Table 2: Text Conventions (continued)
Convention
Italics
The angle bracket (>)
Table 3: Syntax Conventions
Convention
Words in plain text
Words in italics
Words separated by the pipe ( | )
symbol
Words enclosed in brackets ( [ ] )
Words enclosed in brackets followed
by an asterisk ( [ ]*)
Words enclosed in braces ( { } )
Documentation
Copyright © 2010, Juniper Networks, Inc.
Description
Emphasizes words
Identifies variables
Indicates navigation paths through the UI
by clicking menu options and links.
Table 3 on page xlvii defines syntax conventions used in this guide.
Description
Represent keywords
Represent variables
Represent a choice to select one keyword or
variable to the left or right of this symbol. The
keyword or variable can be optional or required.
Represent optional keywords or variables.
Represent optional keywords or variables that
can be entered more than once.
Represent required keywords or variables.
Table 4 on page xlvii describes documentation for the NSM.
Table 4: Network and Security Manager Publications
Book
Network and Security
Manager Installation Guide
Examples
The product supports two levels of
access, user and privileged.
clusterID, ipAddress.
Object Manager > User Objects > Local
Objects
Description
Describes the steps to install the NSM management system on a
single server or on separate servers. It also includes information on
how to install and run the NSM user interface. This guide is intended
for IT administrators responsible for the installation or upgrade of
NSM.
About This Guide
Examples
terminal length
mask, accessListName
diagnostic | line
[ internal | external ]
[ level 1 | level 2 | 11 ]*
{ permit | deny } { in | out } { clusterId
| ipAddress }
xlvii
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?
Questions and answers