Documentation; About This Guide; Table 3: Syntax Conventions; Table 4: Network And Security Manager Publications - Juniper NETWORK AND SECURITY MANAGER 2010.4 - INSTALLATION GUIDE REV1 Installation Manual

Table of Contents

Advertisement

Table 3: Syntax Conventions

Convention
Words in plain text
Words in italics
Words separated by the pipe ( | )
symbol
Words enclosed in brackets ( [ ] )
Words enclosed in brackets followed
by an asterisk ( [ ]*)
Words enclosed in braces ( { } )

Documentation

Copyright © 2010, Juniper Networks, Inc.
Description
Represent keywords
Represent variables
Represent a choice to select one keyword or
variable to the left or right of this symbol. The
keyword or variable can be optional or required.
Represent optional keywords or variables.
Represent optional keywords or variables that
can be entered more than once.
Represent required keywords or variables.
Table 4 on page xix describes documentation for NSM.

Table 4: Network and Security Manager Publications

Book
Network and Security
Manager Installation Guide
Network and Security
Manager Administration
Guide
Network and Security
Manager Configuring
ScreenOS Devices Guide
Network and Security
Manager Configuring
Intrusion Detection and
Prevention Devices Guide
Description
Describes the steps to install the NSM management system on a
single server or on separate servers. It also includes information on
how to install and run the NSM user interface. This guide is intended
for IT administrators responsible for the installation or upgrade of
NSM.
Describes how to use and configure key management features in
the NSM. It provides conceptual information, suggested workflows,
and examples. This guide is best used in conjunction with the NSM
Online Help, which provides step-by-step instructions for performing
management tasks in the NSM UI.
This guide is intended for application administrators or those
individuals responsible for owning the server and security
infrastructure and configuring the product for multi-user systems.
It is also intended for device configuration administrators, firewall
and VPN administrators, and network security operation center
administrators.
Provides details about configuring device features for all supported
ScreenOS platforms.
Provides details about configuring device features for all supported
Intrusion Detection and Prevention (IDP) platforms.

About This Guide

Examples
terminal length
mask, accessListName
diagnostic | line
[ internal | external ]
[ level1 | level2 | 11 ]*
{ permit | deny } { in | out } { clusterId
| ipAddress }
xix

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - INSTALLATION GUIDE REV1 and is the answer not in the manual?

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents