FreeBSD Bugzilla – Attachment 217566 Details for
Bug 248943
ipfw.8: Minor fixes
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
Fix typos.
ipfw.8.patch (text/plain), 2.31 KB, created by
Jose Luis Duran
on 2020-08-27 06:29:08 UTC
(
hide
)
Description:
Fix typos.
Filename:
MIME Type:
Creator:
Jose Luis Duran
Created:
2020-08-27 06:29:08 UTC
Size:
2.31 KB
patch
obsolete
>diff --git sbin/ipfw/ipfw.8 sbin/ipfw/ipfw.8 >index 4a08532..f7b5234 100644 >--- sbin/ipfw/ipfw.8 >+++ sbin/ipfw/ipfw.8 >@@ -682,7 +682,7 @@ to simulate the effect of multiple paths leading to out-of-order > packet delivery. > .Pp > Note: this condition is checked before any other condition, including >-ones such as >+ones such as > .Cm keep-state > or > .Cm check-state >@@ -1604,7 +1604,7 @@ Matches IPv6 packets containing any of the flow labels given in > is a comma separated list of numeric flow labels. > .It Cm frag Ar spec > Matches IPv4 packets whose >-.Cm ip_off >+.Cm ip_off > field contains the comma separated list of IPv4 fragmentation > options specified in > .Ar spec . >@@ -3370,7 +3370,7 @@ Thus translator host should be configured as IPv4 and IPv6 router. > Also this means, that a packet is handled by firewall twice. > First time an original packet is handled and consumed by translator, > and then it is handled again as translated packet. >-This behavior can be changed by sysctl variable >+This behavior can be changed by sysctl variable > .Va net.inet.ip.fw.nat64_direct_output . > Also translated packet can be tagged using > .Cm tag >@@ -4086,7 +4086,7 @@ Controls the output method used by > module: > .Bl -tag -width indent > .It Cm 0 >-A packet is handled by >+A packet is handled by > .Nm ipfw > twice. > First time an original packet is handled by >@@ -4277,11 +4277,11 @@ ruleset to minimize the amount of work scanning the ruleset. > Your mileage may vary. > .Pp > For more complex scenarios with dynamic rules >-.Cm record-state >+.Cm record-state > and > .Cm defer-action > can be used to precisely control creation and checking of dynamic rules. >-Example of usage of these options are provided in >+Example of usage of these options are provided in > .Sx NETWORK ADDRESS TRANSLATION (NAT) > Section. > .Pp >@@ -4439,11 +4439,11 @@ Using the > .Cm fwd > action, the table entries may include hostnames and IP addresses. > .Pp >-.Dl "ipfw table T2 create type addr ftype ip" >+.Dl "ipfw table T2 create type addr valtype ipv4" > .Dl "ipfw table T2 add 192.168.2.0/24 10.23.2.1" >-.Dl "ipfw table T21 add 192.168.0.0/27 router1.dmz" >+.Dl "ipfw table T2 add 192.168.0.0/27 router1.dmz" > .Dl "..." >-.Dl "ipfw add 100 fwd tablearg ip from any to table(1)" >+.Dl "ipfw add 100 fwd tablearg ip from any to 'table(T2)'" > .Pp > In the following example per-interface firewall is created: > .Pp
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 248943
: 217566