diff options
author | Daniil Baturin <daniil@vyos.io> | 2024-05-07 12:46:42 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2024-05-07 12:46:42 +0200 |
commit | ccc07b46019f1325b3f48c29cf8c77ba89dd359a (patch) | |
tree | e95cede76c5552a50172857b6df4abf6da123ae2 /docs/configuration/service/ids.rst | |
parent | f555a7dc9055671333eacf471589b91d1ee63523 (diff) | |
parent | 2804093e1f809e7ae9502a98374fd2cc5d612543 (diff) | |
download | vyos-documentation-ccc07b46019f1325b3f48c29cf8c77ba89dd359a.tar.gz vyos-documentation-ccc07b46019f1325b3f48c29cf8c77ba89dd359a.zip |
Merge pull request #1416 from Embezzle/spelling
Fix spelling mistakes across multiple files
Diffstat (limited to 'docs/configuration/service/ids.rst')
-rw-r--r-- | docs/configuration/service/ids.rst | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/docs/configuration/service/ids.rst b/docs/configuration/service/ids.rst index 3e508d50..8a64467f 100644 --- a/docs/configuration/service/ids.rst +++ b/docs/configuration/service/ids.rst @@ -33,7 +33,7 @@ Configuration Configure direction for processing traffic. .. cfgcmd:: set service ids ddos-protection exclude-network <x.x.x.x/x> -.. cfgcmd:: set service ids ddos-protection exlude-network <h:h:h:h:h:h:h:h/x> +.. cfgcmd:: set service ids ddos-protection exclude-network <h:h:h:h:h:h:h:h/x> Specify IPv4 and/or IPv6 networks which are going to be excluded. @@ -56,7 +56,7 @@ Configuration .. cfgcmd:: set service ids ddos-protection sflow port <1-65535> - Configure port number to be used for sflow conection. Default port is 6343. + Configure port number to be used for sflow connection. Default port is 6343. .. cfgcmd:: set service ids ddos-protection threshold general [fps | mbps | pps] <0-4294967294> @@ -96,7 +96,7 @@ In this simplified scenario, main things to be considered are: * Interface **eth0** used to connect to upstream. Since we are analyzing attacks to and from our internal network, two types -of attacks can be identified, and differents actions are needed: +of attacks can be identified, and different actions are needed: * External attack: an attack from the internet towards an internal IP is identify. In this case, all connections towards such IP will be |