About the configuration guides
The guides guide you through the software configuration procedures and provide configuration
examples to help you apply the software features to different network scenarios.
Fundamentals Configuration Guide
Covers information about using the command line interface, logging in
to and setting up the device, and using the basic management
features.
This guide includes:
• CLI (command line interface overview and how to use the CLI).
• RBAC.
• Logging in to the device (login methods such as Telnet, and user
interface configuration and access control).
• FTP and TFTP.
• File system management.
• Configuration file management.
• Software upgrade.
• Device management.
• Tcl.
• Python.
• Automatic configuration.
Virtual Technologies Configuration
Guide
Covers Intelligent Resilient Framework (IRF) technology, which
provides data center class availability and scalability.
IRF creates a large virtual device from multiple devices. The IRF
member devices work in 1:N redundancy and appear as one unit in
the network. IRF improves management efficiency and streamlines
network topology. It is suitable for highly reliable enterprise networks
and data centers.
Layer 2—LAN Switching
Configuration Guide
Covers Layer 2 technologies and features used on a LAN switched
network, such as VLAN technology, port isolation, and spanning tree.
You can use these features to divide broadcast domains, remove
Layer 2 loops, isolate users within a VLAN, re-mark VLAN tags, or
implement VLAN VPNs over the Internet.
This guide includes:
• Ethernet interface.
• Loopback, null, and inloopback interfaces.
• Bulk interface configuration.
• MAC address table and MAC Information.
• Ethernet link aggregation.
• Port isolation.
• Spanning tree.
• Loop detection.
• VLAN (including VLAN, private VLAN, and voice VLAN).
• MVRP.
• QinQ.
• VLAN mapping.
• LLDP.
• L2PT.
• PPPoE relay.
Layer 3—IP Services Configuration
Covers IP addressing (including static and dynamic IPv4 and IPv6