Table 1: Text Conventions
Examples
Description
Convention
•
Issue the
clock source
command.
•
Specify the keyword
exp-msg
.
•
Click
User Objects
•
Represents commands and keywords
in text.
•
Represents keywords
•
Represents UI elements
Bold typeface like this
user input
Represents text that the user must type.
Bold typeface like this
host1#
show ip ospf
Routing Process OSPF 2 with Router
ID 5.5.0.250
Router is an area Border Router
(ABR)
Represents information as displayed on
the terminal screen.
fixed-width font
Ctrl + d
Indicates that you must press two or more
keys simultaneously.
Key names linked with a plus (+) sign
•
The product supports two levels of
access,
user
and
privileged.
•
clusterID
,
ipAddress.
•
Emphasizes words
•
Identifies variables
Italics
Object Manager > User Objects > Local
Objects
Indicates navigation paths through the UI
by clicking menu options and links.
The angle bracket (>)
Table 2 on page xvi defines syntax conventions used in this guide.
Table 2: Syntax Conventions
Examples
Description
Convention
terminal length
Represent keywords
Words in plain text
mask, accessListName
Represent variables
Words in italics
diagnostic | line
Represent a choice to select one keyword or
variable to the left or right of this symbol. The
keyword or variable can be optional or required.
Words separated by the pipe ( | )
symbol
[ internal | external ]
Represent optional keywords or variables.
Words enclosed in brackets ( [ ] )
[ level1 | level2 | 11 ]*
Represent optional keywords or variables that
can be entered more than once.
Words enclosed in brackets followed
by and asterisk ( [ ]*)
{ permit | deny } { in | out } { clusterId
| ipAddress }
Represent required keywords or variables.
Words enclosed in braces ( { } )
Copyright © 2010, Juniper Networks, Inc.
xvi
Network and Security Manager 2010.4 API Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - API GUIDE REV 1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 10: ...Copyright 2010 Juniper Networks Inc x Network and Security Manager 2010 4 API Guide...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Network and Security Manager 2010 4 API Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager 2010 4 API Guide...
Страница 24: ...Copyright 2010 Juniper Networks Inc 6 Network and Security Manager 2010 4 API Guide...
Страница 34: ...Copyright 2010 Juniper Networks Inc 16 Network and Security Manager 2010 4 API Guide...
Страница 58: ...Figure 10 IDP Rulebase Copyright 2010 Juniper Networks Inc 40 Network and Security Manager 2010 4 API Guide...
Страница 92: ...Copyright 2010 Juniper Networks Inc 74 Network and Security Manager 2010 4 API Guide...
Страница 98: ...Copyright 2010 Juniper Networks Inc 80 Network and Security Manager 2010 4 API Guide...
Страница 100: ...Copyright 2010 Juniper Networks Inc 82 Network and Security Manager 2010 4 API Guide...
Страница 112: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager 2010 4 API Guide...
Страница 128: ...Copyright 2010 Juniper Networks Inc 110 Network and Security Manager 2010 4 API Guide...
Страница 138: ...Copyright 2010 Juniper Networks Inc 120 Network and Security Manager 2010 4 API Guide...
Страница 152: ...Copyright 2010 Juniper Networks Inc 134 Network and Security Manager 2010 4 API Guide...
Страница 165: ...PART 6 Index Index on page 149 147 Copyright 2010 Juniper Networks Inc...
Страница 166: ...Copyright 2010 Juniper Networks Inc 148 Network and Security Manager 2010 4 API Guide...