Cisco PIX 525 Especificaciones Pagina 26

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 604
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 25
xxiv
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
About This Guide
Document Objectives
Document Conventions
Command descriptions use these conventions:
Braces ({ }) indicate a required choice.
Square brackets ([ ]) indicate optional elements.
Vertical bars ( | ) separate alternative, mutually exclusive elements.
Boldface indicates commands and keywords that are entered literally as shown.
Italics indicate arguments for which you supply values.
Examples use these conventions:
Examples depict screen displays and the command line in screen font.
Information you need to enter in examples is shown in boldface screen font.
Variables for which you must supply a value are shown in
italic screen
font.
Note Means reader take note. Notes contain helpful suggestions or references to material not
covered in the manual.
Chapter 29, “Configuring
Certificates”
Describes how to configure a digital certificates, which contains information that identifies
a user or device. Such information can include a name, serial number, company,
department, or IP address. A digital certificate also contains a copy of the public key for
the user or device.
Part 4: System Administration
Chapter 30, “Managing System
Access”
Describes how to access the security appliance for system management through Telnet,
SSH, and HTTPS.
Chapter 31, “Managing
Software, Licenses, and
Configurations”
Describes how to enter license keys and download software and configurations files.
Chapter 32, “Monitoring and
Troubleshooting”
Describes how to monitor and troubleshoot the security appliance.
Appendix A, “Feature Licenses
and Specifications”
Describes the feature licenses and specifications.
Appendix B, “Sample
Configurations”
Describes a number of common ways to implement the security appliance.
Appendix C, “Using the
Command-Line Interface”
Describes how to use the CLI to configure the the security appliance.
Appendix D, “Addresses,
Protocols, and Ports”
Provides a quick reference for IP addresses, protocols, and applications.
Table 1 Document Organization (continued)
Chapter/Appendix Definition
Vista de pagina 25
1 2 ... 21 22 23 24 25 26 27 28 29 30 31 ... 603 604

Comentarios a estos manuales

Sin comentarios