Nortel Switched Firewall Browser-Based Interface Users Guide

Typographic conventions

The following table describes the typographic styles used in this book.

Table 1 Typographic conventions

Typeface or

Meaning

Example

Symbol

 

 

 

 

 

AaBbCc123

This fixed-width type is used for names of

View the readme.txt file.

 

commands, files, and directories used within

 

 

the text.

 

 

It also depicts on-screen computer output and

Main#

 

prompts.

 

 

 

 

AaBbCc123

This italicized type shows book titles, special

Read your User’s Guide

 

terms, or words to be emphasized.

thoroughly.

AaBbCc123

This fixed-width, bold type appears in com-

Main# sys

 

mand examples. It shows text that must be

 

 

typed in exactly as shown.

 

<AaBbCc123> Italicized type within angle brackets appears in command examples as a parameter place- holder. Replace the indicated text with the appropriate real name or value when using the command. Do not type the brackets.

To establish a Telnet session, enter: host# telnet <IP address>

[ ]

Command items shown inside square brack-

host# ls [-a]

 

ets are optional and can be used or excluded

 

 

as the situation demands. Do not type the

 

 

brackets.

 

 

 

 

Command items separated by the vertical bar

System# autoneg onoff

 

depict a list of possible values, only one of

 

 

which should be entered. The vertical bar is

 

 

considered to mean “or.”

 

 

This can also be used to separate different

Select Edit Copy from

 

selections within a window-based menu bar.

the window’s menu bar.

<Key>

Non-alphanumeric keyboard items are shown

Press the <Enter> key.

 

in regular type inside brackets. When

 

 

directed, press the appropriate key.

 

 

 

 

8 „ Preface

216383-D October 2005

Page 8
Image 8
Nortel Networks 5100 manual Typographic conventions

5100 specifications

Nortel Networks 5100 is a powerful platform designed for telecommunications and networking, primarily aimed at enhancing the solutions provided to service providers and enterprises. Introduced as part of Nortel's robust portfolio, the 5100 combines various features that cater to the demands of modern network environments.

One of the main features of the Nortel 5100 is its versatile targeting capabilities. It supports multiple applications and can function within various access technologies, ensuring that service providers can tailor their services according to specific market needs. The platform is designed to handle a high volume of concurrent users, which is essential for operators managing large subscriber bases.

The Nortel 5100 also incorporates advanced voice and data functionalities. It supports Session Initiation Protocol (SIP), which allows for efficient voice over IP (VoIP) communications. This interoperability with existing telephony systems ensures a smooth transition for enterprises upgrading from traditional systems to modern VoIP frameworks. Furthermore, it enables unified communications, enhancing collaboration within organizations.

Another distinguishing characteristic of the Nortel 5100 is its scalability. Organizations can easily expand their networks and add new services without the need for a complete overhaul of their existing infrastructure. This feature is particularly beneficial for growing companies that require flexibility in operations to adapt to changing market conditions.

Security is a paramount aspect of the Nortel 5100. It includes features that protect sensitive data and maintain the integrity of communications over the network. This is vital for companies that need to comply with stringent regulatory requirements concerning customer data.

Additionally, the platform is designed with robust redundancy and fault tolerance capabilities, which ensures continuous operation even in the event of hardware failures. This high availability is crucial for service providers that need to guarantee uptime for their customers.

In summary, the Nortel Networks 5100 stands out with its versatility, scalability, advanced VoIP functionalities, and robust security features. It serves as a comprehensive solution for both service providers and enterprises, enabling them to enhance their network capabilities and deliver superior services. By embracing such a platform, organizations can achieve greater operational efficiency and adaptability in an increasingly dynamic communication landscape.