-Based MAC Authentication Configuration Example
133
ACL Assignment Configuration Example
135
Configuring Portal Authentication
138
Overview
138
Extended Portal Functions
138
Portal System Components
138
Portal System Using the Local Portal Server
140
Portal Authentication Modes
141
Layer 2 Portal Authentication Process
141
Portal Configuration Task List
142
Configuration Prerequisites
143
Specifying the Portal Server
144
Configuring the Local Portal Server
144
Customizing Authentication Pages
144
Configuring the Local Portal Server
147
Enabling Portal Authentication
148
Controlling Access of Portal Users
149
Configuring a Portal-Free Rule
149
Setting the Maximum Number of Online Portal Users
149
Specifying an Authentication Domain for Portal Users
150
Configuring Portal Authentication to Support Web Proxy
150
Enabling Support for Portal User Moving
151
Specifying an Auth-Fail VLAN for Portal Authentication
151
Specifying an Auto Redirection URL for Authenticated Portal Users
152
Configuring Portal Detection Functions
152
Logging off Portal Users
153
Displaying and Maintaining Portal
153
Portal Configuration Examples
154
Network Requirements
154
Configuration Procedures
154
Verifying the Configuration
156
Troubleshooting Portal
157
Inconsistent Keys on the Access Device and the Portal Server
157
Incorrect Server Port Number on the Access Device
158
Configuring Triple Authentication
159
Overview
159
Triple Authentication Mechanism
159
Using Triple Authentication with Other Features
160
Configuring Triple Authentication
160
Triple Authentication Configuration Examples
161
Triple Authentication Basic Function Configuration Example
161
Triple Authentication Supporting VLAN Assignment and Auth-Fail VLAN Configuration Example
163
Configuring Port Security
169
Overview
169
Port Security Features
169
Port Security Modes
169
Working with Guest VLAN and Auth-Fail VLAN
172
Configuration Task List
172
Enabling Port Security
173
Setting Port Security's Limit on the Number of MAC Addresses on a Port
173
Setting the Port Security Mode
174
Configuration Prerequisites
174
Configuration Procedure
174
Configuring Port Security Features
175
Configuring NTK
175
Configuring Intrusion Protection
175
Enabling Port Security Traps
176
Configuring Secure MAC Addresses
176
Configuration Prerequisites
177
Configuration Procedure
177
Ignoring Authorization Information
178
Displaying and Maintaining Port Security
179
Port Security Configuration Examples
179
Configuring the Autolearn Mode
179
Configuring the Userloginwithoui Mode
181
Configuring the Macaddresselseuserloginsecure Mode
186
Troubleshooting Port Security
188
Cannot Set the Port Security Mode
188
Cannot Configure Secure MAC Addresses
189
Cannot Change Port Security Mode When a User Is Online
189
Configuring a User Profile
191
Overview
191
User Profile Configuration Task List
191
Creating a User Profile
191
Applying a Qos Policy
192
Enabling a User Profile
192
Displaying and Maintaining User Profiles
193
Configuring Password Control
194
Overview
194
FIPS Compliance
196
Password Control Configuration Task List
197
Configuring Password Control
197
Enabling Password Control
197
Setting Global Password Control Parameters
198
Setting User Group Password Control Parameters
200
Setting Local User Password Control Parameters
200
Setting Super Password Control Parameters
201
Setting a Local User Password in Interactive Mode
201
Displaying and Maintaining Password Control
202
Password Control Configuration Example
202
Configuring HABP
205
Overview
205
Configuring HABP
206
Configuring the HABP Server
206
Configuring an HABP Client
206
Displaying and Maintaining HABP
207
HABP Configuration Example
207
Managing Public Keys
210
Overview
210
FIPS Compliance
210
Configuration Task List
211
Creating a Local Asymmetric Key Pair
211
Displaying or Exporting the Local Host Public Key
212
Destroying a Local Asymmetric Key Pair
213
