summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorRobert Göhler <github@ghlr.de>2023-11-29 22:24:21 +0100
committerGitHub <noreply@github.com>2023-11-29 22:24:21 +0100
commit8a11b8b129f78d3d97d9b69ac0dfa219c8527827 (patch)
treeafd34017b22276417797004601e56128fd69fb7e /docs
parent9bfe2ec7e9f83970a6aea23d4739f07ddd756e0d (diff)
parent690647a1dfc17740f0782c39297dac986f9051df (diff)
downloadvyos-documentation-8a11b8b129f78d3d97d9b69ac0dfa219c8527827.tar.gz
vyos-documentation-8a11b8b129f78d3d97d9b69ac0dfa219c8527827.zip
Merge pull request #1168 from Giggum/sagitta_giggum
Sagitta_giggum pull request for fix to 1.4.x sagitta documentation
Diffstat (limited to 'docs')
-rw-r--r--docs/configuration/firewall/global-options.rst4
-rw-r--r--docs/quick-start.rst4
2 files changed, 4 insertions, 4 deletions
diff --git a/docs/configuration/firewall/global-options.rst b/docs/configuration/firewall/global-options.rst
index 316e0802..9c9a1a1e 100644
--- a/docs/configuration/firewall/global-options.rst
+++ b/docs/configuration/firewall/global-options.rst
@@ -111,7 +111,7 @@ Configuration
.. cfgcmd:: set firewall global-options twa-hazards-protection
[enable | disable]
- Enable or Disable VyOS to be :rfc:`1337` conform.
+ Enable or Disable VyOS to be :rfc:`1337` conforming.
The following system parameter will be altered:
- * ``net.ipv4.tcp_rfc1337`` \ No newline at end of file
+ * ``net.ipv4.tcp_rfc1337``
diff --git a/docs/quick-start.rst b/docs/quick-start.rst
index b94cd948..e5094468 100644
--- a/docs/quick-start.rst
+++ b/docs/quick-start.rst
@@ -144,7 +144,7 @@ which was not initiated from the internal/LAN side first.
set firewall ipv4 forward filter rule 10 state related 'enable'
set firewall ipv4 forward filter rule 20 action 'drop'
set firewall ipv4 forward filter rule 20 state invalid 'enable'
- set firewall ipv4 forward filter rule 30 inbound-interface interface-name 'eth1'
+ set firewall ipv4 forward filter rule 30 inbound-interface name 'eth1'
set firewall ipv4 forward filter rule 30 action 'accept'
set firewall ipv4 input filter default-action drop
@@ -168,7 +168,7 @@ blocks brute-forcing attempts:
.. code-block:: none
set firewall ipv4 input filter rule 40 action 'drop'
- set firewall ipv4 input filter rule 40 inbound-interface interface-name 'eth0'
+ set firewall ipv4 input filter rule 40 inbound-interface name 'eth0'
set firewall ipv4 input filter rule 40 destination port '22'
set firewall ipv4 input filter rule 40 protocol 'tcp'
set firewall ipv4 input filter rule 40 recent count '4'