summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGiggum <152240782+Giggum@users.noreply.github.com>2023-11-29 10:55:03 -0500
committerGiggum <152240782+Giggum@users.noreply.github.com>2023-11-29 10:55:03 -0500
commit690647a1dfc17740f0782c39297dac986f9051df (patch)
tree80851d8af8d2a2ed23f1d2c3cff8b84db2dd6212
parent84498945cc5083ad72c7dc161c89bfdaa404f55e (diff)
downloadvyos-documentation-690647a1dfc17740f0782c39297dac986f9051df.tar.gz
vyos-documentation-690647a1dfc17740f0782c39297dac986f9051df.zip
docs: fix to code snippet in Quick Start/Firewall and typo Firewall/Global Options
sagitta/quick-start.html: Fix to replace "interface-name" with "name" for rule 30 and 40 in code snippet to correct syntax error. sagitta/configuration/firewall/global-options.html: Fix to improve correctness is use of English language from "conform" to "confirming" On branch sagitta_giggum Changes to be committed: modified: quick-start.rst modified: configuration/firewall/global-options.rst
-rw-r--r--docs/configuration/firewall/global-options.rst4
-rw-r--r--docs/quick-start.rst4
2 files changed, 4 insertions, 4 deletions
diff --git a/docs/configuration/firewall/global-options.rst b/docs/configuration/firewall/global-options.rst
index 316e0802..9c9a1a1e 100644
--- a/docs/configuration/firewall/global-options.rst
+++ b/docs/configuration/firewall/global-options.rst
@@ -111,7 +111,7 @@ Configuration
.. cfgcmd:: set firewall global-options twa-hazards-protection
[enable | disable]
- Enable or Disable VyOS to be :rfc:`1337` conform.
+ Enable or Disable VyOS to be :rfc:`1337` conforming.
The following system parameter will be altered:
- * ``net.ipv4.tcp_rfc1337`` \ No newline at end of file
+ * ``net.ipv4.tcp_rfc1337``
diff --git a/docs/quick-start.rst b/docs/quick-start.rst
index b94cd948..e5094468 100644
--- a/docs/quick-start.rst
+++ b/docs/quick-start.rst
@@ -144,7 +144,7 @@ which was not initiated from the internal/LAN side first.
set firewall ipv4 forward filter rule 10 state related 'enable'
set firewall ipv4 forward filter rule 20 action 'drop'
set firewall ipv4 forward filter rule 20 state invalid 'enable'
- set firewall ipv4 forward filter rule 30 inbound-interface interface-name 'eth1'
+ set firewall ipv4 forward filter rule 30 inbound-interface name 'eth1'
set firewall ipv4 forward filter rule 30 action 'accept'
set firewall ipv4 input filter default-action drop
@@ -168,7 +168,7 @@ blocks brute-forcing attempts:
.. code-block:: none
set firewall ipv4 input filter rule 40 action 'drop'
- set firewall ipv4 input filter rule 40 inbound-interface interface-name 'eth0'
+ set firewall ipv4 input filter rule 40 inbound-interface name 'eth0'
set firewall ipv4 input filter rule 40 destination port '22'
set firewall ipv4 input filter rule 40 protocol 'tcp'
set firewall ipv4 input filter rule 40 recent count '4'