H3C WX5002 Configuration manual

Type
Configuration manual

This manual is also suitable for

H3C WX Series Access Controllers
ACL and QoS Configuration Guide
Abstract
This document describes ACL and QoS configurations. You can use ACL or other match
criteria to classify traffic in your network, and implement flow control based on traffic
classes. With ACL and QoS, you can well allocate the limited network resources, and
improve network usage. The intended audience includes network planners, field
technical support and servicing engineers, and network administrators working with the
WX series.
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
2
Copyright © 2009-2010, Hangzhou H3C Technologies Co., Ltd. and its licensors
No part of this manual may be reproduced or transmitted in any form or by any means
without prior written consent of Hangzhou H3C Technologies Co., Ltd.
The information in this document is subject to change without notice. Every effort has
been made in the preparation of this document to ensure accuracy of the contents.
However, the statements, information, and recommendations in this document do not
constitute a warranty of any kind, express or implied. Hangzhou H3C Technologies Co.,
Ltd. and its licensors shall not be liable for technical or editorial errors or omissions
contained herein.
Acknowledgments
H3C, , Aolynk,
, H
3
Care,
, TOP G, , IRF, NetPilot, Neocean,
NeoVTL, SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA,
VVG, V
2
G, V
n
G, PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of
Hangzhou H3C Technologies Co., Ltd.
All other trademarks that may be mentioned in this manual are the property of their
respective owners.
3
Contents
1 ACL configuration ·············································································································· 8
ACL classification ························································································································· 8
ACL numbering and naming ········································································································· 8
Match order ································································································································ 9
ACL rule numbering ···················································································································· 11
ACL rule numbering step ········································································································ 11
Automatic rule numbering and re-numbering ·········································································· 11
Implementing time-based ACL rules ···························································································· 11
IPv4 fragments filtering with ACLs ································································································· 12
ACL configuration task list ··········································································································· 12
IPv4 ACL configuration task list ································································································ 12
IPv6 ACL configuration task list ································································································ 12
Configuring an ACL ···················································································································· 13
Creating a time range ··········································································································· 13
Configuring a WLAN ACL ······································································································· 13
Configuring a basic ACL ········································································································ 14
Configuring an advanced ACL ······························································································· 16
Configuring an Ethernet frame header ACL ············································································· 18
Copying an ACL ···················································································································· 19
Displaying and maintaining ACLs································································································· 20
ACL configuration examples ······································································································· 21
IPv4 ACL configuration example ····························································································· 21
IPv6 ACL configuration example ····························································································· 22
2 QoS overview ···················································································································24
QoS service models ···················································································································· 24
Best-effort service model ········································································································ 24
4
IntServ model ························································································································ 25
DiffServ model ······················································································································· 25
QoS techniques ························································································································· 25
Applying QoS techniques in a network ···················································································· 26
QoS processing flow in an AC ································································································· 27
3 QoS configuration approaches ··························································································28
Non-policy approach ················································································································· 28
Policy approach ························································································································ 28
Configuring a QoS policy ············································································································ 28
Defining a class ····················································································································· 29
Defining a traffic behavior ······································································································ 30
Defining a policy ··················································································································· 31
Applying the QoS policy ········································································································· 32
Displaying and maintaining QoS policies ················································································· 34
4 Priority mapping configuration ···························································································35
Priority mapping overview ··········································································································· 35
Priority mapping tables ··············································································································· 35
Priority mapping configuration tasks ···························································································· 37
Configuring priority mapping······································································································· 38
Configuring a priority mapping table ······················································································ 38
Configuring a port to trust packet priority for priority mapping··················································· 39
