Conventions
Introduction
FortiAnalyzer-2000B Version 4.0 MR1 Rack and Hardware Install Guide
4
Revision 1
http://docs.fortinet.com/
•
Feedback
Fortinet Tools and Documentation CD
Many Fortinet publications are available on the Fortinet Tools and Documentation CD
shipped with your Fortinet product. The documents on this CD are current at shipping
time. For current versions of Fortinet documentation, visit the Fortinet Technical
Documentation web site,
http://docs.fortinet.com
.
Fortinet Knowledge Base
The Fortinet Knowledge Base provides additional Fortinet technical documentation, such
as troubleshooting and how-to-articles, examples, FAQs, technical notes, and more. Visit
the Fortinet Knowledge Base at
http://kb.fortinet.com
.
Comments on Fortinet technical documentation
Please send information about any errors or omissions in this or any Fortinet technical
document to
techdoc@fortinet.com
.
Conventions
Fortinet technical documentation uses the conventions described below.
IP addresses
To avoid publication of public IP addresses that belong to Fortinet or any other
organization, the IP addresses used in Fortinet technical documentation are fictional and
follow the documentation guidelines specific to Fortinet. The addresses used are from the
private IP address ranges defined in RFC 1918: Address Allocation for Private Internets,
available at
http://ietf.org/rfc/rfc1918.txt?number-1918
.
CLI constraints
CLI constraints, such as
<address_ipv4>
, indicate which data types or string patterns
are acceptable input for a given parameter or variable value. CLI constraint conventions
are described in the CLI Reference document for each product.
Notes, Tips and Cautions
Fortinet technical documentation uses the following guidance and styles for notes, tips
and cautions.
Typographical conventions
Fortinet documentation uses the following typographical conventions:
Tip:
Highlights useful additional information, often tailored to your workplace activity.
Note:
Also presents useful information, but usually focused on an alternative, optional
method, such as a shortcut, to perform a step.
Caution:
Warns you about commands or procedures that could have unexpected or
undesirable results including loss of data or damage to equipment.