Specifying the Peer Public Key on the Local Device
213
Displaying and Maintaining Public Keys
215
Public Key Configuration Examples
215
Manually Specifying the Peer Public Key on the Local Device
215
Importing a Peer Public Key from a Public Key File
217
Configuring PKI
220
Overview
220
PKI Terms
220
PKI Architecture
221
PKI Operation
221
PKI Applications
222
PKI Configuration Task List
222
Configuring an Entity DN
223
Configuring a PKI Domain
224
Configuration Guidelines
225
Configuration Procedure
225
Submitting a PKI Certificate Request
225
Submitting a Certificate Request in Auto Mode
226
Submitting a Certificate Request in Manual Mode
226
Retrieving a Certificate Manually
227
Configuration Guidelines
227
Configuration Procedure
228
Configuring PKI Certificate Verification
228
Configuration Guidelines
228
Configuring CRL-Checking-Enabled PKI Certificate Verification
228
Configuring CRL-Checking-Disabled PKI Certificate Verification
229
Destroying a Local RSA Key Pair
229
Deleting a Certificate
230
Configuring an Access Control Policy
230
Displaying and Maintaining PKI
230
PKI Configuration Examples
231
Certificate Request from an RSA Keon CA Server
231
Certificate Request from a Windows 2003 CA Server
234
Certificate Attribute Access Control Policy Configuration Example
237
Troubleshooting PKI
239
Failed to Retrieve a CA Certificate
239
Failed to Request a Local Certificate
239
Failed to Retrieve Crls
240
Configuring Ipsec
241
Overview
241
Basic Concepts
241
Protocols and Standards
244
Configuring Ipsec
244
Implementing ACL-Based Ipsec
244
Feature Restrictions
244
ACL-Based Ipsec Configuration Task List
244
Configuring Acls
245
Configuring an Ipsec Proposal
246
Configuring an Ipsec Policy
247
Applying an Ipsec Policy Group to an Interface
250
Configuring the Ipsec Session Idle Timeout
251
Enabling ACL Checking of De-Encapsulated Ipsec Packets
251
Configuring the Ipsec Anti-Replay Function
252
Configuring Packet Information Pre-Extraction
252
Displaying and Maintaining Ipsec
253
Ipsec Configuration Examples
253
IKE-Based Ipsec Tunnel for Ipv4 Packets Configuration Example
253
Configuring IKE
256
Overview
256
IKE Security Mechanism
256
IKE Operation
256
IKE Functions
257
Relationship between IKE and Ipsec
258
Protocols and Standards
258
IKE Configuration Task List
258
Configuring a Name for the Local Security Gateway
259
Configuring an IKE Proposal
259
Configuring an IKE Peer
260
Setting Keepalive Timers
262
Setting the NAT Keepalive Timer
262
Configuring a DPD Detector
263
Disabling Next Payload Field Checking
263
Displaying and Maintaining IKE
264
IKE Configuration Example
264
Troubleshooting IKE
267
Invalid User ID
267
Proposal Mismatch
267
Failing to Establish an Ipsec Tunnel
268
ACL Configuration Error
268
Configuring SSH2.0
269
Overview
269
SSH Operation
269
FIPS Compliance
271
Configuring the Switch as an SSH Server
272
SSH Server Configuration Task List
272
Generating DSA or RSA Key Pairs
272
Enabling the SSH Server Function
273
Configuring the User Interfaces for SSH Clients
273
Configuring a Client Public Key
273
Configuring an SSH User
274
Setting the SSH Management Parameters
276
Setting the DSCP Value for Packets Sent by the SSH Server
277
Configuring the Switch as an SSH Client
277
SSH Client Configuration Task List
277
Specifying a Source IP Address/Interface for the SSH Client
278
Configuring Whether First-Time Authentication Is Supported
278
Establishing a Connection between the SSH Client and Server
279
Setting the DSCP Value for Packets Sent by the SSH Client
279
Displaying and Maintaining SSH
280
SSH Server Configuration Examples
280
When the Switch Acts as a Server for Password Authentication
281
When the Switch Acts as a Server for Publickey Authentication
283
SSH Client Configuration Examples
288
When Switch Acts as Client for Password Authentication
288
When Switch Acts as Client for Publickey Authentication
291
Configuring SFTP
294
Overview
294
FIPS Compliance
