List Of Technical Publications - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Table 3: Syntax Conventions
Convention
Words in plain text
Words in italics
Words separated by the pipe ( | )
symbol
Words enclosed in brackets ( [ ] )
Words enclosed in brackets followed
by and asterisk ( [ ]*)
Words enclosed in braces ( { } )

List of Technical Publications

Table 4: Network and Security Manager and Secure Access Device Publications
Network and Security Manager
Installation Guide
Network and Security Manager
Administration Guide
Network and Security Manager
Configuring Firewall/VPN Devices
Guide
Network and Security Manager
Online Help
Secure Access Administration Guide
Copyright © 2010, Juniper Networks, Inc.
Description
Represent keywords
Represent variables
Represent a choice to select one keyword or
variable to the left or right of this symbol. The
keyword or variable can be optional or required.
Represent optional keywords or variables.
Represent optional keywords or variables that
can be entered more than once.
Represent required keywords or variables.
This section provides the list of the documentations required for any additional
information.
Details the steps to install the NSM management system on a single server or on separate
servers. It also includes information on how to install and run the NSM user interface.
This guide is intended for IT administrators responsible for the installation and/or upgrade
to NSM.
Describes how to use and configure key management features in the NSM. It provides
conceptual information, suggested workflows, and examples where applicable. This
guide is best used in conjunction with the NSM Online Help, which provides step-by-step
instructions for performing management tasks in the NSM UI.
This guide is intended for application administrators or those individuals responsible for
owning the server and security infrastructure and configuring the product for multi-user
systems. It is also intended for device configuration administrators, firewall and VPN
administrators, and network security operation center administrators.
Describes NSM features that relate to device configuration and management. It also
explains how to configure basic and advanced NSM functionality, including deploying
new device configurations, managing Security Policies and VPNs, and general device
administration.
Provides task-oriented procedures describing how to perform basic tasks in the NSM
user interface. It also includes a brief overview of the NSM system and a description of
the GUI elements.
Provides comprehensive information about configuring the Secure Access appliances.
About This Guide
Examples
terminal length
mask, accessListName
diagnostic | line
[ internal | external ]
[ level1 | level2 | 11 ]*
{ permit | deny } { in | out } { clusterId
| ipAddress }
xv

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents