Typographical Conventions
The following typographical conventions appear throughout this guide:
l
Text in “double quotes” indicates the introduction of a new term.
l
Italic text is used primarily to indicate variables in command lines, and is also used to
emphasize concepts while discussing Equalizer operation.
l
Boldface
text highlights GUI interface screen elements: labels, buttons, tabs, icons, etc., as
well as data the user must type into a GUI element.
l
Courier
text denotes computer output: messages, commands, file names, directory
names, keywords, and syntax exactly as displayed by the system.
l
Bold courier
text is text the user must type at the CLI prompt. Bold courier text in brack-
ets -- indicates a keyboard key or key sequence that must be typed.
l
Bold text sequences such as “
Cluster > Configuration > Settings
” are used to indicate the GUI con-
trols a user needs to click to display the GUI form relevant to the task at hand. In the above
example, the user would click on the Equalizer host name displayed at the top of the left nav-
igational tree , click on the
Configuration
tab in the right pane, and then click on the
Settings
tab.
1. Numbered lists show steps that you must complete in the numbered order.
l
Bulleted lists identify items that you can address in any order.
Note
- A note box in the margin cites the source of information or provides a brief explanation that supports a specific
statement but is not integral to the logical flow of the text.
The symbol on the left emphasizes a critical note or caution.
Attributions
Many of the icons used in the Web UI and reproduced in this manual are © Copyright 2013
FatCow Web Hosting. All rights reserved. These icons are licensed under a Creative Commons
Attribution 3.0 License (http://creativecommons.org/licenses/by/3.0/us/) and are used without
modification.
Copyright © 2014 Coyote Point Systems, A Subsidiary of Fortinet, Inc.
All Rights Reserved.
21
Equalizer Administration Guide
Summary of Contents for Equalizer GX Series
Page 18: ......
Page 32: ...Overview 32 Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc ...
Page 42: ......
Page 52: ......
Page 64: ......
Page 72: ......
Page 76: ......
Page 228: ......
Page 238: ......
Page 476: ......
Page 492: ......
Page 530: ......
Page 614: ......
Page 626: ......
Page 638: ......
Page 678: ......
Page 732: ...Using SNMP Traps 732 Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc ...
Page 754: ......
Page 790: ......
Page 804: ......
Page 842: ......
Page 866: ......