diff options
author | Christian Poessinger <christian@poessinger.com> | 2018-10-05 21:55:54 +0200 |
---|---|---|
committer | Christian Poessinger <christian@poessinger.com> | 2018-10-05 21:55:56 +0200 |
commit | 30c913bf7e4e8a3ee93523dd33dd36584c9e298e (patch) | |
tree | c08d35aa34439b4d74cd39262b0ceed14c3abf77 /docs/ch07-firewall.rst | |
parent | 8194e0391cc3f83bdfb30048de6547437f863ede (diff) | |
download | vyos-documentation-30c913bf7e4e8a3ee93523dd33dd36584c9e298e.tar.gz vyos-documentation-30c913bf7e4e8a3ee93523dd33dd36584c9e298e.zip |
Replace all **NOTE** occurences with valid ReST statement
See http://docutils.sourceforge.net/docs/ref/rst/directives.html#specific-admonitions
for more information.
Diffstat (limited to 'docs/ch07-firewall.rst')
-rw-r--r-- | docs/ch07-firewall.rst | 12 |
1 files changed, 7 insertions, 5 deletions
diff --git a/docs/ch07-firewall.rst b/docs/ch07-firewall.rst index 8fe6dcfe..397c31ac 100644 --- a/docs/ch07-firewall.rst +++ b/docs/ch07-firewall.rst @@ -32,8 +32,9 @@ Groups Firewall groups represent collections of IP addresses, networks, or ports. Once created, a group can be referenced by firewall rules as either a source or destination. Members can be added or removed from a group without changes to -or the need to reload individual firewall rules. Note that groups can also -be referenced by NAT configuration. +or the need to reload individual firewall rules. + +.. note:: Groups can also be referenced by NAT configuration. While network groups accept IP networks in CIDR notation, specific IP addresses can be added as a 32-bit prefix. If you foresee the need to add a mix of @@ -81,9 +82,10 @@ Example of a rule-set to filter traffic to the internal network: Applying a Rule-Set to an Interface ----------------------------------- -Once a rule-set is created, it can be applied to an interface. Note only one -rule-set can be applied to each interface for `in`, `out`, or `local` traffic -for each protocol (IPv4 and IPv6). +Once a rule-set is created, it can be applied to an interface. + +.. note:: Only one rule-set can be applied to each interface for `in`, `out`, + or `local` traffic for each protocol (IPv4 and IPv6). .. code-block:: sh |