Conventions

In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.

Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "For testing network connectivity and operability, we can use ICMP-based commands ping and tracert."

A block of code is set as follows:

client 172.16.1.2 {
        secret = YourSecret
        shortname = TrustedWLAN
}

Any command-line input or output is written as follows:

copy running-config startup-config

New terms and important words are shown in bold. Words that you see on the screen, for example, in menus or dialog boxes, appear in the text like this: "We won't use the tabs IOS on Unix and QEMU in our lab, so we will leave these tabs without changes too."

Note

Warnings or important notes appear in a box like this.

Tip

Tips and tricks appear like this.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.116.10.107