Configuring the port priority of a port ······················································································ 39
Displaying and maintaining priority mapping ················································································ 40
Priority mapping configuration examples (on WX Series access controllers)····································· 41
Trusted priority type configuration example ············································································· 42
Port priority configuration example ························································································· 43
5 Traffic policing and line rate configuration ···········································································45
Traffic evaluation and token bucket ···························································································· 45
Token bucket features ··········································································································· 45
Evaluating traffic with the token bucket ·················································································· 45
5
Complicated evaluation ········································································································ 46
Traffic policing ··························································································································· 46
Line rate ···································································································································· 47
Configuration task list ·················································································································· 48
Configuring traffic policing ·········································································································· 48
Configuring traffic policing in policy-based approach ······························································ 49
Configuring traffic policing in non policy-based approach ······················································· 49
Configuring line rate ··················································································································· 50
Displaying and maintaining line rate ···························································································· 51
6 Congestion management configuration ·············································································52
Causes, impacts, and countermeasures of congestion ································································· 52
Congestion management policies ······························································································ 53
FIFO ······································································································································ 53
Priority queuing ······················································································································ 54
Custom queuing ···················································································································· 55
Congestion management technology comparison ······································································ 55
Configuring PQ ·························································································································· 56
PQ configuration procedure··································································································· 57
PQ configuration example on WX5002 ···················································································· 58
PQ configuration example (on any H3C WX access controllers but WX5002) ······························ 60
Configuring CQ ·························································································································· 60
Configuration procedure ······································································································· 61
CQ configuration example on WX5002···················································································· 62
CQ configuration example (on any H3C WX access controllers but WX5002) ····························· 62
7 Support and other resources ······························································································64
Related documentation ············································································································· 64
Contact us································································································································· 64
Documentation feedback ·········································································································· 64
Technical support ······················································································································· 64
Typographical conventions and symbols ····················································································· 65
6
Command conventions ········································································································· 65
Document conventions ·········································································································· 65
Symbols ································································································································ 66
Index 67
7
NOTE:
The models listed in this document are not applicable to all regions. Please consult your local
sales office for the models applicable to your region.
Support of the H3C WX series access controllers (ACs) for features may vary by AC model. For
more information, see ―Feature Matrix‖ in About the WX Configuration Guides.
The interface types and the number of interfaces vary by AC model.
8
1 ACL configuration
An access control list (ACL) is a set of rules (or permit or deny statements) for identifying
traffic based on criteria such as the source IP address, destination IP address, and port
number.
ACLs are essentially used for packet filtering. A packet filter drops packets that match a
deny rule and permits packets that match a permit rule. ACLs are also widely used by
many modules, for example, QoS and IP routing, for traffic identification.
NOTE:
Unless otherwise stated, ACLs refer to both IPv4 and IPv6 ACLs throughout this document.
ACL classification
ACLs fall into four categories, as shown in Table 1 .
Table 1 ACL categories
Category
ACL number
IP version
Match criteria
WLAN ACLs
100 to 199
IPv4
Wireless client SSID
Basic ACLs
2000 to 2999
IPv4
Source IPv4 address
IPv6
Source IPv6 address
Advanced
ACLs
3000 to 3999
IPv4
Source/destination IPv4 address,
protocols over IPv4, and other Layer 3
and Layer 4 header fields
IPv6
Source/destination IPv6 address,
protocols over IPv6, and other Layer 3
and Layer 4 header fields
Ethernet
frame header
ACLs
4000 to 4999
IPv4
Layer 2 header fields, such as source
and destination MAC addresses, 802.1p
priority, and link layer protocol type
ACL numbering and naming
Each ACL category has a unique range of ACL numbers. When creating an ACL, you
must assign it a number for identification, and in addition, you can also assign the ACL a
9
name for the ease of identification. After creating an ACL with a name, you can neither
rename it nor delete its name.
You cannot assign a name for a WLAN ACL.
For a WLAN ACL, the ACL number and name must be globally unique. For an IPv4 basic
or advanced ACLs, its ACL number and name must be unique among all IPv4 ACLs, and
for an IPv6 basic or advanced ACL, among all IPv6 ACLs. You can assign an IPv4 ACL
the same number and name as an IPv6 ACL.
Match order
The rules in an ACL are sorted in certain order. When a packet matches a rule, the
device stops the match process and performs the action defined in the rule. If an ACL
contains overlapping or conflicting rules, the matching result and action to take
depend on the rule order.
