H3C SR6608 Multi-Core Router

H3C SR6608 Multi-Core Router

H3C’s SR6600 Series of Multi-Core Routers includes a range of core network routers offered by H3C to customers in the carrier, government, energy, financial and educational institutions, and to corporate customers. This series of routers is the first to be built on the basis of a multi-core, multi-threaded architecture. Its all-new hardware platform and service-oriented design meets a wide variety of user expansion requirements, meeting the current state of the IT infrastructure and taking into account future developments.

In routers of this series, all services are processed using a distributed architecture. All services are implemented by FIP (Flexible Interface Platform) modules. No separate service modules are required. H3C’s core Apollo chipset integrates multi-service routing and processing capabilities to ensure high-performance service traffic forwarding. The SR6600 routers use the Comware V7 network operating system, which features support for multiple processors and distributed computing, has a modular design, a high-availability architecture, supports virtualization capabilities, and is open.

The SR6600 series is available in two models: SR6604 and SR6608.

The industry’s first high-performance multi-core router

This series of routers is the first to be built on a multi-core, multi-threaded architecture. This architecture greatly improves performance, flexibility, and programmability, making it easier to use and enabling flexible Layer 4-7 functionality. Hardware acceleration helps security functions and other data link services process faster, allowing more processor resources to be allocated to mission-critical Layer 4-7 services.

Thanks to all these features, routers in this series are well suited for implementing new services in the future and can easily adapt to the configuration of a specific network.

Next generation network operating system

Support for multiple cores, symmetric multiprocessing (SMP), the Comware V7 platform, and independent processes enable dynamic loading and isolated updates. Extensive management capabilities help ensure system availability and performance.

The Comware V7 platform delivers the real-time performance required for core services by reserving specific dedicated processors for critical services . Priority scheduling ensures that processor resources are allocated to essential services in real time, even during periods of high computing load.

Comware V7 supports distributed computing features. Global protocols such as MPLS and BGP can be distributed across processors on different MPUs. Distributed computing provides high system performance.

Fully distributed processing architecture

Separate routing modules, service modules and switching modules , as well as the separation of the control plane from the data plane, guarantee uninterrupted provision of services when switching from the active MPU to the standby one. NAT, IPSec and NetStream services are handled independently by separate modules, which improves system performance and ensures high availability.

WAN IRF2

Intelligent Resilient Framework 2 (IRF2) technology virtualizes two SR6600 routers as a single device. IRF2 virtualization technology reduces network maintenance costs, simplifies configuration, and ensures greater utilization of channel bandwidth and device resources.

Channel aggregation across different devices provides load balancing and redundancy for multiple backbone connections. Various services can be applied to aggregated links, such as Quality of Service (QoS) management, NetStream flow analysis, Network Address Translation (NAT), and data encryption.

Patented stateful failover technology provides real-time redundancy and seamless Layer 3 forwarding for the control plane and data plane. Stateful failover improves the reliability and performance of the virtualized architecture, eliminates critical elements that could cause system failure, and ensures uninterrupted service delivery.

High port density and advanced aggregation capabilities

With RPE-X3 architecture and four-slot service modules, this series can accommodate up to 16 high-speed MIC-X interface modules, providing the best possible performance for WAN port aggregation among routers in this class.

Industry-leading encryption performance

All service modules for this series Features built-in hardware encryption for high performance IPSec processing. This ensures secure transmission of traffic across WANs and intranets without increasing costs.

Outstanding routing capabilities

Devices This series features large memory capacity for routing table entries, supporting multiple routing policies and advanced policy-based routing capabilities. Superior routing performance provides control and planning flexibility to meet a wide range of service requirements for carriers and large enterprises. SR6600 routers support static and dynamic routing protocols for IPv4 and IPv6, such as RIP/RIPng, OSPF/OSPFv3, IS-IS/IS-ISv6 and BGP/BGP4+.

Extensive VPN support functionality

Routers of this series support L2TP, IPsec, GRE protocols and are equipped with an independent encryption processor, which increases encoding performance and the throughput of tunnels necessary for organizing secure gateways. Thanks to these functions, data transmission security is implemented at no additional cost.