294
Configuring the Switch as an SFTP Server
294
Enabling the SFTP Server
294
Configuring the SFTP Connection Idle Timeout Period
295
Configuring the Switch as an SFTP Client
295
Specifying a Source IP Address or Interface for the SFTP Client
295
Establishing a Connection to the SFTP Server
295
Working with SFTP Directories
296
Working with SFTP Files
297
Displaying Help Information
297
Terminating the Connection to the Remote SFTP Server
298
Setting the DSCP Value for Packets Sent by the SFTP Client
298
SFTP Client Configuration Example
298
SFTP Server Configuration Example
302
Configuring SCP
305
Overview
305
FIPS Compliance
305
Configuring the Switch as an SCP Server
305
Configuring the Switch as the SCP Client
306
SCP Client Configuration Example
307
SCP Server Configuration Example
308
Configuring SSL
310
Overview
310
SSL Security Mechanism
310
SSL Protocol Stack
310
FIPS Compliance
311
Configuration Task List
311
Configuring an SSL Server Policy
311
SSL Server Policy Configuration Example
313
Configuring an SSL Client Policy
315
Displaying and Maintaining SSL
316
Troubleshooting SSL
316
Configuring TCP Attack Protection
317
Overview
317
Enabling the SYN Cookie Feature
317
Displaying and Maintaining TCP Attack Protection
317
Configuring IP Source Guard
318
Overview
318
Static IP Source Guard Entries
318
Dynamic IP Source Guard Binding Entries
319
Configuration Task List
319
Configuring the Ipv4 Source Guard Function
320
Configuring Ipv4 Source Guard on a Port
320
Configuring a Static Ipv4 Source Guard Entry
321
Setting the Maximum Number of Ipv4 Source Guard Entries
322
Configuring the Ipv6 Source Guard Function
323
Configuring Ipv6 Source Guard on a Port
323
Configuring a Static Ipv6 Source Guard Entry
324
Setting the Maximum Number of Ipv6 Source Guard Entries
325
Displaying and Maintaining IP Source Guard
325
IP Source Guard Configuration Examples
326
Static Ipv4 Source Guard Configuration Example
326
Dynamic Ipv4 Source Guard Using DHCP Snooping Configuration Example
328
Dynamic Ipv4 Source Guard Using DHCP Relay Configuration Example
329
Static Ipv6 Source Guard Configuration Example
330
Dynamic Ipv6 Source Guard Using Dhcpv6 Snooping Configuration Example
331
Dynamic Ipv6 Source Guard Using ND Snooping Configuration Example
332
Global Static IP Source Guard Configuration Example
333
Troubleshooting IP Source Guard
335
Configuring ARP Attack Protection
336
Overview
336
ARP Attack Protection Configuration Task List
336
Configuring ARP Defense against IP Packet Attacks
337
Configuring ARP Source Suppression
337
Enabling ARP Black Hole Routing
338
Displaying and Maintaining ARP Defense against IP Packet Attacks
338
Configuration Example
338
Configuring ARP Packet Rate Limit
339
Introduction
339
Configuration Procedure
339
Configuring Source MAC Address Based ARP Attack Detection
340
Configuration Procedure
340
Displaying and Maintaining Source MAC Address Based ARP Attack Detection
341
Configuration Example
341
Configuring ARP Packet Source MAC Address Consistency Check
343
Introduction
343
Configuration Procedure
343
Configuring ARP Active Acknowledgement
343
Configuring ARP Detection
344
Introduction
344
Configuring User Validity Check
344
Configuring ARP Packet Validity Check
345
Configuring ARP Restricted Forwarding
346
Configuring the ARP Detection Logging Function
346
Displaying and Maintaining ARP Detection
347
User Validity Check Configuration Example
347
User Validity Check and ARP Packet Validity Check Configuration Example
348
ARP Restricted Forwarding Configuration Example
350
Configuring ARP Automatic Scanning and Fixed ARP
351
Configuration Guidelines
352
Configuration Procedure
352
Configuring ARP Gateway Protection
352
Configuration Procedure
353
Configuration Example
353
Configuring ARP Filtering
354
Configuration Guidelines
354
Configuration Procedure
354
Configuration Example
354
Configuring ND Attack Defense
356
Overview
356
Enabling Source MAC Consistency Check for ND Packets
357
Configuring the ND Detection Function
357
Introduction to ND Detection
357
Configuration Guidelines
357
Configuration Procedure
358
Displaying and Maintaining ND Detection
358
ND Detection Configuration Example
358
Network Requirements
358
Configuration Procedure
359
Configuring SAVI
361
Overview
361
Configuring Global SAVI
361
SAVI Configuration in Dhcpv6-Only Address Assignment Scenario
362
Network Requirements
362
Configuration Considerations
362
Packet Check Principles
363
Configuration Procedure
363
SAVI Configuration in SLAAC-Only Address Assignment Scenario
364
Network Requirements
364
Configuration Considerations
364
Packet Check Principles
365
Configuration Procedure
365
SAVI Configuration in Dhcpv6+Slaac Address Assignment Scenario
366
Network Requirements
366
Configuration Considerations
366
Packet Check Principles
367
Configuration Procedure
367
Configuring Blacklist
369
Overview
369
Configuring the Blacklist Feature
369
Displaying and Maintaining the Blacklist
369
Blacklist Configuration Example
370
Network Requirements
370
Configuration Procedure
370
Verifying the Configuration
370
Configuring FIPS
372
Overview
372
FIPS Self-Tests
372
Power-Up Self-Test
372
Conditional Self-Tests
372
Triggering a Self-Test
372
Configuration Procedure
373
Enabling the FIPS Mode
373
Triggering a Self-Test
374
Displaying and Maintaining FIPS
374
FIPS Configuration Example
374
Network Requirements
374
Configuration Procedure
374
Verifying the Configuration
375
Index
377
Advertisement
H3C S5120-HI Series Installation Manual (76 pages)
Brand:
H3C
| Category:
Switch
| Size: 4.23 MB
Table of Contents
Installation Guide
1
Obtaining Documentation
5
Technical Support
6
Documentation Feedback
6
Table of Contents
7
Product Overview
10
Panel Views for the S5120-28SC-HI and S5120-52SC-HI
10
Front Panel Views
10
Rear Panel View
11
Left Side Panel View
12
Panel Views for the S5120-34C-HI and S5120-58C-HI
12
Front Panel Views
12
Rear Panel View
13
Preparing for Installation
15
Safety Recommendations
15
Examining the Installation Site
15
Temperature/Humidity
15
Cleanness
16
Emi
16
Laser Safety
16
Installation Tools
17
Installing the Switch
18
Installing the Switch in a 19-Inch Rack
19
Rack-Mounting Restrictions and Guidelines
19
Mounting Accessory Kit
20
Rack-Mounting by Using Front Mounting Brackets
22
Rack-Mounting by Using Front and Rear Mounting Brackets
23
Rack-Mounting by Using Front Mounting Brackets and Mounting Rail Assemblies
26
Mounting the Switch on a Workbench
30
Grounding the Switch
30
Grounding the Switch with a Grounding Strip
31
Grounding the Switch with a Grounding Conductor Buried in the Earth Ground
33
Grounding the Switch by Using the AC Power Cord
34
Installing/Removing a Fan Tray
34
Installing a Fan Tray
35
Removing a Fan Tray
35
Installing/Removing a Power Module
36
Installing a Power Module
36
Removing a Power Module
37
Connecting the Power Cord
37
Connecting the PSR150-A/PSR150-A1
37
Connecting the PSR150-D/PSR150-D1
38
Installing/Removing an Interface Card
39
Installing an Interface Card
39
Removing an Interface Card
41
Installing/Removing a CX4/SFP+ Cable
42
Verifying the Installation
42
Accessing the Switch for the First Time
44
Setting up the Configuration Environment
44
Connecting the Console Cable
44
Console Cable
44
Connection Procedure
44
Setting Terminal Parameters
45
Powering on the Switch
48
Setting up an IRF Fabric
49
IRF Fabric Setup Flowchart
50
Planning IRF Fabric Setup
51
Planning IRF Fabric Size and the Installation Site
51
Identifying the Master Switch and Planning IRF Member Ids
51
Planning IRF Topology and Connections
52
Identifying Physical IRF Ports on the Member Switches
53
Planning the Cabling Scheme
54
Configuring Basic IRF Settings
56
Connecting the Physical IRF Ports
56
Accessing the IRF Fabric to Verify the Configuration
57
Maintenance and Troubleshooting
58
Power Module Failure
58
Fan Failure
58
Configuration Terminal Problems
59
Appendix A Technical Specifications
60
Appendix B Frus and Compatibility Matrixes
62
Frus and Compatibility Matrixes
62
Hot Swappable Power Modules
62
Hot Swappable Fan Trays
63
Interface Cards
63
SFP/SFP+/XFP Transceiver Modules and SFP+/CX4 Cables
64
100 Mbps SFP Transceiver Modules
64
1000 Mbps SFP Transceiver Modules
65
Gbps SFP+ Transceiver Modules and SFP+ Cables
66
10 Gbps XFP Transceiver Modules
66
CX4 Cables
67
Appendix C Ports and Leds
68
Ports
68
Console Port
68
Management Ethernet Port
68
10/100/1000Base-T Ethernet Port
68
SFP Port
69
Combo Interface
69
Leds
69
System Status LED
69
Power Module Status LED
70
Port Mode LED
70
Seven-Segment LED
70
10/100/1000Base-T Ethernet Port LED
71
SFP Port LED
72
Management Ethernet Port Leds
73
Interface Card Status LED
74
Port LED on the Interface Card
74
Appendix D Cooling System
75
Index
76
H3C S5120-HI Series Configuration Manual (20 pages)
Layer 3, IP Routing Configuration
Brand:
H3C
| Category:
Switch
| Size: 0.27 MB
Table of Contents
Table of Contents
7
IP Routing Basics
8
IP Routing Overview
8
Routing Table
8
Routing Preference
9
Route Backup
9
Displaying and Maintaining a Routing Table
10
Static Routing Configuration
11
Introduction
11
Static Route
11
Default Route
11
Static Route Configuration Items
11
Configuring a Static Route
12
Configuration Prerequisites
12
Configuration Procedure
12
Displaying and Maintaining Static Routes
13
Static Route Configuration Examples
13
Basic Static Route Configuration Example
13
Ipv6 Static Routing Configuration
16
Introduction to Ipv6 Static Routing
16
Features of Ipv6 Static Routes
16
Default Ipv6 Route
16
Configuring an Ipv6 Static Route
16
Configuration Prerequisites
16
Configuration Procedure
16
Displaying and Maintaining Ipv6 Static Routes
17
Ipv6 Static Routing Configuration Example
17
Index
20
Advertisement
H3C S5120-HI Series Configuration Manual (20 pages)
Brand:
H3C
| Category:
Switch
| Size: 0.27 MB
Table of Contents
Table of Contents
7
IP Routing Basics
8
Overview
8
Routing Table
8
Routing Preference
9
Route Backup
9
Displaying and Maintaining a Routing Table
9
Configuring Static Routing
11
Introduction
11
Static Route
11
Default Route
11
Static Route Configuration Items
11
Configuring a Static Route
12
Displaying and Maintaining Static Routes
12
Static Route Configuration Examples
13
Basic Static Route Configuration Example
13
Configuring Ipv6 Static Routing
16
Overview
16
Ipv6 Static Routes Features
16
Default Ipv6 Route
16
Configuring an Ipv6 Static Route
16
Displaying and Maintaining Ipv6 Static Routes
17
Ipv6 Static Routing Configuration Example
17
Network Requirements
17
Configuration Procedure
18
Index
20
H3C S5120-HI Series Compliance And Safety Manual (20 pages)
Brand:
H3C
| Category:
Network Router
| Size: 0.29 MB
Table of Contents
Table of Contents
4
Safety Information Sicherheits Informationen安全信息
6
Overview Überblick 概述
6
Conventions Used Symbole Erläuterung应用惯例
9
Important Safety Information/Wichtige Sicherheitshinweise/重要安全
10
Electricity Safety Elektrische Sicherheit 用电安全
15
High Voltage Hochspannung高电压
15
Regulatory Compliance Information
17
Regulatory Compliance Standards
17
European Directives Compliance
18
LVD/EMC Directive
18
WEEE Directive-2002/96
18
USA Regulatory Compliance
18
FCC Part 15
18
Fda
19
Canada Regulatory Compliance
19
Ices-003
19
Japan Regulatory Compliance
19
VCCI
19
EN55022,AS/NZS CISPR 22 CISPR22 Compliance
20
CCC Class A声明
20
H3C S5120-HI Series Quick Start (4 pages)
Brand:
H3C
| Category:
Switch
| Size: 2.02 MB
Advertisement
Related Products
H3C S5120-EI Series
H3C S5120-9P-SI
H3C S5120-20P-SI
H3C S5120-28P-SI
H3C S5120-52P-SI
H3C S5120V2-28P-SI
H3C S5120V2-10P-LI
H3C S5120V2-10P-PWR-LI
H3C S5120V2-28P-PWR-LI
H3C S5120V2-28P-HPWR-LI
H3C Categories
Switch
Network Router
Wireless Access Point
Control Unit
Gateway
More H3C Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL