fix incorrect date and some typos..

git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@2212 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
judas_iscariote 2005-06-02 03:04:21 +00:00
parent 734cc7a949
commit 7023232678

View File

@ -15,7 +15,7 @@
</author> </author>
</authorgroup> </authorgroup>
<pubdate>2005-04-66</pubdate> <pubdate>2005-06-01</pubdate>
<copyright> <copyright>
<year>2001-2005</year> <year>2001-2005</year>
@ -98,7 +98,7 @@
and determines the disposition of connection requests that fail MAC and determines the disposition of connection requests that fail MAC
verification. The MACLIST_LOG_LEVEL variable gives the syslogd level verification. The MACLIST_LOG_LEVEL variable gives the syslogd level
at which connection requests that fail verification are to be logged. at which connection requests that fail verification are to be logged.
If set the the empty value (e.g., MACLIST_LOG_LEVEL="") then failing If set the empty value (e.g., MACLIST_LOG_LEVEL="") then failing
connection requests are not logged.</para> connection requests are not logged.</para>
</listitem> </listitem>
@ -119,7 +119,7 @@
packet passes through then list of entries for that interface in packet passes through then list of entries for that interface in
/etc/shorewall/maclist. If there is a match then the source IP address /etc/shorewall/maclist. If there is a match then the source IP address
is added to the 'Recent' set for that interface. Subsequent connection is added to the 'Recent' set for that interface. Subsequent connection
attempts from that IP address occuring within $MACLIST_TTL seconds attempts from that IP address occurring within $MACLIST_TTL seconds
will be accepted without having to scan all of the entries. After will be accepted without having to scan all of the entries. After
$MACLIST_TTL from the first accepted connection request from an IP $MACLIST_TTL from the first accepted connection request from an IP
address, the next connection request from that IP address will be address, the next connection request from that IP address will be
@ -223,7 +223,7 @@ $WIFI_IF 00:1f:79:cd:fe:2e 192.168.3.6 #Work Laptop
<programlisting> $WIFI_IF 00:06:43:45:C6:15 192.168.3.253,192.168.4.0/24</programlisting> <programlisting> $WIFI_IF 00:06:43:45:C6:15 192.168.3.253,192.168.4.0/24</programlisting>
<para>This entry accomodates traffic from the router itself <para>This entry accommodates traffic from the router itself
(192.168.3.253) and from the second wireless segment (192.168.4.0/24). (192.168.3.253) and from the second wireless segment (192.168.4.0/24).
Remember that all traffic being sent to my firewall from the Remember that all traffic being sent to my firewall from the
192.168.4.0/24 segment will be forwarded by the router so that traffic's 192.168.4.0/24 segment will be forwarded by the router so that traffic's