H3C SecPath W2000-EX0-G Series Web Application Firewall Installation Guide-5W100

HomeSupportSecurityH3C SecPath W2000H3C SecPath W2000Technical DocumentsInstall & UpgradeInstallation GuidesH3C SecPath W2000-EX0-G Series Web Application Firewall Installation Guide-5W100
00-Preface
Title Size Download
00-Preface 136.76 KB

Preface

This configuration guide mainly describes the installation steps.

The preface contains the following contents:

·     Audience:

·     This book agrees

·     Feedback on data opinions

Audience:

This manual is mainly for engineers who:

·     Network planner

·     On-site technical support and maintenance personnel

·     Network administrators responsible for network configuration and maintenance

This book agrees

1. Command line formatting conventions

Format

Meaning

Bold

Command-line keywords (parts of the command that remain unchanged and must be copied) are represented in bold font.

italic

Command-line parameters (parts of the command that must be replaced by actual values) are italicized.

[ ]

The part that indicates that it is enclosed in "[ ]" is optional when the command is configured.

{ x | y | ... }

Indicates that only one of several options is selected.

[ x | y | ... ]

Indicates that one of several options is selected or not selected.

{ x | y | ... } *

Indicates that you choose at least one of several options.

[ x | y | ... ] *

Indicates that you choose one, many, or none of the options.

&<1-n>

The representation symbol & the previous parameter can be entered repeatedly 1~n times.

#

Lines starting with the "#" sign are represented as comment lines.

 

2. Graphical interface format conventions

Format

Meaning

< >

The angled brackets "< >" indicate the button name, such as "Click < OK > button".

[ ]

The square brackets "[ ]" indicate the window name, menu name, and data table, such as "Pop-up [New User] window".

/

The multi-level menu is separated by a "/". For example, the [File/New/Folder] multi-level menu represents [ under the [File] menu  Under the New submenu, the Folder menu item.

 

3. Various signs

The book also uses various conspicuous signs to indicate the places that should be paid special attention during the operation, and the meaning of these signs is as follows:

Warning

The annotations after this sign should be given special attention, and improper operation may cause personal injury.

Attention

Remind you of the precautions that should be paid attention to in the operation, improper operation may result in data loss or device damage.

Prompt

Actions or information that require special attention to ensure that the device is configured successfully or functioning properly.

Instructions

Necessary supplements and explanations are made to the description of the operation content.

Tip

Tips and tricks for configuring, operating, or using equipment.

 

4. icon convention

The icons used in this book and their meanings are as follows:

This icon and its associated descriptions represent general network devices, such as routers, switches, firewalls, etc.

This icon and its associated description represent routers in a general sense, as well as other devices running routing protocols.

The icon and its associated description represent Layer 2 and 3 Ethernet switches, as well as devices running Layer 2 protocols.

The icon and its associated descriptions represent the wireless control engine devices of the wireless controller, the wireless controller business board, and the wired wireless all-in-one switch.

The icon and its associated description represent the wireless access point device.

The icon and its associated description represent the wireless termination unit.

The icon and its associated description represent Wireless Terminator.

The icon and its associated description text represent wireless mesh devices.

This icon represents a divergent radio frequency signal.

This icon represents a point-to-point radio frequency signal.

This icon and its associated descriptions represent security devices such as firewalls, UTMs, multi-service security gateways, and load balancers.

This icon and its related descriptions represent firewall cards, load balancer cards, NetStream cards, SSL VPN cards, IPS cards, ACG cards, and other security cards.

 

5. Example conventions

Due to different device models, different configurations, version upgrades, etc., the content of this manual may be inconsistent with the display information of the device used by the user. Please refer to the content displayed by the device during actual use.

The port numbers in this manual are for example only and do not represent the ports with this number on the device.

Feedback on data opinions

If you find any issues with the product information during use, you can provide feedback in the following ways:

E-mail[email protected]

Thank you for your feedback and let us do better!

 

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us