Two ACL match orders are available:
config: Sorts ACL rules in ascending order of rule ID. A rule with a lower ID is
matched before a rule with a higher ID. If you use this approach, check rule
content and order carefully.
auto: Sorts ACL rules in depth-first order. Depth-first ordering ensures that any subset
of a rule is always matched before the rule. The depth-first ordering procedure
varies with ACL categories, as shown in Table 2 .
NOTE:
The rule order of WLAN ACLs can only be config.
Table 2 Sorting ACL rules in depth-first order
ACL category
Depth-first rule sorting procedures
IPv4 basic ACL
1. The rule configured with a VPN instance takes precedence.
2. The rule with more 0s in the source IP address wildcard mask takes
precedence. More 0s means a narrower IP address range.
3. The rule with a smaller rule ID takes precedence.
10
ACL category
Depth-first rule sorting procedures
IPv4 advanced
ACL
1. The rule configured with a VPN instance takes precedence.
2. The rule configured with a specific protocol is prior to a rule with the
protocol type set to IP. IP represents any protocol over IP.
3. The rule with more 0s in the source IP address wildcard mask takes
precedence. More 0s means a narrower IP address range.
4. The rule with more 0s in the destination IP address wildcard mask takes
precedence.
5. The rule with a narrower TCP/UDP service port number range takes
precedence.
6. The rule with a smaller ID takes precedence.
IPv6 basic ACL
1. The rule configured with a longer prefix for the source IP address takes
precedence. A longer prefix means a narrower IP address range.
2. The rule with a smaller ID takes precedence.
IPv6 advanced
ACL
1. The rule configured with a specific protocol is prior to a rule with the
protocol type set to IP. IP represents any protocol over IPv6.
2. The rule configured with a longer prefix for the source IPv6 address has a
higher priority.
3. The rule configured with a longer prefix for the destination IPv6 address
takes precedence.
4. The rule with a narrower TCP/UDP service port number range takes
precedence.
5. The rule with a smaller ID takes precedence.
Ethernet frame
header ACL
1. The rule with more 1s in the source MAC address mask takes precedence.
More 1s means a smaller MAC address.
2. The rule with more 1s in the destination MAC address mask takes
precedence.
3. The rule with a smaller ID takes precedence.
NOTE:
Currently, the AC does not support ACL rules with the VPN instance attribute.
A wildcard mask, also called an inverse mask, is a 32-bit binary and represented in dotted
decimal notation. In contrast to a network mask, the 0 bits in a wildcard mask represent ‗do
care‘ bits, while the 1 bits represent 'don‘t care bits.' If the 'do care' bits in an IP address are
identical to the 'do care' bits in an IP address criterion, the IP address matches the criterion. All
'don‘t care' bits are ignored. The 0s and 1s in a wildcard mask can be noncontiguous. For
example, 0.255.0.255 is a valid wildcard mask.
11
ACL rule numbering
ACL rule numbering step
If you do not assign an ID for the rule you are creating, the system automatically assigns
it a rule ID. The rule numbering step sets the increment by which the system
automatically numbers rules. For example, the default ACL rule numbering step is 5. If
you do not assign IDs to rules you are creating, they are numbered 0, 5, 10, 15, and so on.
The wider the numbering step, the more rules you can insert between two rules.
By introducing a gap between rules rather than contiguously numbering rules, you have
the flexibility of inserting rules in an ACL. This feature is important for a config order ACL,
where ACL rules are matched in ascending order of rule ID.
Automatic rule numbering and re-numbering
The ID automatically assigned to an ACL rule takes the nearest higher multiple of the
numbering step to the current highest rule ID, starting with 0.
For example, if the numbering step is 5 (the default), and there are five ACL rules
numbered 0, 5, 9, 10, and 12, the newly defined rule is numbered 15. If the ACL does not
contain any rule, the first rule is numbered 0.
