- Table of Contents
-
- 07-Security Configuration Guide
- 00-Preface
- 01-Security Overview
- 02-AAA Configuration
- 03-802.1X Configuration
- 04-MAC Authentication Configuration
- 05-Portal Configuration
- 06-Port Security Configuration
- 07-User Profile Configuration
- 08-Password Control Configuration
- 09-Public Key Configuration
- 10-PKI Configuration
- 11-SSH Configuration
- 12-SSL Configuration
- 13-SSL VPN Configuration
- 14-TCP Attack Protection Configuration
- 15-ARP Attack Protection Configuration
- 16-IPsec Configuration
- 17-ALG Configuration
- 18-Firewall Configuration
- 19-Session Management Configuration
- 20-Web Filtering Configuration
- 21-User Isolation Configuration
- 22-Source IP Address Verification Configuration
- 23-FIPS Configuration
- 24-Protocol Packet Rate Limit Configuration
- 25-Attack detection and protection configuration
- Related Documents
-
Title | Size | Download |
---|---|---|
00-Preface | 114.85 KB |
Preface
The Security Configuration Guide describes security features and configuration. It covers identity authentication features (such as AAA and PKI), access security features (such as 802.1X, MAC authentication, portal authentication, and port security), secure management features (such as SSH), security socket layer (SSL), and attack protection features (such as TCP attack protection and ARP attack protection).
|
NOTE: Support of the H3C access controllers for features might vary by device model. For the feature matrixes, see About the H3C Access Controllers Configuration Guides. |
This preface includes the following topics about the documentation:
· Audience.
· Conventions.
Audience
This documentation is intended for:
· Network planners.
· Field technical support and servicing engineers.
· Network administrators working with the H3C access controllers.
Conventions
The following information describes the conventions used in the documentation.
Command conventions
Convention |
Description |
Boldface |
Bold text represents commands and keywords that you enter literally as shown. |
Italic |
Italic text represents arguments that you replace with actual values. |
[ ] |
Square brackets enclose syntax choices (keywords or arguments) that are optional. |
{ x | y | ... } |
Braces enclose a set of required syntax choices separated by vertical bars, from which you select one. |
[ x | y | ... ] |
Square brackets enclose a set of optional syntax choices separated by vertical bars, from which you select one or none. |
{ x | y | ... } * |
Asterisk marked braces enclose a set of required syntax choices separated by vertical bars, from which you select a minimum of one. |
[ x | y | ... ] * |
Asterisk marked square brackets enclose optional syntax choices separated by vertical bars, from which you select one choice, multiple choices, or none. |
&<1-n> |
The argument or keyword and argument combination before the ampersand (&) sign can be entered 1 to n times. |
# |
A line that starts with a pound (#) sign is comments. |
GUI conventions
Convention |
Description |
Boldface |
Window names, button names, field names, and menu items are in Boldface. For example, the New User window opens; click OK. |
> |
Multi-level menus are separated by angle brackets. For example, File > Create > Folder. |
Symbols
Convention |
Description |
|
An alert that calls attention to important information that if not understood or followed can result in personal injury. |
|
An alert that calls attention to important information that if not understood or followed can result in data loss, data corruption, or damage to hardware or software. |
|
An alert that calls attention to essential information. |
NOTE: |
An alert that contains additional or supplementary information. |
|
An alert that provides helpful information. |
Network topology icons
Convention |
Description |
|
Represents a generic network device, such as a router, switch, or firewall. |
|
Represents a routing-capable device, such as a router or Layer 3 switch. |
|
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features. |
|
Represents an access controller, a unified wired-WLAN module, or the access controller engine on a unified wired-WLAN switch. |
|
Represents an access point. |
|
Wireless terminator unit. |
|
Wireless terminator. |
|
Represents a mesh access point. |
|
Represents omnidirectional signals. |
|
Represents directional signals. |
|
Represents a security product, such as a firewall, UTM, multiservice security gateway, or load balancing device. |
|
Represents a security module, such as a firewall, load balancing, NetStream, SSL VPN, IPS, or ACG module. |
Examples provided in this document
Examples in this document might use devices that differ from your device in hardware model, configuration, or software version. It is normal that the port numbers, sample output, screenshots, and other information in the examples differ from what you have on your device.
Documentation feedback
You can e-mail your comments about product documentation to [email protected].
We appreciate your comments.