summaryrefslogtreecommitdiff
path: root/docs/configuration
diff options
context:
space:
mode:
authorDaniil Baturin <daniil@vyos.io>2021-04-04 11:49:20 +0700
committerGitHub <noreply@github.com>2021-04-04 11:49:20 +0700
commite2c34a45d887e116150514f594d3f59a49ac284f (patch)
tree16e9ba10704dd829ed6fb7d1df94c0535bcd1342 /docs/configuration
parentffeab60a8561b7a4f2122a4c0a7bd2695f35ddc8 (diff)
parentfcaf50b739f1fd128592bae14bb0b2446e1c669c (diff)
downloadvyos-documentation-e2c34a45d887e116150514f594d3f59a49ac284f.tar.gz
vyos-documentation-e2c34a45d887e116150514f594d3f59a49ac284f.zip
Merge pull request #493 from padath/fix-config-firewall-typos
Fix typos in configuration/firewall
Diffstat (limited to 'docs/configuration')
-rw-r--r--docs/configuration/firewall/index.rst8
1 files changed, 4 insertions, 4 deletions
diff --git a/docs/configuration/firewall/index.rst b/docs/configuration/firewall/index.rst
index 909d77e8..35fdfb4a 100644
--- a/docs/configuration/firewall/index.rst
+++ b/docs/configuration/firewall/index.rst
@@ -254,7 +254,7 @@ the action of the rule will executed.
.. cfgcmd:: set firewall ipv6-name <name> default-action [drop | reject |
accept]
- This set the default action of the rule-set if no rule matched a paket
+ This set the default action of the rule-set if no rule matched a packet
criteria.
.. cfgcmd:: set firewall name <name> enable-default-log
@@ -387,8 +387,8 @@ There are a lot of matching criteria gainst which the package can be tested.
Match a protocol criteria. A protocol number or a name which is here
defined: ``/etc/protocols``.
- Special names are ``all`` for all protocols and ``tcp_udp`` for tcp and upd
- based pakets. The ``!`` negate the selected protocol.
+ Special names are ``all`` for all protocols and ``tcp_udp`` for tcp and udp
+ based packets. The ``!`` negate the selected protocol.
.. code-block:: none
@@ -421,7 +421,7 @@ There are a lot of matching criteria gainst which the package can be tested.
Applying a Rule-Set to an Interface
***********************************
-A Rule-Set can be appliend to every inteface:
+A Rule-Set can be applied to every interface:
* ``in``: Ruleset for forwarded packets on inbound interface
* ``out``: Ruleset for forwarded packets on outbound interface