Whenever the step changes, the rules are renumbered, starting from 0. For example, if
there are five rules numbered 5, 10, 13, 15, and 20, changing the step from 5 to 2 causes
the rules to be renumbered 0, 2, 4, 6 and 8.
Implementing time-based ACL rules
You can implement ACL rules based on the time of day by applying a time range to
them. A time-based ACL rule takes effect only in any time periods specified by the time
range.
Two basic types of time range are available:
Periodic time range, which recurs periodically on a day or days of the week.
Absolute time range, which represents only a period of time and does not recur.
You may apply a time range to ACL rules before or after you create it. However, the
rules using the time range can take effect only after you define the time range.
12
IPv4 fragments filtering with ACLs
Traditional packet filtering matched only first fragments of IPv4 packets, and allowed all
subsequent non-first fragments to pass through. This mechanism resulted in security risks,
because attackers may fabricate non-first fragments to attack networks.
To avoids the risks, the H3C ACL implementation:
Filters all fragments by default, including non-first fragments.
Provides standard and exact match modes for matching ACLs that contain
advanced attributes such as TCP/UDP port number and ICMP type. Standard
match is the default mode. It considers only Layer 3 attributes. Exact match
considers all header attributes defined in IPv4 ACL rules.
ACL configuration task list
IPv4 ACL configuration task list
Complete the following tasks to configure an IPv4 ACL:
Creating a time range (Optional)
The following four tasks are required: (Configure at least one task.)
Configuring a WLAN ACL
Configuring an IPv4 basic ACL
Configuring an IPv4 advanced ACL
Configuring an Ethernet frame header ACL
Copying an IPv4 ACL (Optional)
IPv6 ACL configuration task list
Complete the following tasks to configure an IPv6 ACL:
Creating a time range (Optional)
The following two tasks are required: (Configure at least one task.)
Configuring an IPv6 basic ACL
Configuring an IPv6 advanced ACL
Copying an IPv6 ACL (Optional)
13
Configuring an ACL
Creating a time range
Follow these steps to create a time range:
Use the command…
Remarks
system-view
––
time-range
time-range-name
{ start-time to end-time days
[ from time1 date1 ] [ to
time2 date2 ] | from time1
date1 [ to time2 date2 ] | to
time2 date2 }
Required
By default, no time range
exists.
You may create time ranges identified with the same name. They are regarded as one
time range whose active period is the result of ORing periodic ones, ORing absolute
ones, and ANDing periodic and absolute ones.
You may create a maximum of 256 uniquely named time ranges, each with 32 periodic
time ranges at most and 12 absolute time ranges at most.
Configuring a WLAN ACL
WLAN ACLs match packets based on SSIDs of wireless clients.
Follow these steps to configure a WLAN ACL:
Use the command
Remarks
system-view
––
acl number acl-number
Required
By default, no ACL exists.
WLAN ACLs are numbered in
the range 100 to 199.
description text
Optional
By default, a WLAN ACL has
no ACL description.
step step-value
Optional
5 by default
14
Use the command
Remarks
rule [ rule-id ] { permit |
deny } [ ssid ssid-name ]
Required
By default, a WLAN ACL
does not contain any rule.
To create or edit multiple
rules, repeat this step.
rule rule-id comment text
Optional
By default, a WLAN ACL rule
has no description.
Configuring a basic ACL
Configuring an IPv4 basic ACL
IPv4 basic ACLs match packets based on only source IP address.
Follow these steps to configure an IPv4 basic ACL:
Use the command…
Remarks
system-view
––
acl number acl-number
[ name acl-name ]
[ match-order { auto |
config } ]
Required
By default, no ACL exists.
IPv4 basic ACLs are
numbered in the range 2000
to 2999.
You can use the acl name
acl-name command to
enter the view of an existing
named IPv4 ACL.
description text
Optional
By default, an IPv4 basic
ACL has no ACL description.
step step-value
Optional
5 by default
15
Use the command…
Remarks
rule [ rule-id ] { deny |
permit } [ fragment | logging
| source { sour-addr
sour-wildcard | any } |
time-range
time-range-name ] *
Required
By default, an IPv4 basic
ACL does not contain any
rule.
To create or edit multiple
rules, repeat this step.
The logging keyword takes
effect only when the
module that uses the ACL
supports logging.
rule rule-id comment text
Optional
By default, an IPv4 ACL rule
has no rule description.
Configuring an IPv6 basic ACL
Follow these steps to configure an IPv6 basic ACL:
Use the command…
Remarks
system-view
––
acl ipv6 number
acl6-number [ name
acl6-name ] [ match-order
{ auto | config } ]
Required
By default, no ACL exists.
IPv6 basic ACLs are
numbered in the range 2000
to 2999.
You can use the acl ipv6
name acl6-name command
to enter the view of an
existing named IPv6 ACL.
description text
Optional
By default, an IPv6 basic
ACL has no ACL description.
step step-value
Optional
5 by default
16
Use the command…
Remarks
rule [ rule-id ] { deny |
permit } [ fragment | logging
| source { ipv6-address
prefix-length |
ipv6-address/prefix-length |
any } | time-range
time-range-name ] *
Required
By default, an IPv6 basic
ACL does not contain any
rule.
To create or edit multiple
rules, repeat this step.
The logging keyword takes
effect only when the
module using the ACL
supports logging.
rule rule-id comment text
Optional
By default, an IPv6 basic
ACL rule has no rule
description.
Configuring an advanced ACL
Configuring an IPv4 advanced ACL
IPv4 advanced ACLs match packets based on source and destination IP addresses,
protocols over IP, and other protocol header information, such as TCP/UDP source and
destination port numbers, TCP flags, ICMP message types, and ICMP message codes.
IPv4 advanced ACLs also allow you to filter packets based on three priority criteria: type
of service (ToS), IP precedence, and differentiated services codepoint (DSCP) priority.
Compared with IPv4 basic ACLs, IPv4 advanced ACLs allow of more flexible and
accurate filtering.
Follow these steps to configure an IPv4 advanced ACL:
Use the command…
Remarks
system-view
––
acl number acl-number
[ name acl-name ]
[ match-order { auto |
config } ]
Required
By default, no ACL exists.
IPv4 advanced ACLs are
numbered in the range 3000
to 3999.
You can use the acl name
acl-name command to
enter the view of an existing
named IPv4 ACL.
17
Use the command…
Remarks
description text
Optional
By default, an IPv4
advanced ACL has no ACL
description.
step step-value
Optional
5 by default
rule [ rule-id ] { deny |
permit } protocol [ { { ack
ack-value | fin fin-value |
psh psh-value | rst rst-value
| syn syn-value | urg
urg-value } * | established }
| destination { dest-addr
dest-wildcard | any } |
destination-port operator
port1 [ port2 ] | dscp dscp |
fragment | icmp-type
{ icmp-type icmp-code |
icmp-message } | logging |
precedence precedence |
reflective | source
{ sour-addr sour-wildcard |
any } | source-port operator
port1 [ port2 ] | time-range
time-range-name | tos tos] *
Required
By default, an IPv4
advanced ACL does not
contain any rule.
To create or edit multiple
rules, repeat this step.
The logging keyword takes
effect only when the
module using the ACL
supports logging.
rule rule-id comment text
Optional
By default, an IPv4
advanced ACL rule has no
rule description.
Configuring an IPv6 advanced ACL
IPv6 advanced ACLs match packets based on the source IPv6 address, destination IPv6
address, protocol carried over IPv6, and other protocol header fields such as the
TCP/UDP source port number, TCP/UDP destination port number, ICMP message type,
and ICMP message code.
Compared with IPv6 basic ACLs, they allow of more flexible and accurate filtering.
Follow these steps to configure an IPv6 advanced ACL:
To do…
Use the command…
Remarks
Enter system view
system-view
––
18
To do…
Use the command…
Remarks
Create an IPv6
advanced ACL and
enter its view
acl ipv6 number acl6-number
[ name acl6-name ]
[ match-order { auto | config } ]
Required
By default, no ACL exists.
IPv6 advanced ACLs are
numbered in the range
3000 to 3999.
You can use the acl ipv6
name acl6-name
command to enter the
view of an existing named
IPv6 ACL.
Configure a description
for the IPv6 advanced
ACL
description text
Optional
By default, an IPv6
advanced ACL has no
ACL description.
Set the rule numbering
step
step step-value
Optional
5 by default
Create or edit a rule
rule [ rule-id ] { deny | permit }
protocol [ { { ack ack-value | fin
fin-value | psh psh-value | rst
rst-value | syn syn-value | urg
urg-value } * | established } |
destination { dest dest-prefix |
dest/dest-prefix | any } |
destination-port operator port1
[ port2 ] | dscp dscp | fragment
| icmp6-type { icmp6-type
icmp6-code | icmp6-message }
| logging | source { source
source-prefix |
source/source-prefix | any } |
source-port operator port1
[ port2 ] | time-range
time-range-name ] *
Required
By default IPv6 advanced
ACL does not contain any
rule.
To create or edit multiple
rules, repeat this step.
The logging keyword takes
effect only when the
module using the ACL
supports logging.
Configure or edit a rule
description
rule rule-id comment text
Optional
By default, an IPv6
advanced ACL rule has no
rule description.
Configuring an Ethernet frame header ACL
Ethernet frame header ACLs, also called Layer 2 ACLs, match packets based on Layer 2
protocol header fields such as source MAC address, destination MAC address, 802.1p
priority (VLAN priority), and link layer protocol type.
19
Follow these steps to configure an Ethernet frame header ACL:
Use the command…
Remarks
system-view
––
acl number acl-number
[ name acl-name ]
[ match-order { auto |
config } ]
Required
By default, no ACL exists.
Ethernet frame header ACLs
are numbered in the range
4000 to 4999.
You can use the acl name
acl-name command to
enter the view of an existing
named Ethernet frame
header ACL.
description text
Optional
By default, an Ethernet
frame header ACL has no
ACL description.
step step-value
Optional
5 by default
rule [ rule-id ] { deny |
permit } [ cos vlan-pri |
dest-mac dest-addr
dest-mask | { lsap lsap-type
lsap-type-mask | type
protocol-type
protocol-type-mask } |
source-mac sour-addr
source-mask | time-range
time-range-name ] *
Required
By default
,
an Ethernet
frame header ACL does not
contain any rule.
To create or edit multiple
rules, repeat this step.
rule rule-id comment text
Optional
By default, an Ethernet
frame header ACL rule has
no rule description.
Copying an ACL
You can create an ACL by copying an existing ACL. The new ACL has the same
properties and content as the source ACL except the ACL number and name.
To copy an IPv4 or IPv6 ACL successfully, ensure that:
The destination ACL number is from the same category as the source ACL number.
20
The source IPv4 or IPv6 ACL already exists but the destination IPv4 or IPv6 ACL does
not.
Copying an IPv4 ACL
Follow these steps to copy an IPv4 ACL:
Use the command…
Remarks
system-view
acl copy
{ source-acl-number | name
source-acl-name } to
{ dest-acl-number | name
dest-acl-name }
Required
The name keyword is not
available for WLAN ACLs
Copying an IPv6 ACL
Follow these steps to copy an IPv6 ACL:
Use the command…
Remarks
system-view
acl ipv6 copy
{ source-acl6-number |
name source-acl6-name } to
{ dest-acl6-number | name
dest-acl6-name }
Required
Displaying and maintaining ACLs
Use the command…
Remarks
display acl { acl-number | all | name
acl-name }
Available in any
view
display acl ipv6 { acl6-number | all |
name acl6-name }
Available in any
view
display time-range
{ time-range-name | all }
Available in any
view
reset acl counter { acl-number | all |
name acl-name }
Available in user
view
reset acl ipv6 counter { acl6-number |
all | name acl6-name }
Available in user
view
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69

H3C WX5002 Configuration manual

Type
Configuration manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI