diff --git a/en_US.ISO8859-1/books/handbook/security/chapter.sgml b/en_US.ISO8859-1/books/handbook/security/chapter.sgml
index fbeed974f7..81b67412e7 100644
--- a/en_US.ISO8859-1/books/handbook/security/chapter.sgml
+++ b/en_US.ISO8859-1/books/handbook/security/chapter.sgml
@@ -4492,7 +4492,7 @@ block in log first quick on dc0 all
Port Redirection
An very common practice is to have a web server, email
- server, database server and DNS sever each segregated to a
+ server, database server and DNS server each segregated to a
different PC on the LAN. In this case the traffic from these
servers still have to be NATed, but there has to be some way
to direct the inbound traffic to the correct LAN PC's. IPNAT
@@ -4518,7 +4518,7 @@ block in log first quick on dc0 all
FTP and NAT
FTP is a dinosaur left over from the time before the
- Internet as it is know today, when research universities were
+ Internet as it is known today, when research universities were
leased lined together and FTP was used to share files among
research Scientists. This was a time when data security was
not even an idea yet. Over the years the FTP protocol became
@@ -4720,7 +4720,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT
/etc/rc.conf Options
- If you don't have IPFW compliled into your kernel you will
+ If you do not have IPFW compiled into your kernel you will
need to load it with the following statement in your
/etc/rc.conf:
@@ -5045,7 +5045,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT
administrator decides what rules in the rule set he wants to
log and adds the log verb to those rules. Normally only deny
rules are logged. Like the deny rule for incoming ICMP
- pings. It's very customary to duplicate the ipfw default
+ pings. It is very customary to duplicate the ipfw default
deny everything rule with the log verb included as your
last rule in the rule set. This way you get to see all the
packets that did not match any of the rules in the rule set.
@@ -5221,8 +5221,8 @@ ipfw -q add 00611 allow udp from any to 192.0.2.11 53 out via tun0 keep-state
An Example Inclusive Ruleset
The following non-NATed rule set is a complete inclusive
type ruleset. You can not go wrong using this rule set for
- you own. Just comment out any pass rules for services to
- don't want. If you see messages in your log that you want to
+ you own. Just comment out any pass rules for services you
+ do not want. If you see messages in your log that you want to
stop seeing just add a deny rule in the inbound section. You
have to change the 'dc0' interface name in every rule to the
interface name of the NIC that connects your system to the
@@ -5442,7 +5442,7 @@ natd_flags="-dynamic -m" # -m = preserve port numbers if possibleNATs the packet IP address and out it goes. Remember
this, this is very important. This packet makes it's way to
the destination and returns and enters the top of the rule
@@ -5477,7 +5477,7 @@ natd_flags="-dynamic -m" # -m = preserve port numbers if possibleNATed and released on it's way out.
@@ -5552,7 +5552,7 @@ ipfw -q -f flush
######################## end of rules ##################
- The following is pretty much the same as above but, uses
+ The following is pretty much the same as above, but uses
a self documenting coding style full of description comments
to help the inexperienced IPFW rule writer to better
understand what the rules are doing.