Conventions this Guide Uses
Check Point IP690 Security Platform Installation Guide
13
angle brackets < >
Indicates arguments for which you must supply a value:
retry-limit <1–100>
Supply a value. For example:
retry-limit 60
Square brackets [ ]
Indicates optional arguments.
delete [slot
slot_num
]
For example:
delete slot 3
Vertical bars,
also called a
pipe
(|)
Separates alternative, mutually exclusive elements.
framing <sonet | sdh>
To complete the command, supply the value. For example:
framing sonet
or
framing sdh
-flag
A flag is usually an abbreviation for a function, menu, or option
name, or for a compiler or preprocessor argument. You must enter
a flag exactly as shown, including the preceding hyphen.
.ext
A filename extension, such as .ext, might follow a variable that
represents a filename. Type this extension exactly as shown,
immediately after the name of the file. The extension might be
optional in certain products.
( . , ; + * - / )
Punctuation and mathematical notations are literal symbols that
you must enter exactly as shown.
' '
Single quotation marks are literal symbols that you must enter as
shown.
Table 1 Command-Line Conventions (
continued
)
Convention
Description
Summary of Contents for IP690 - Flash Based Sys
Page 6: ...6 Check Point IP690 Security Platform Installation Guide...
Page 8: ...8 Check Point IP690 Security Platform Installation Guide...
Page 10: ...10 Check Point IP690 Security Platform Installation Guide...
Page 26: ...1 Overview 26 Check Point IP690 Security Platform Installation Guide...
Page 110: ...A Technical Specifications 110 Check Point IP690 Security Platform Installation Guide...
Page 118: ...Index 118 Check Point IP690 Security Platform Installation Guide...