From 83d8d497d7cee047d7f0f9c9c74862af317fac15 Mon Sep 17 00:00:00 2001 From: Tom Eastep Date: Wed, 28 Apr 2010 08:12:41 -0700 Subject: [PATCH] Correct typos in IPSEC article. Signed-off-by: Tom Eastep --- docs/IPSEC-2.6.xml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/IPSEC-2.6.xml b/docs/IPSEC-2.6.xml index 7f3f95d50..4fc312065 100644 --- a/docs/IPSEC-2.6.xml +++ b/docs/IPSEC-2.6.xml @@ -796,7 +796,7 @@ all all REJECT info on the firewall that must be accessible to road warriors. The reason for the second step is that the policy does not by default allow unrestricted access to the firewall itself. Finally, you should protect an exploit - where an attacker can exploit your LT2P server do to a hole in the way + where an attacker can exploit your LT2P server due to a hole in the way that L2TP interacts with UDP connection tracking.
@@ -806,7 +806,7 @@ all all REJECT info # PORT(S) PORT(S) SECTION ESTABLISHED # Prevent IPSEC bypass by hosts behind a NAT gateway -L2TP/(REJECT) net $FW +L2TP(REJECT) net $FW REJECT $FW net udp - 1701 # l2tp over the IPsec VPN ACCEPT vpn $FW udp 1701