Organization
Organization
Conventions
Cisco 1710 Security Router Software Configuration Guide
xii
•
Service providers offering VPN services to enterprise and small-to-medium
sized businesses. Service providers can bundle Cisco VPN hardware with
their service offerings.
Providers of Internet connections to the whole multi-tenant office building.
•
This document contains the following chapters and appendix:
Chapter 1,
"Introduction to Router
•
configuration of a router through Cisco IOS.
Chapter 2,
"Cisco 1710 Security Router
•
need to know about the Cisco IOS software (the software that runs the router)
before you begin to configure the router.
•
Chapter 3,
"Overview of Routing Between Virtual
overview of virtual LANs (VLANs).
•
Chapter 4,
"Configuring Routing Between VLANs with IEEE 802.1Q
Encapsulation"—Describes the required and optional tasks for configuring
routing between VLANs with IEEE 802.1Q encapsulation.
Appendix A,
"ROM
•
the router ROM monitor (also called the bootstrap program), the firmware
that runs when the router is powered up or reset.
This document uses the following conventions:
The caret character (^) represents the Control key.
•
For example, the key combinations ^D and Ctrl-D are equivalent: Both mean
hold down the Control key while you press the D key. Keys are indicated in
capitals, but are not case sensitive.
Command descriptions use these conventions:
•
Commands and keywords in boldface font.
•
Variables for which you supply values are in italic font.
Configuration"—Describes briefly the
Configuration"—Describes what you
Monitor"—Describes the functions and commands of
Preface
LANs"—Provides an
78-12696-01