Table 1: Notice Icons
Description
Meaning
Icon
Indicates important features or instructions.
Informational note
Indicates a situation that might result in loss of data or hardware damage.
Caution
Alerts you to the risk of personal injury or death.
Warning
Alerts you to the risk of personal injury from a laser.
Laser warning
Table 2 on page xiv defines text conventions used in this guide.
Table 2: Text Conventions
Examples
Description
Convention
•
Issue the
clock source
command.
•
Specify the keyword
exp-msg
.
•
Click
User Objects
•
Represents commands and keywords
in text.
•
Represents keywords
•
Represents UI elements
Bold typeface like this
user input
Represents text that the user must type.
Bold typeface like this
host1#
show ip ospf
Routing Process OSPF 2 with Router
ID 5.5.0.250
Router is an area Border Router
(ABR)
Represents information as displayed on
the terminal screen.
fixed-width font
Ctrl + d
Indicates that you must press two or more
keys simultaneously.
Key names linked with a plus (+) sign
•
The product supports two levels of
access,
user
and
privileged.
•
clusterID
,
ipAddress.
•
Emphasizes words
•
Identifies variables
Italics
Object Manager > User Objects > Local
Objects
Indicates navigation paths through the UI
by clicking menu options and links.
The angle bracket (>)
Table 3 on page xv defines syntax conventions used in this guide.
Copyright © 2010, Juniper Networks, Inc.
xiv
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...