Traditional VPN virtual private networks are less flexible, because the access device cannot obtain the public IP address of the device at the other end of the tunnel during the registration process. In addition, traditional VPN solutions are more difficult to maintain because they require N2 connections to create a fully connected network. The routers of this series implement a solution of virtual private networks with automatic discovery (Auto Discovery Virtual Private Network, ADVPN). With ADVPN, VPN connections between branches can be established on access routers with dynamic IP addresses. ADVPN technology increases network flexibility and simplifies its maintenance. Additionally, ADVPN supports features such as NAT-T, security authentication, IPsec encryption, and multi-VPN domains.

To take the hassle out Due to the exponential growth in the number of IKE SAs and IPSec SAs, this series of routers uses the GDVPN mechanism, which offers a group-based IPSec model. GDVPN encapsulates a new IP header that matches the original IP header for packets in which the original IP header does not change, preserving the original routing structure and improving QoS performance. GDVPN creates connections without tunnels, encrypting multicast packets once instead of forwarding multicast packets to each neighboring device, which improves multicast efficiency.

SR6600 routers support MPLS capabilities such as L2VPN, L3VPN and MPLS TE, and can also interface with other router models to build high-performance and secure MPLS VPN solutions.

Comprehensive network security solution

n

In routers of this series, service security is implemented using FIP. FIP modules interface with RSE-X3 MPUs and Comware V7 software, taking over all the processing of traditional service modules, reducing costs and simplifying management.

The routers have the following built-in security features:

Firewall functions – packet filtering firewall, stateful firewall, attack packet filtering and filtering logging records. ACL acceleration algorithm minimizes the impact of ACL filtering on firewall performance.

Built-in attack protection features:

< p style="font-weight: 400;">Single packet attack protection – protects networks from single packet attacks such as Fraggle, ICMP redirect, ICMP unreachable host, LAND, large ICMP packets, route entries, smurf, source routes, TCP flags, Tracert and WinNuke.

Attack protection , aimed at scanning – prevents attackers from scanning IP addresses and ports of various hosts, protecting against finding out the topology and services used.

Protection against flooding attacks – protection from avalanche attacks such as SYN flood, ICMP flood and UDP flood.

Blacklist functions – filtering attacker packets by source IP addresses. Allows you to drop attacker packets received from a specific source IP address.

User tracking – tracking user behavior based on logging and using the IMC UBAS solution.

Intelligent Bandwidth Management

In networks organized according to the primary/backup principle, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the main network.

Intelligent bandwidth management includes the following features:

Unequal-cost multiple routing (UCMP) controls the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.

Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.

CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.

Carrier-grade availability

The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.

This series routers provide various high availability software features as listed in the following table.

unreachable ICMP host, LAND, large ICMP packets, route entries, smurf, source routes, TCP flags, Tracert and WinNuke.

Protection against attacks aimed at scanning – prevents attackers from scanning IP addresses and ports of various hosts, protecting against finding out the topology and services used.

Protection against flooding attacks – protection against flooding attacks such as SYN flood, ICMP flood and UDP flood.

Blacklist functions – filtering attacker packets by source IP addresses. Allows you to drop attacker packets received from a specific source IP address.

User tracking – tracking user behavior based on logging and using the IMC UBAS solution.

Intelligent Bandwidth Management

In networks organized according to the primary/backup principle, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the main network.

Intelligent bandwidth management includes the following features:

Unequal-cost multiple routing (UCMP) controls the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.

Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.

CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.

Carrier-grade availability

The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.

This series routers provide various high availability software features as listed in the following table.

unreachable ICMP host, LAND, large ICMP packets, route entries, smurf, source routes, TCP flags, Tracert and WinNuke.

Protection against attacks aimed at scanning – prevents attackers from scanning IP addresses and ports of various hosts, protecting against finding out the topology and services used.

Protection against flooding attacks – protection against flooding attacks such as SYN flood, ICMP flood and UDP flood.

Blacklist functions – filtering attacker packets by source IP addresses. Allows you to drop attacker packets received from a specific source IP address.

User tracking – tracking user behavior based on logging and using the IMC UBAS solution.

Intelligent Bandwidth Management

In networks organized according to the primary/backup principle, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the main network.

Intelligent bandwidth management includes the following features:

Unequal-cost multiple routing (UCMP) controls the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.

Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.

CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.

Carrier-grade availability

The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.

