summaryrefslogtreecommitdiff
path: root/docs/ch07-firewall.rst
diff options
context:
space:
mode:
authorChristian Poessinger <christian@poessinger.com>2018-10-05 21:55:54 +0200
committerChristian Poessinger <christian@poessinger.com>2018-10-05 21:55:56 +0200
commit30c913bf7e4e8a3ee93523dd33dd36584c9e298e (patch)
treec08d35aa34439b4d74cd39262b0ceed14c3abf77 /docs/ch07-firewall.rst
parent8194e0391cc3f83bdfb30048de6547437f863ede (diff)
downloadvyos-documentation-30c913bf7e4e8a3ee93523dd33dd36584c9e298e.tar.gz
vyos-documentation-30c913bf7e4e8a3ee93523dd33dd36584c9e298e.zip
Replace all **NOTE** occurences with valid ReST statement
See http://docutils.sourceforge.net/docs/ref/rst/directives.html#specific-admonitions for more information.
Diffstat (limited to 'docs/ch07-firewall.rst')
-rw-r--r--docs/ch07-firewall.rst12
1 files changed, 7 insertions, 5 deletions
diff --git a/docs/ch07-firewall.rst b/docs/ch07-firewall.rst
index 8fe6dcfe..397c31ac 100644
--- a/docs/ch07-firewall.rst
+++ b/docs/ch07-firewall.rst
@@ -32,8 +32,9 @@ Groups
Firewall groups represent collections of IP addresses, networks, or ports. Once
created, a group can be referenced by firewall rules as either a source or
destination. Members can be added or removed from a group without changes to
-or the need to reload individual firewall rules. Note that groups can also
-be referenced by NAT configuration.
+or the need to reload individual firewall rules.
+
+.. note:: Groups can also be referenced by NAT configuration.
While network groups accept IP networks in CIDR notation, specific IP addresses
can be added as a 32-bit prefix. If you foresee the need to add a mix of
@@ -81,9 +82,10 @@ Example of a rule-set to filter traffic to the internal network:
Applying a Rule-Set to an Interface
-----------------------------------
-Once a rule-set is created, it can be applied to an interface. Note only one
-rule-set can be applied to each interface for `in`, `out`, or `local` traffic
-for each protocol (IPv4 and IPv6).
+Once a rule-set is created, it can be applied to an interface.
+
+.. note:: Only one rule-set can be applied to each interface for `in`, `out`,
+ or `local` traffic for each protocol (IPv4 and IPv6).
.. code-block:: sh