System volume – H3C Technologies H3C SR6600 User Manual

Page 14

Advertising
background image

2-11

Feature

Operation and command

manual

Feature description

SSH2.0

SSH2.0 Configuration
SSH2.0 Commands

Security shell. When routers are connected by
remote users across insecure networks, secure
shell (SSH) can provide them authentication
and security.

z

Configuring the SSH server

z

Configuring the SSH client

z

Configuring the device as an SSH client

Portal

Portal Configuration
Portal Commands

Portal authentication is also called web
authentication and a website implementing
portal authentication is called a portal website.

Public Key

Public Key Configuration
Public Key Commands

z

Local asymmetric key pair configuration

z

The public key of a peer configuration

Web Filtering

Web Filtering Configuration
Web Filtering Commands

z

URL address filtering

z

URL parameter filtering

z

Java blocking

z

ActiveX blocking

z

Filtering rule saving and loading

Connection
Limit

Connection Limit Configuration
Connection Limit Commands

To protect internal network resources (hosts or
servers) and better utilize system resources of
the device, you can configure connection limit
policies to collect statistics on and limit the
number of connections.

z

Creating a connection limit policy

z

Configuring the connection limit policy

z

Applying the connection limit policy

RSH

RSH Configuration
RSH Commands

Remote shell (RSH) allows you to execute the
internal and external commands provided by
the operating system (OS) on a remote host
that runs the RSH daemon.

Return to

Feature Index

.

System Volume

Table 2-8

Features in system volume

Feature

Operation and command

manual

Feature description

GR GR

Overview

Graceful restart. When routing protocol is restarted,
the forwarding service will not be terminated.

z

Supports only FIB6, IS-IS and BGP protocol-level
GR

VRRP

VRRP Configuration
VRRP Commands

Virtual routing redundancy protocol, with which the
system can still provide highly reliable default links
without changing configurations when a device fails.

HA

HA Configuration
HA Commands

High Availability, used to implement high availability
of the system.

Advertising