summaryrefslogtreecommitdiff
path: root/docs/configuration/service/ids.rst
diff options
context:
space:
mode:
authorrebortg <github@ghlr.de>2024-05-28 12:24:30 +0200
committerrebortg <github@ghlr.de>2024-05-28 12:24:30 +0200
commit96039bd2f44018ae767930e252305bedece57156 (patch)
tree650373a9398085999f8bbb45b09b4896ca489f5f /docs/configuration/service/ids.rst
parent0a3febc9524e7f5d3df856bd9cf58aafb3500252 (diff)
parent2be191247b2f10f1bc3ae38f8bcb565ce0af0635 (diff)
downloadvyos-documentation-96039bd2f44018ae767930e252305bedece57156.tar.gz
vyos-documentation-96039bd2f44018ae767930e252305bedece57156.zip
Merge branch 'current' of github.com:vyos/vyos-documentation into current
Diffstat (limited to 'docs/configuration/service/ids.rst')
-rw-r--r--docs/configuration/service/ids.rst6
1 files changed, 3 insertions, 3 deletions
diff --git a/docs/configuration/service/ids.rst b/docs/configuration/service/ids.rst
index 3e508d50..8a64467f 100644
--- a/docs/configuration/service/ids.rst
+++ b/docs/configuration/service/ids.rst
@@ -33,7 +33,7 @@ Configuration
Configure direction for processing traffic.
.. cfgcmd:: set service ids ddos-protection exclude-network <x.x.x.x/x>
-.. cfgcmd:: set service ids ddos-protection exlude-network <h:h:h:h:h:h:h:h/x>
+.. cfgcmd:: set service ids ddos-protection exclude-network <h:h:h:h:h:h:h:h/x>
Specify IPv4 and/or IPv6 networks which are going to be excluded.
@@ -56,7 +56,7 @@ Configuration
.. cfgcmd:: set service ids ddos-protection sflow port <1-65535>
- Configure port number to be used for sflow conection. Default port is 6343.
+ Configure port number to be used for sflow connection. Default port is 6343.
.. cfgcmd:: set service ids ddos-protection threshold general
[fps | mbps | pps] <0-4294967294>
@@ -96,7 +96,7 @@ In this simplified scenario, main things to be considered are:
* Interface **eth0** used to connect to upstream.
Since we are analyzing attacks to and from our internal network, two types
-of attacks can be identified, and differents actions are needed:
+of attacks can be identified, and different actions are needed:
* External attack: an attack from the internet towards an internal IP
is identify. In this case, all connections towards such IP will be