diff --git a/manpages/shorewall-tcdevices.xml b/manpages/shorewall-tcdevices.xml
index 2d79ebd43..e5045cf19 100644
--- a/manpages/shorewall-tcdevices.xml
+++ b/manpages/shorewall-tcdevices.xml
@@ -24,8 +24,8 @@
Entries in this file define the bandwidth for interfaces on which
you want traffic shaping to be enabled.
- If you do not plan to use traffic shaping for a device, don't put
- it in here as it limits the troughput of that device to the limits you set
+ If you do not plan to use traffic shaping for a device, don't put it
+ in here as it limits the troughput of that device to the limits you set
here.
The columns in the file are as follows.
@@ -39,7 +39,7 @@
this file. You may NOT specify the name of an alias (e.g., eth0:0)
here; see http://www.shorewall.net/FAQ.htm#faq18
- You man NOT specify wildcards here, e.g. if you have multiple
+ You may NOT specify wildcards here, e.g. if you have multiple
ppp interfaces, you need to put them all in here!
If the device doesn't exist, a warning message will be issued
@@ -74,12 +74,12 @@
The outgoing Bandwidth of that interface. This is the maximum
- speed you connection can handle. It is also the speed you can refer
+ speed your connection can handle. It is also the speed you can refer
as "full" if you define the tc classes. Outgoing traffic above this
rate will be dropped.
- Use kbit or kbps(for Kilobytes per second) for speed, and
- make sure there is NO space between the number and the unit.
+ Use kbit or kbps(for Kilobytes per second) for speed, and make
+ sure there is NO space between the number and the unit.
diff --git a/manpages/shorewall-tcrules.xml b/manpages/shorewall-tcrules.xml
index 03cb8c1b4..51195aa82 100644
--- a/manpages/shorewall-tcrules.xml
+++ b/manpages/shorewall-tcrules.xml
@@ -170,7 +170,7 @@
the line will be attached as a comment to the Netfilter rule(s)
generated by the following entries. The comment will appear
delimited by "/* ... */" in the output of shorewall
- show mangle
+ show mangle
To stop the comment from being attached to further rules,
simply include COMMENT on a line by itself.
@@ -218,7 +218,7 @@
an address (e.g., eth1:192.168.1.0/24). If the MARK column specificies a classification of
the form major:minor then
- this column may also contain an interface name.
+ this column may also contain an interface name.
@@ -241,7 +241,7 @@
PORT(S)
- Destination Ports. A comma-separated list of Port names (from
+ Destination Ports. A comma-separated list of Port names (from
services(5)), port numbers or port
ranges; if the protocol is icmp, this column is interpreted as the
@@ -337,9 +337,9 @@
TEST
- Defines a test on the existing packet or connection mark. The
- rule will match only if the test returns true. Tests have the format
-
+ Defines a test on the existing packet or connection mark. The
+ rule will match only if the test returns true. Tests have the
+ format
[!]value[/mask][
- We assume packet/connection mark 0 to means
- unclassified.
+ We assume packet/connection mark 0 means unclassified.
#MARK/ SOURCE DEST PROTO PORT(S) SOURCE USER TEST
#CLASSIFY PORT(S)
diff --git a/manpages/shorewall-zones.xml b/manpages/shorewall-zones.xml
index 19a9a28c8..15d54425f 100644
--- a/manpages/shorewall-zones.xml
+++ b/manpages/shorewall-zones.xml
@@ -96,7 +96,7 @@ c:a,b ipv4
Communication with all zone hosts is encrypted. Your
- kernel and iptables must include polic match support.
+ kernel and iptables must include policy match support.
@@ -105,10 +105,11 @@ c:a,b ipv4
Designates the firewall itself. You must have exactly
- one 'firewall' zone. No options ar permitted with a 'firewall'
- zone. The name that you enter in the ZONE column will be
- stored in the shell variable $FW which you may use in other
- configuration files to designate the firewall zone.
+ one 'firewall' zone. No options are permitted with a
+ 'firewall' zone. The name that you enter in the ZONE column
+ will be stored in the shell variable $FW which you may use in
+ other configuration files to designate the firewall
+ zone.