This series routers provide various high availability software features as listed in the following table.

smurf, source routes, TCP flags, Tracert and WinNuke.

Protection against scanning attacks – prevents attackers from scanning the IP addresses and ports of various hosts, protecting against identifying the topology and services used.

Flooding attack protection – protection against flood attacks such as SYN flood, ICMP flood and UDP flood.

Blacklist functions – filtering of attacker packets by source IP addresses. Allows you to drop attacker packets received from a specific source IP address.

User tracking – tracking user behavior based on logging and using the IMC UBAS solution.

Intelligent Bandwidth Management

In networks organized according to the primary/backup principle, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the main network.

Intelligent bandwidth management includes the following features:

Unequal-cost multiple routing (UCMP) controls the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.

Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.

CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.

Carrier-grade availability

The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.

This series routers provide various high availability software features as listed in the following table.

smurf, source routes, TCP flags, Tracert and WinNuke.

Protection against scanning attacks – prevents attackers from scanning the IP addresses and ports of various hosts, protecting against identifying the topology and services used.

Flooding attack protection – protection against flood attacks such as SYN flood, ICMP flood and UDP flood.

Blacklist functions – filtering of attacker packets by source IP addresses. Allows you to drop attacker packets received from a specific source IP address.

User tracking – tracking user behavior based on logging and using the IMC UBAS solution.

Intelligent Bandwidth Management

In networks organized according to the primary/backup principle, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the main network.

Intelligent bandwidth management includes the following features:

Unequal-cost multiple routing (UCMP) controls the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.

Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.

CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.

Carrier-grade availability

The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.

This series routers provide various high availability software features as listed in the following table.

400;”>Protection against scanning attacks – prevents attackers from scanning IP addresses and ports of various hosts, protecting against identifying the topology and services used.

Protection against flooding attacks – protection against flooding attacks such as SYN flood, ICMP flood and UDP flood.

Blacklist functions – filtering packets of intruders by IP -source addresses. Allows you to drop attacker packets received from a specific source IP address.

User tracking – tracking user behavior based on logging and using an IMC solution UBAS.

Intelligent bandwidth management

In networks organized on the main/backup principle, intelligent bandwidth management tools ability to redirect traffic to backup networks in accordance with policies when high load is detected on the main network.

Intelligent bandwidth management tools include the following functions:

Unequal cost multiple routing (UCMP) – manages the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.

Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.

CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.

Carrier-grade availability

The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.

This series routers provide various high availability software features as listed in the following table.

400;”>Protection against scanning attacks – prevents attackers from scanning IP addresses and ports of various hosts, protecting against identifying the topology and services used.

Protection against flooding attacks – protection against flooding attacks such as SYN flood, ICMP flood and UDP flood.

Blacklist functions – filtering packets of intruders by IP -source addresses. Allows you to drop attacker packets received from a specific source IP address.

User tracking – tracking user behavior based on logging and using an IMC solution UBAS.

Intelligent bandwidth management

In networks organized on the main/backup principle, intelligent bandwidth management tools ability to redirect traffic to backup networks in accordance with policies when high load is detected on the main network.

Intelligent bandwidth management tools include the following functions:

Unequal cost multiple routing (UCMP) – manages the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.

Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.

CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.

Carrier-grade availability

The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.

This series routers provide various high availability software features as listed in the following table.

400;”>Flooding attack protection – protection against flood attacks such as SYN flood, ICMP flood and UDP flood.

Blacklist functions – filtering attacker packets by source IP addresses. Allows you to discard attacker packets received from a specific source IP address.

User tracking – tracking user behavior based on logging and using the IMC UBAS solution.

Intelligent bandwidth management

In networks organized according to the main/backup principle, Intelligent bandwidth management tools redirect traffic to backup networks according to policies when it detects high load on the primary network.

Intelligent bandwidth management tools include the following features:

Unequal Cost Multiple Routing (UCMP) – manages the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.

Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.

CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.

Carrier-grade availability

The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.

This series routers provide various high availability software features as listed in the following table.

400;”>Flooding attack protection – protection against flood attacks such as SYN flood, ICMP flood and UDP flood.

Blacklist functions – filtering attacker packets by source IP addresses. Allows you to discard attacker packets received from a specific source IP address.

User tracking – tracking user behavior based on logging and using the IMC UBAS solution.

Intelligent bandwidth management

In networks organized according to the main/backup principle, Intelligent bandwidth management tools redirect traffic to backup networks according to policies when it detects high load on the primary network.

Intelligent bandwidth management tools include the following features:

Unequal Cost Multiple Routing (UCMP) – manages the load on bandwidth resources using weighting factors. Traffic is routed along routes based on the channel’s capacity.

Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.

CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.

Carrier-grade availability

The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.

This series routers provide various high availability software features as listed in the following table.

400;”>User Tracking – Tracks user behavior based on logging and using the IMC UBAS solution.

Intelligent Bandwidth Management

In networks organized on a primary/backup basis, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the primary network.

Intelligent bandwidth management tools include the following features:

Unequal Cost Multiple Routing (UCMP) – manages bandwidth resource utilization with using weighting coefficients.Traffic is routed along routes depending on the bandwidth of the channel.

Bandwidth reservation and resource sharing – reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.

CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.

Carrier-grade availability

The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.

This series routers provide various high availability software features as listed in the following table.

400;”>User Tracking – Tracks user behavior based on logging and using the IMC UBAS solution.

Intelligent Bandwidth Management

In networks organized on a primary/backup basis, intelligent bandwidth management tools redirect traffic to backup networks in accordance with policies when high load is detected on the primary network.

Intelligent bandwidth management tools include the following features:

Unequal Cost Multiple Routing (UCMP) – manages bandwidth resource utilization with using weighting coefficients.Traffic is routed along routes depending on the bandwidth of the channel.

Bandwidth reservation and resource sharing – reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.

CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.

Carrier-grade availability

The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.

This series routers provide various high availability software features as listed in the following table.

Traffic is routed along routes based on the channel’s capacity.

Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.

CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.

Carrier-grade availability

The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.

This series routers provide various high availability software features as listed in the following table.

Traffic is routed along routes based on the channel’s capacity.

Bandwidth Reservation and Resource Sharing – Reserving bandwidth for various services. The remaining bandwidth is used to service bursts of traffic when the allocated bandwidth is fully utilized.

CAR hierarchy – allows you to reallocate bandwidth to maximize resource utilization.

Carrier-grade availability

The routers of this series implement a distributed architecture and redundancy of MPU processor modules, switch matrix modules and power supplies, as well as the ability to hot-swappable MPU modules, service cards and power supplies. The control plane and service plane are separated. Faulty hardware is automatically isolated.

This series routers provide various high availability software features as listed in the following table.

Additional information

Dimensions 168 × 44 × 64 cm
Chassis

Integrated chassis that can be installed in a 19" rack

MPU module slots

2 (reservation according to the 1+1 scheme)

Slots for service modules

4

Power supplies

1+1 redundancy, Intelligent power management

AC Power Ratings

100 to 240 V AC current, 50/60 Hz

DC Power Ratings

–48 to –60 VDC current

Working temperature

0°C to 45°C (32°F to 113°F)

Operating humidity

5% to 95% non-condensing

Operating altitude

–60 m (–196.85 ft) to +5000 m (+16404.20 ft)

Electromagnetic compatibility

AS/NZS CISPR32 CLASS A, CISPR 24, CISPR 32 CLASS A, EN 301 489-1, EN 301 489-17, EN 55024, EN 55032 CLASS A, EN 61000-3-2, EN 61000-3-3, EN 61000-6-1, ETSI EN 300 386, FCC Part 15 (CFR 47) CLASS A, ICES-003 CLASS A, VCCI CISPR32 CLASS A

Safety

AS/NZS 60950, CAN/CSA-C22.2 No.60950-1, EN 60825-1, EN 60825-2, EN 60950-1/A11, FDA 21 CFR Subpart J, GB 4943, IEC 60950-1, UL 60950-1

Layer 2 protocols

ARP discovery, ARP snooping and filtering, ARP: dynamic ARP, static ARP, ARP proxy, spontaneous ARP requests, Broadcast Suppression, Ethernet and VLAN interfaces, L2TP, LACP, LLDP, DLDP, Port Mirroring, PPP, MP, HDLC, PPPoE Server, PPPoE Server, PPPoE Client, QinQ Double Tag Termination, STP/RSTP/MSTP, VLAN/Super VLAN/VLAN Mapping

IP services

Layer 3 Ethernet interface binding, Policy routing, TCP, UDP, IP option field, Unnumbered IP interfaces

IP routing

BGP GTSM, ECMP, ISIS MTR, Recursive Route Search, RIPv1, RIPv2, OSPFv2, BGP, IS-IS, EIGRP, Static Routing, UCMP

IPv4 multicast

IGMPv1/v2/v3, MBGP, MSDP, Multicast Host Snooping, PIM-DM, PIM-SM, PIM-SSM, Static Multicast Routing

IP applications

DHCP Relay and DHCP Client, DHCP Server, DNS Client, FTP Server and Client, NTP Server and Client, Telnet Server and Client, TFTP Server and Client, UDP Traffic Forwarding (UDP Helper)

IPv6

6VPE (IPv6 MPLS L3VPN), Dual Stack Forwarding, Dynamic Routing Protocols: RIPng , OSPFv3, IS-ISv6 and BGP4+, IPv6 Access Control Lists (ACLs) and DHCPv6 Server/Proxy, IPv6 multicast protocols: MLDv1/v2, PIM6-DM, PIM6-SM and PIM6-SSM, IPv6 PMTU, IPv6 tunneling technologies, IPv6 manual tunnels, IPv6 tunnels in IPv4, GRE tunnels, IPv6 automatic tunneling for IPv4 compatibility, IPv6 to IPv4 tunnels, ISATAP and 6PE tunnels, Key Features: IPv6 Neighbor Discovery (ND), NATPT, Static routing

QoS

Congestion protection: Dropping end of queue (Tail- Drop) and Weighted Random Early Discovery (WRED), GTS Outbound Traffic Limiting, IPv6 QoS, LR data rate limiting, MPLS QoS, Priority Marking/Remarking, QoS Flow classification based on port, MAC address, IP address, IP priority, DSCP priority, TCP/UDP protocol and protocol type, QoS Policy Propagation to BGP (QPPB), Queue Scheduling Mechanisms: FIFO, PQ, CQ, WFQ and RTPQ, as well as CBWFQ, Rate Limiting Based on Source Address and destinations (support for per-segment rate limiting), Traffic Management: CAR rate limiting and custom striding

IP services functions

ADVPN, GDVPN, EVI, GRE Tunnels (One-to-Many Connections), IPsec Tunnels, L2TP Tunnels, NAT, Multiple Instance NAT, NAT for VPN and NAT Logs, NetStreamv5/v8/v9 Formats and statistics on IPv4/IPv6/MPLS packets, SDN, Session Limiting

MPLS

L2VPN: VPLS, Martini, Kompella, CCC and SVC, L3VPN: MPLS for multiple autonomous systems (Option1/Option2/Option3), Hierarchical MPLS VPN, Hierarchy PE (HoPE), Dual-homing CE, MCE and multifunction host, MPLS TE, VPLS/H-VPLS, VPN multicast, NG-MVPN

SDN

BGP-LS, Segment routing, VXLAN, EVPN

Availability

1+1 redundancy of critical components including MPUs, fabric modules, power supplies and fans, BFD, BFD, Fast fault detection for protocols with sub-50ms switchover, EAA, Ethernet OAM, Fast FRR rerouting with sub-50ms switchover and 99 network availability .999%, Fast IGP convergence, GR, Hot-swappable all components, IRF2, ISSU, Non-disruptive software patching, NSF, NSR

Management and maintenance

Alarm Classification, Ambient temperature detection and notifications, CLI configuration, Console port configuration, Fan status detection, maintenance and notifications, Network Quality Analysis NQA (supports links with VRRP, Policy Routing and Static Routing), Ping and Tracert, Power supply status detection, Remote configuration and maintenance via Telnet, RMON, Supports 1, 2, 3 or 9 MIB Groups, SNMPv1/v2/v3, Status detection and maintenance CF cards, System logs, Web-based configuration and management

File system

CF card, FAT format, USB (connect external storage devices)

Download and update

FTP and TFTP, Xmodem

Brand

H3C

The page is under development

This section is under development.

We apologize for the temporary inconvenience

Let call
Please enable JavaScript in your browser to complete this form.