Documentation
xvii
Table 2 Text conventions (except for command syntax) (continued)
Convention | Description | Examples | |
Italics | • | Emphasize words. | • There are two levels of access, |
| • | Identify variables. | user and privileged. |
| • clusterId, ipAddress. | ||
| • Identify chapter, appendix, and | ||
|
| ||
|
| book names. | • Appendix A, System Specifications. |
|
| ||
Table 3 Syntax conventions in Command Reference Guide |
| ||
|
|
| |
Convention | Description | Examples | |
Words in plain text | Represent keywords. | terminal length | |
|
|
| |
Words in italics | Represent variables. | mask, accessListName | |
|
|
| |
Words separated by the symbol | Represent a choice to select one | diagnostic line | |
| keyword or variable to the left or |
| |
| right of this symbol. (The keyword or |
| |
| variable may be either optional or |
| |
| required.) |
| |
Words enclosed in [ brackets ] | Represent optional keywords or | [ internal external ] | |
| variables. |
| |
Words enclosed in [ brackets ]* | Represent optional keywords or | [ level1 level2 l1 ]* | |
| variables that can be entered more |
| |
| than once. |
| |
Words enclosed in { braces } | Represent required keywords or | { permit deny } { in out } | |
| variables. | { clusterId ipAddress } | |
|
|
|
|
Documentation
The
With each software release, we provide the
The documentation is also available on the Web. You can order a set of printed documents from your Juniper Networks sales representative.
The document set comprises the following books:
•