WX 60 WX 80 WX/WXC DX Proprietary and Confidential www.juniper.net 5 Juniper Product Icons ISG/IDP Generic NetScreenIDP 10 IDP 600 C Copyright 2005 Juniper Networks, Inc. ISG Generic IDP-50 IDP 600 C IDP Generic NetScreenIDP
100 NetScreenIDP 1000 ISG 1000 ISG 2000 IDP-200 IDP 1100 C IDP 1100 F Proprietary and Confidential www.juniper.net 6 Juniper Product Icons NetScreen5400 NetScreen-50 NetScreen5200 NetScreen-25 NetScreen5GT Copyright 2005 Juniper Networks, Inc. NetScreen5GT ADSL
NetScreen500 NetScreen204 NetScreenHSC 5GT Wireless 5GT Hi Gain NetScreen5XP NetScreen Generic NetScreen5XT NetScreen208 Proprietary and Confidential www.juniper.net 7 Juniper Product Icons Router Generic NetScreen-RA 500 NetScreen-SA 5000 FIPS
Copyright 2005 Juniper Networks, Inc. Firewall IPSec VPN NetScreen-SA Generic SSL VPN NetScreen-SA 1000 NetScreen-SA 3000 NetScreen-SA 5000 NetScreen-SA 3000 FIPS SA 6000 SP SA SP NetScreen-SM 3000 NetScreen-SM Generic
Proprietary and Confidential www.juniper.net 8 Juniper Product Icons SA 700 Copyright 2005 Juniper Networks, Inc. SA 2000 SA 4000 SA 6000 Proprietary and Confidential www.juniper.net 9 Juniper Product Icons SDX-300 Portal NetScreen-SA Central Manager J-Web Copyright 2005 Juniper Networks, Inc. SDX-300
NetScreenSecurity Manager NetScreenRemote Security Client JUNOScope NetScreenRemote VPN Client NMC-RX Element Management System Add your own text For Juniper Software Proprietary and Confidential www.juniper.net 10 Firewall / Security / Virus Icons Regular Firewall Deep Inspection Firewall and Symbol (Separate Icons) Statefull Inspection
Firewall Firewall w/ Antivirus and Symbol (Separate Icons) Virtual Firewall Integrated Security Gateway and Symbol (Separate Icons) Virus1 Virus 2 Worm Secure Please note that symbols on firewalls can be removed as separate pieces Copyright 2005 Juniper Networks, Inc. This is useful in the case of a firewall having more than one of these attributes. The symbols can be placed on or around firewall Proprietary and Confidential www.juniper.net
11 Traffic Icons Multimedia Streaming Music Video Streaming Video Please note that the traffic icon pointers are separate elements in PowerPoint. They are placed behind the icon and rotated to match the path of an underlying line. To rotate, simply select a triangle and activate rotation with the rotate button (from drawing toolbar). If needed - use the order and bring to front command with the icon to place it on top of the pointers. See examples on right of rotated pointers to match path. Notice the icon orientation stays the same - never rotate the icon itself. If you are having trouble finding rotate or bring to front commands, simply type the phrases in the help search for office. Copyright 2005 Juniper Networks, Inc. Voice Traffic Orientation Examples
Proprietary and Confidential www.juniper.net 12 Traffic Icons File Mail MPLS VPN SSL VPN QoS IPSec VPN Endpoint Security Check Copyright 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 13 Generic Product Icons IP PBX Handset Regular CD
VoIP Handset Hub/Switch Copyright 2005 Juniper Networks, Inc. Laptop and Laptop Wireless Cash Register PDA and PDA Wireless Corded Phone Cell Phone and Cell w/Signal IPod Printer Proprietary and Confidential www.juniper.net 14 Generic Product Icons
Databas e Server SIP Server Copyright 2005 Juniper Networks, Inc. Server/ Databas e Video Serve r Applicati on Server Access Server Databa se Server Finance Server Media Server
PC w/Monitor Proprietary and Confidential www.juniper.net 15 Generic Product Icons Generic Databases and Servers (All Separate Icons) Set Top Box Generic Set Top Box Copyright 2005 Juniper Networks, Inc. Digital Video Recorder Box with Media Satellite Proprietary and Confidential www.juniper.net 16 Generic Product Icons PC
Monito r DSL Mode m Cable Modem Routing Gateway PBX Ethernet LAN Switch Layer 2 Switch Switc h Class 5 Switch Game Controll er Televisi on
