12
Check Point IP690 Security Platform Installation Guide
Appendix B, “Compliance Information”
provides compliance and regulatory information.
Conventions this Guide Uses
The following sections describe the conventions this guide uses, including notices, text
conventions, and command-line conventions.
Notices
Warning
Warnings advise the user that either bodily injury might occur because of a physical hazard,
or that damage to a structure, such as a room or equipment closet, might occur because of
equipment damage.
Caution
Cautions indicate potential equipment damage, equipment malfunction, loss of
performance, loss of data, or interruption of service.
Note
Notes provide information of special interest or recommendations.
Command-Line Conventions
Table 1
describes the elements of commands that are available in Check Point business security
products. You might encounter one or more of the following elements on a command-line path.
Table 1 Command-Line Conventions
Convention
Description
command
This required element is usually the product name or other short
word that invokes the product or calls the compiler or preprocessor
script for a compiled Check Point product. It might appear alone or
precede one or more options. You must spell a command exactly
as shown and use lowercase letters.
Italics
Indicates a variable in a command that you must supply. For
example:
delete interface
if_name
Supply an interface name in place of the variable. For example:
delete interface nic1
Summary of Contents for IP690 - Flash Based Sys
Page 6: ...6 Check Point IP690 Security Platform Installation Guide...
Page 8: ...8 Check Point IP690 Security Platform Installation Guide...
Page 10: ...10 Check Point IP690 Security Platform Installation Guide...
Page 26: ...1 Overview 26 Check Point IP690 Security Platform Installation Guide...
Page 110: ...A Technical Specifications 110 Check Point IP690 Security Platform Installation Guide...
Page 118: ...Index 118 Check Point IP690 Security Platform Installation Guide...