Many firewall features and functionality are capable
of being configured, viewed, logged, or reported per virtual system.
Therefore, virtual systems are mentioned in other relevant locations
in the documentation and that information is not repeated here.
Some of the specific chapters are the following: