- Table of Contents
- Related Documents
-
| Title | Size | Download |
|---|---|---|
| 00-Preface | 136.76 KB |
Preface
This configuration guide mainly describes the installation steps.
The preface contains the following contents:
Audience:
This manual is mainly for engineers who:
· Network planner
· On-site technical support and maintenance personnel
· Network administrators responsible for network configuration and maintenance
This book agrees
1. Command line formatting conventions
|
Format |
Meaning |
|
Bold |
Command-line keywords (parts of the command that remain unchanged and must be copied) are represented in bold font. |
|
italic |
Command-line parameters (parts of the command that must be replaced by actual values) are italicized. |
|
[ ] |
The part that indicates that it is enclosed in "[ ]" is optional when the command is configured. |
|
{ x | y | ... } |
Indicates that only one of several options is selected. |
|
[ x | y | ... ] |
Indicates that one of several options is selected or not selected. |
|
{ x | y | ... } * |
Indicates that you choose at least one of several options. |
|
[ x | y | ... ] * |
Indicates that you choose one, many, or none of the options. |
|
&<1-n> |
The representation symbol & the previous parameter can be entered repeatedly 1~n times. |
|
# |
Lines starting with the "#" sign are represented as comment lines. |
2. Graphical interface format conventions
|
Format |
Meaning |
|
< > |
The angled brackets "< >" indicate the button name, such as "Click < OK > button". |
|
[ ] |
The square brackets "[ ]" indicate the window name, menu name, and data table, such as "Pop-up [New User] window". |
|
/ |
The multi-level menu is separated by a "/". For example, the [File/New/Folder] multi-level menu represents [ under the [File] menu Under the New submenu, the Folder menu item. |
3. Various signs
The book also uses various conspicuous signs to indicate the places that should be paid special attention during the operation, and the meaning of these signs is as follows:
|
Warning |
The annotations after this sign should be given special attention, and improper operation may cause personal injury. |
|
Attention |
Remind you of the precautions that should be paid attention to in the operation, improper operation may result in data loss or device damage. |
|
Prompt |
Actions or information that require special attention to ensure that the device is configured successfully or functioning properly. |
|
Instructions |
Necessary supplements and explanations are made to the description of the operation content. |
|
Tip |
Tips and tricks for configuring, operating, or using equipment. |
4. icon convention
The icons used in this book and their meanings are as follows:
|
This icon and its associated descriptions represent general network devices, such as routers, switches, firewalls, etc. |
|
|
This icon and its associated description represent routers in a general sense, as well as other devices running routing protocols. |
|
|
The icon and its associated description represent Layer 2 and 3 Ethernet switches, as well as devices running Layer 2 protocols. |
|
|
The icon and its associated descriptions represent the wireless control engine devices of the wireless controller, the wireless controller business board, and the wired wireless all-in-one switch. |
|
|
The icon and its associated description represent the wireless access point device. |
|
|
The icon and its associated description represent the wireless termination unit. |
|
|
The icon and its associated description represent Wireless Terminator. |
|
|
The icon and its associated description text represent wireless mesh devices. |
|
|
This icon represents a divergent radio frequency signal. |
|
|
This icon represents a point-to-point radio frequency signal. |
|
|
This icon and its associated descriptions represent security devices such as firewalls, UTMs, multi-service security gateways, and load balancers. |
|
|
This icon and its related descriptions represent firewall cards, load balancer cards, NetStream cards, SSL VPN cards, IPS cards, ACG cards, and other security cards. |
5. Example conventions
Due to different device models, different configurations, version upgrades, etc., the content of this manual may be inconsistent with the display information of the device used by the user. Please refer to the content displayed by the device during actual use.
The port numbers in this manual are for example only and do not represent the ports with this number on the device.
Feedback on data opinions
If you find any issues with the product information during use, you can provide feedback in the following ways:
E-mail:[email protected]
Thank you for your feedback and let us do better!
