diff options
author | Alex W <embezzle.dev@proton.me> | 2024-05-04 21:35:02 +0100 |
---|---|---|
committer | Alex W <embezzle.dev@proton.me> | 2024-05-04 21:35:02 +0100 |
commit | cd4afb0e822602d7d586b322a29521b0c0230807 (patch) | |
tree | 48069969d1f9bc7cea75faceef719652c0c7be77 /docs/configuration/firewall/flowtables.rst | |
parent | 8dfc24983d09d275ad29d730a82d39ae6b14a9f2 (diff) | |
download | vyos-documentation-cd4afb0e822602d7d586b322a29521b0c0230807.tar.gz vyos-documentation-cd4afb0e822602d7d586b322a29521b0c0230807.zip |
firewall: Corrected spelling mistakes
Diffstat (limited to 'docs/configuration/firewall/flowtables.rst')
-rw-r--r-- | docs/configuration/firewall/flowtables.rst | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/docs/configuration/firewall/flowtables.rst b/docs/configuration/firewall/flowtables.rst index bc7b9212..ffd791f9 100644 --- a/docs/configuration/firewall/flowtables.rst +++ b/docs/configuration/firewall/flowtables.rst @@ -99,20 +99,20 @@ Creating rules for using flow tables: Configuration Example ********************* -Things to be considred in this setup: +Things to be considered in this setup: * Two interfaces are going to be used in the flowtables: eth0 and eth1 - * Minumum firewall ruleset is provided, which includes some filtering rules, - and appropiate rules for using flowtable offload capabilities. + * Minimum firewall ruleset is provided, which includes some filtering rules, + and appropriate rules for using flowtable offload capabilities. As described, first packet will be evaluated by all the firewall path, so -desired connection should be explicitely accepted. Same thing should be taken +desired connection should be explicitly accepted. Same thing should be taken into account for traffic in reverse order. In most cases state policies are used in order to accept connection in reverse patch. -We will only accept traffic comming from interface eth0, protocol tcp and -destination port 1122. All other traffic traspassing the router should be +We will only accept traffic coming from interface eth0, protocol tcp and +destination port 1122. All other traffic trespassing the router should be blocked. Commands |