diff --git a/en_US.ISO8859-1/books/handbook/security/chapter.sgml b/en_US.ISO8859-1/books/handbook/security/chapter.sgml index fbeed974f7..81b67412e7 100644 --- a/en_US.ISO8859-1/books/handbook/security/chapter.sgml +++ b/en_US.ISO8859-1/books/handbook/security/chapter.sgml @@ -4492,7 +4492,7 @@ block in log first quick on dc0 all Port Redirection An very common practice is to have a web server, email - server, database server and DNS sever each segregated to a + server, database server and DNS server each segregated to a different PC on the LAN. In this case the traffic from these servers still have to be NATed, but there has to be some way to direct the inbound traffic to the correct LAN PC's. IPNAT @@ -4518,7 +4518,7 @@ block in log first quick on dc0 all FTP and <acronym>NAT</acronym> FTP is a dinosaur left over from the time before the - Internet as it is know today, when research universities were + Internet as it is known today, when research universities were leased lined together and FTP was used to share files among research Scientists. This was a time when data security was not even an idea yet. Over the years the FTP protocol became @@ -4720,7 +4720,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT <filename>/etc/rc.conf</filename> Options - If you don't have IPFW compliled into your kernel you will + If you do not have IPFW compiled into your kernel you will need to load it with the following statement in your /etc/rc.conf: @@ -5045,7 +5045,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT administrator decides what rules in the rule set he wants to log and adds the log verb to those rules. Normally only deny rules are logged. Like the deny rule for incoming ICMP - pings. It's very customary to duplicate the ipfw default + pings. It is very customary to duplicate the ipfw default deny everything rule with the log verb included as your last rule in the rule set. This way you get to see all the packets that did not match any of the rules in the rule set. @@ -5221,8 +5221,8 @@ ipfw -q add 00611 allow udp from any to 192.0.2.11 53 out via tun0 keep-state

An Example Inclusive Ruleset The following non-NATed rule set is a complete inclusive type ruleset. You can not go wrong using this rule set for - you own. Just comment out any pass rules for services to - don't want. If you see messages in your log that you want to + you own. Just comment out any pass rules for services you + do not want. If you see messages in your log that you want to stop seeing just add a deny rule in the inbound section. You have to change the 'dc0' interface name in every rule to the interface name of the NIC that connects your system to the @@ -5442,7 +5442,7 @@ natd_flags="-dynamic -m" # -m = preserve port numbers if possibleNATs the packet IP address and out it goes. Remember this, this is very important. This packet makes it's way to the destination and returns and enters the top of the rule @@ -5477,7 +5477,7 @@ natd_flags="-dynamic -m" # -m = preserve port numbers if possibleNATed and released on it's way out. @@ -5552,7 +5552,7 @@ ipfw -q -f flush ######################## end of rules ################## - The following is pretty much the same as above but, uses + The following is pretty much the same as above, but uses a self documenting coding style full of description comments to help the inexperienced IPFW rule writer to better understand what the rules are doing.