diff options
author | Robert Göhler <github@ghlr.de> | 2023-11-29 22:24:21 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2023-11-29 22:24:21 +0100 |
commit | 8a11b8b129f78d3d97d9b69ac0dfa219c8527827 (patch) | |
tree | afd34017b22276417797004601e56128fd69fb7e | |
parent | 9bfe2ec7e9f83970a6aea23d4739f07ddd756e0d (diff) | |
parent | 690647a1dfc17740f0782c39297dac986f9051df (diff) | |
download | vyos-documentation-8a11b8b129f78d3d97d9b69ac0dfa219c8527827.tar.gz vyos-documentation-8a11b8b129f78d3d97d9b69ac0dfa219c8527827.zip |
Merge pull request #1168 from Giggum/sagitta_giggum
Sagitta_giggum pull request for fix to 1.4.x sagitta documentation
-rw-r--r-- | docs/configuration/firewall/global-options.rst | 4 | ||||
-rw-r--r-- | docs/quick-start.rst | 4 |
2 files changed, 4 insertions, 4 deletions
diff --git a/docs/configuration/firewall/global-options.rst b/docs/configuration/firewall/global-options.rst index 316e0802..9c9a1a1e 100644 --- a/docs/configuration/firewall/global-options.rst +++ b/docs/configuration/firewall/global-options.rst @@ -111,7 +111,7 @@ Configuration .. cfgcmd:: set firewall global-options twa-hazards-protection [enable | disable] - Enable or Disable VyOS to be :rfc:`1337` conform. + Enable or Disable VyOS to be :rfc:`1337` conforming. The following system parameter will be altered: - * ``net.ipv4.tcp_rfc1337``
\ No newline at end of file + * ``net.ipv4.tcp_rfc1337`` diff --git a/docs/quick-start.rst b/docs/quick-start.rst index b94cd948..e5094468 100644 --- a/docs/quick-start.rst +++ b/docs/quick-start.rst @@ -144,7 +144,7 @@ which was not initiated from the internal/LAN side first. set firewall ipv4 forward filter rule 10 state related 'enable' set firewall ipv4 forward filter rule 20 action 'drop' set firewall ipv4 forward filter rule 20 state invalid 'enable' - set firewall ipv4 forward filter rule 30 inbound-interface interface-name 'eth1' + set firewall ipv4 forward filter rule 30 inbound-interface name 'eth1' set firewall ipv4 forward filter rule 30 action 'accept' set firewall ipv4 input filter default-action drop @@ -168,7 +168,7 @@ blocks brute-forcing attempts: .. code-block:: none set firewall ipv4 input filter rule 40 action 'drop' - set firewall ipv4 input filter rule 40 inbound-interface interface-name 'eth0' + set firewall ipv4 input filter rule 40 inbound-interface name 'eth0' set firewall ipv4 input filter rule 40 destination port '22' set firewall ipv4 input filter rule 40 protocol 'tcp' set firewall ipv4 input filter rule 40 recent count '4' |