H3C Technologies H3C SecPath F5020 User Manual
H3c firewall devices
This manual is related to the following products:
Table of contents
Document Outline
- Title Page
- Preface
- Contents
- IRF overview
- Setting up an IRF fabric (centralized IRF devices)
- Hardware compatibility
- General restrictions and configuration guidelines
- Setup and configuration task list
- Planning the IRF fabric setup
- Assigning a member ID to each IRF member device
- Specifying a priority for each member device
- Connecting IRF physical interfaces
- Binding physical interfaces to IRF ports
- Accessing the IRF fabric
- Configuring a member device description
- Configuring IRF link load sharing mode
- Configuring IRF bridge MAC persistence
- Enabling software auto-update for software image synchronization
- Setting the IRF link down report delay
- Configuring BFD MAD
- Excluding a port from the shutdown action upon detection of multi-active collision
- Recovering an IRF fabric
- Displaying and maintaining an IRF fabric
- BFD MAD-enabled IRF configuration example
- Setting up an IRF fabric (distributed devices)
- Hardware compatibility
- General restrictions and configuration guidelines
- Setup and configuration task list
- Planning the IRF fabric setup
- Preconfiguring IRF member devices in standalone mode
- Saving configuration to the next-startup configuration file
- Connecting IRF physical interfaces
- Setting the operating mode to IRF mode
- Accessing the IRF fabric
- Configuring IRF member devices in IRF mode
- Changing the member ID of a device
- Changing the priority of a member device
- Adding physical interfaces to an IRF port
- Enabling IRF auto-merge
- Configuring a member device description
- Configuring IRF link load sharing mode
- Configuring IRF bridge MAC persistence
- Enabling software auto-update for software image synchronization
- Setting the IRF link down report delay
- Configuring MAD
- Recovering an IRF fabric
- Displaying and maintaining an IRF fabric
- IRF setup configuration examples
- Configuring contexts
- Overview
- Feature and hardware compatibility
- Context configuration task list
- Creating contexts
- Assigning contexts to security engines
- Assigning resources to a context
- Starting a context
- Accessing a context
- Displaying and maintaining contexts
- Context configuration example
- Index