Audience
This book is intended for system administrators who are responsible for configuring or maintaining networks.
This guide assumes that you are knowledgeable in Layer 2 and Layer 3 networking technologies.
Conventions
This book uses the following conventions to describe command syntax.
Keyword
Keywords are in Courier and must be entered in the CLI as listed.
parameter
Parameters are in italics and require a number or word to be entered in the CLI.
{X}
Keywords and parameters within braces must be entered in the CLI.
[X]
Keywords and parameters within brackets are optional.
x|y
Keywords and parameters separated by a bar require you to choose one option.
x||y
Keywords and parameters separated by a double bar allows you to choose any or all of
the options.
Information Icons
This book uses the following information symbols:
NOTE:
The Note icon signals important operational information.
CAUTION:
The Caution icon signals information about situations that could result in equipment
damage or loss of data.
WARNING:
The Warning icon signals information about hardware handling that could result in injury.
About this Guide
49
Summary of Contents for C9000 series
Page 1: ...Dell Networking Command Line Reference Guide for the C9000 Series Version 9 10 0 0 ...
Page 394: ...deny 14551 666 Dell Access Control Lists ACL 394 ...
Page 877: ...algorithm FIPS Cryptography 877 ...
Page 1297: ...Total 5 0 Total 5 active route s using 952 bytes IPv6 Basics 1297 ...