Barcode Scanner Copyright 2005 Juniper Networks, Inc. Gigabit Ethernet Switch Barcode Router (Generi c) DSLAM Barcode Scanner w/Barcode Proprietary and Confidential www.juniper.net 17 Generic Product Icons Frame Relay Switch Cable Modem Termination System Integrated Access Device
ATM Switch M-CMTS Wireless Access Point Copyright 2005 Juniper Networks, Inc. Voice Softswitch Head end Dial Access Aggregato r VoIP Gateway Cable Head-end ONT Voice Home Gateway
Voice Gateway WDM DWDM Edge QAM Optical Line Termination Proprietary and Confidential www.juniper.net 18 Location Icons Service Provider Data Center Capitol Building Copyright 2005 Juniper Networks, Inc. Corpora te Office Bank
Region/ Branch Office Retail Store Hous e Remo te Office Wireless Tower Hospital Internet Kiosk Proprietary and Confidential www.juniper.net 19 Location Icons Office Tower 1 Office Tower 2 w/Separate and
Removable HQ Sign Building Generic Copyright 2005 Juniper Networks, Inc. Building Generic Corporate Headquarters w/Separate and Removable HQ Sign Cross-Section of Building with Separate and Removable Floors Proprietary and Confidential www.juniper.net 20 User Icons Mobil e User Brain Copyright 2005 Juniper Networks, Inc.
Wirele ss User Peop le Remo te User Hom e User Hack er Proprietary and Confidential www.juniper.net 21 Infranet Icons Infranet Straight View w/Label Infranet Perspective View w/Label Copyright 2005 Juniper Networks, Inc.
Infranet Straight View No Label Infranet Perspective View No Label Proprietary and Confidential www.juniper.net 22 Infranet Icons Internet Clouds Internet Clouds Labeled Copyright 2005 Juniper Networks, Inc. Ovals Internet Clouds Flat Proprietary and Confidential www.juniper.net 23 Internet Icons Infranet Detail Internet Cloud (Separate Icon) Internet Cloud (Separate Icon) On Infranet Large
On Infranet Small Internet Cloud (Separate Icon) Internet Cloud (Separate Icon) On Infranet Large in Perspective On Infranet Small in Perspective Infranet Detail Copyright 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 24 Toolkit Icons QoS Toolkit Copyright 2005 Juniper Networks, Inc. Security Toolkit VPN Toolkit Proprietary and Confidential www.juniper.net 25
Matt Linton Q&A Presentation Team Extended Presentation FISMA & Clouds Matt Chew Spence Steve Hunt Assessment, Authorization, & FedRAMP Steve Hunt OBJECTIVE: Overview of cloud computing and share vocabulary Agenda Introductions Steve Hunt What is cloud computing? Matt Chew Spence...
Arial Calibri Adobe Garamond Pro Bold Office Theme AJAC Systems Hotel Reservation System High Level Architecture High Level Architecture Design Issues Reusability Maintainability Testability: Performance: Portability Safety: Detailed Design Information Relationship Diagram Sequence Diagrams Sequence Diagrams cont. Data Flow Diagram...
Weekly Forecast - Start with ChoiceAdvantage Forecast Overview, estimate how much more you will pick up. Staffing Guideline - Combine the Day by Day Forecast and your standards to find out how many hours to schedule.
Oral cancers, including the area immediately behind the mouth, known as the pharynx (pharyngeal cancer). (C. lick) Mucosal lesions, which are membranes that line various cavities that suffer from injuries, through wounds, ulcers, and tumors, etc. (C. lick) Gingival keratosis,...
Technology in Precalculus The Ambiguous Case of the Law of Sines & Cosines Lalu Simcik Cabrillo College Simplify & Expand Resources What if, on day one of precalculus, students could factor polynomials like: By typing: roots([ 1 2 -5 -6])...
Goals of Cross-Border Data Forum. Fulfill legitimate law enforcement requests for data relevant to the investigation of serious crimes. Protect and promote privacy and human rights as essential to new legal approaches.
Women with the shortest CL have the highest risk of prematurity . The finding of a short CL, irrespective of prior pregnancy history, has been consistently and reproducibly associated with an elevated risk of spontaneous PTB across different gestational age...
Ready to download the document? Go ahead and hit continue!