summaryrefslogtreecommitdiff
path: root/docs/configexamples
diff options
context:
space:
mode:
authorsrividya0208 <a.srividya@vyos.io>2024-05-06 13:49:48 -0400
committersrividya0208 <a.srividya@vyos.io>2024-05-06 13:49:48 -0400
commit0e98fdb64154011850ba5705b9c6f8e74868c955 (patch)
tree8ca77801871c8c40c4543908269abaacbe737367 /docs/configexamples
parent377ab20c2e00df3975a3b74cac8a51b79bce3519 (diff)
downloadvyos-documentation-0e98fdb64154011850ba5705b9c6f8e74868c955.tar.gz
vyos-documentation-0e98fdb64154011850ba5705b9c6f8e74868c955.zip
Modified old option from 'enable-default-log' to new one 'default-log'
Diffstat (limited to 'docs/configexamples')
-rw-r--r--docs/configexamples/zone-policy.rst8
1 files changed, 4 insertions, 4 deletions
diff --git a/docs/configexamples/zone-policy.rst b/docs/configexamples/zone-policy.rst
index 08db13b9..d9a6bf89 100644
--- a/docs/configexamples/zone-policy.rst
+++ b/docs/configexamples/zone-policy.rst
@@ -145,7 +145,7 @@ To add logging to the default rule, do:
.. code-block:: none
- set firewall name <ruleSet> enable-default-log
+ set firewall name <ruleSet> default-log
By default, iptables does not allow traffic for established sessions to
@@ -251,7 +251,7 @@ Since we have 4 zones, we need to setup the following rulesets.
Dmz-local
Even if the two zones will never communicate, it is a good idea to
-create the zone-pair-direction rulesets and set enable-default-log. This
+create the zone-pair-direction rulesets and set default-log. This
will allow you to log attempts to access the networks. Without it, you
will never see the connection attempts.
@@ -261,7 +261,7 @@ This is an example of the three base rules.
name wan-lan {
default-action drop
- enable-default-log
+ default-log
rule 1 {
action accept
state {
@@ -285,7 +285,7 @@ Here is an example of an IPv6 DMZ-WAN ruleset.
ipv6-name dmz-wan-6 {
default-action drop
- enable-default-log
+ default-log
rule 1 {
action accept
state {