Table 3 on page xvii defines syntax conventions used in this guide.
Table 3: Syntax Conventions
Examples
Description
Convention
terminal length
Represent keywords
Words in plain text
mask, accessListName
Represent variables
Words in italics
diagnostic | line
Represent a choice to select one keyword or
variable to the left or right of this symbol. The
keyword or variable can be optional or required.
Words separated by the pipe ( | )
symbol
[ internal | external ]
Represent optional keywords or variables.
Words enclosed in brackets ( [ ] )
[ level1 | level2 | 11 ]*
Represent optional keywords or variables that
can be entered more than once.
Words enclosed in brackets followed
by and asterisk ( [ ]*)
{ permit | deny } { in | out } { clusterId
| ipAddress }
Represent required keywords or variables.
Words enclosed in braces ( { } )
Documentation
Table 4 on page xvii describes documentation for NSM.
Table 4: Network and Security Manager Publications
Description
Book
Describes the steps to install the NSM management system on a
single server or on separate servers. It also includes information on
how to install and run the NSM user interface. This guide is intended
for IT administrators responsible for the installation or upgrade of
NSM.
Network and Security
Manager Installation Guide
Describes how to use and configure key management features in
the NSM. It provides conceptual information, suggested workflows,
and examples. This guide is best used in conjunction with the NSM
Online Help, which provides step-by-step instructions for performing
management tasks in the NSM user interface (UI).
This guide is intended for application administrators or those
individuals responsible for owning the server and security
infrastructure and configuring the product for multiuser systems. It
is also intended for device configuration administrators, firewall
and VPN administrators, and network security operation center
administrators.
Network and Security
Manager Administration
Guide
Describes NSM features related to device configuration and
management. It also explains how to configure basic and advanced
NSM functionality, including deploying new device configurations,
managing security policies and VPNs, and general device
administration.
Network and Security
Manager Configuring
ScreenOS Devices Guide
xvii
Copyright © 2010, Juniper Networks, Inc.
About This Guide
Summary of Contents for NETWORK AND SECURITY MANAGER NSM3000 - REV 1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 10: ...Copyright 2010 Juniper Networks Inc x NSMXpress and NSM3000 User Guide...
Page 14: ...Copyright 2010 Juniper Networks Inc xiv NSMXpress and NSM3000 User Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc xx NSMXpress and NSM3000 User Guide...
Page 22: ...Copyright 2010 Juniper Networks Inc 2 NSMXpress and NSM3000 User Guide...
Page 32: ...Copyright 2010 Juniper Networks Inc 12 NSMXpress and NSM3000 User Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 70 NSMXpress and NSM3000 User Guide...
Page 91: ...PART 2 Appendixes NSMXpress LEDs on page 73 71 Copyright 2010 Juniper Networks Inc...
Page 92: ...Copyright 2010 Juniper Networks Inc 72 NSMXpress and NSM3000 User Guide...
Page 95: ...PART 3 Index Index on page 77 75 Copyright 2010 Juniper Networks Inc...
Page 96: ...Copyright 2010 Juniper Networks Inc 76 NSMXpress and NSM3000 User Guide...
Page 100: ...Copyright 2010 Juniper Networks Inc 80 NSMXpress and NSM3000 User Guide...