summaryrefslogtreecommitdiff
path: root/docs/quick-start.rst
diff options
context:
space:
mode:
authorGiggum <152240782+Giggum@users.noreply.github.com>2023-11-29 10:55:03 -0500
committerGiggum <152240782+Giggum@users.noreply.github.com>2023-11-29 10:55:03 -0500
commit690647a1dfc17740f0782c39297dac986f9051df (patch)
tree80851d8af8d2a2ed23f1d2c3cff8b84db2dd6212 /docs/quick-start.rst
parent84498945cc5083ad72c7dc161c89bfdaa404f55e (diff)
downloadvyos-documentation-690647a1dfc17740f0782c39297dac986f9051df.tar.gz
vyos-documentation-690647a1dfc17740f0782c39297dac986f9051df.zip
docs: fix to code snippet in Quick Start/Firewall and typo Firewall/Global Options
sagitta/quick-start.html: Fix to replace "interface-name" with "name" for rule 30 and 40 in code snippet to correct syntax error. sagitta/configuration/firewall/global-options.html: Fix to improve correctness is use of English language from "conform" to "confirming" On branch sagitta_giggum Changes to be committed: modified: quick-start.rst modified: configuration/firewall/global-options.rst
Diffstat (limited to 'docs/quick-start.rst')
-rw-r--r--docs/quick-start.rst4
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/quick-start.rst b/docs/quick-start.rst
index b94cd948..e5094468 100644
--- a/docs/quick-start.rst
+++ b/docs/quick-start.rst
@@ -144,7 +144,7 @@ which was not initiated from the internal/LAN side first.
set firewall ipv4 forward filter rule 10 state related 'enable'
set firewall ipv4 forward filter rule 20 action 'drop'
set firewall ipv4 forward filter rule 20 state invalid 'enable'
- set firewall ipv4 forward filter rule 30 inbound-interface interface-name 'eth1'
+ set firewall ipv4 forward filter rule 30 inbound-interface name 'eth1'
set firewall ipv4 forward filter rule 30 action 'accept'
set firewall ipv4 input filter default-action drop
@@ -168,7 +168,7 @@ blocks brute-forcing attempts:
.. code-block:: none
set firewall ipv4 input filter rule 40 action 'drop'
- set firewall ipv4 input filter rule 40 inbound-interface interface-name 'eth0'
+ set firewall ipv4 input filter rule 40 inbound-interface name 'eth0'
set firewall ipv4 input filter rule 40 destination port '22'
set firewall ipv4 input filter rule 40 protocol 'tcp'
set firewall ipv4 input filter rule 40 recent count '4'