From 0e98fdb64154011850ba5705b9c6f8e74868c955 Mon Sep 17 00:00:00 2001 From: srividya0208 Date: Mon, 6 May 2024 13:49:48 -0400 Subject: Modified old option from 'enable-default-log' to new one 'default-log' --- docs/configexamples/zone-policy.rst | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'docs/configexamples') diff --git a/docs/configexamples/zone-policy.rst b/docs/configexamples/zone-policy.rst index 08db13b9..d9a6bf89 100644 --- a/docs/configexamples/zone-policy.rst +++ b/docs/configexamples/zone-policy.rst @@ -145,7 +145,7 @@ To add logging to the default rule, do: .. code-block:: none - set firewall name enable-default-log + set firewall name default-log By default, iptables does not allow traffic for established sessions to @@ -251,7 +251,7 @@ Since we have 4 zones, we need to setup the following rulesets. Dmz-local Even if the two zones will never communicate, it is a good idea to -create the zone-pair-direction rulesets and set enable-default-log. This +create the zone-pair-direction rulesets and set default-log. This will allow you to log attempts to access the networks. Without it, you will never see the connection attempts. @@ -261,7 +261,7 @@ This is an example of the three base rules. name wan-lan { default-action drop - enable-default-log + default-log rule 1 { action accept state { @@ -285,7 +285,7 @@ Here is an example of an IPv6 DMZ-WAN ruleset. ipv6-name dmz-wan-6 { default-action drop - enable-default-log + default-log rule 1 { action accept state { -- cgit v1.2.3