Add id attributes to sections, and remove one static reference ('see

the blah blah section') to an xref, which will automatically be
updated should the section name change or be moved.
This commit is contained in:
Murray Stokely 2004-12-04 22:17:07 +00:00
parent 9ed12089ab
commit a600fdcb90
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=23123

View file

@ -2972,7 +2972,7 @@ jdoe@example.org</screen>
<primary>security</primary>
<secondary>firewalls</secondary>
</indexterm>
<sect2>
<sect2 id="firewalls-intro">
<title>Introduction</title>
<para>All software-based firewalls provide some way to filter
incoming and outgoing traffic that flows through your system.
@ -3010,7 +3010,7 @@ jdoe@example.org</screen>
</itemizedlist>
</sect2>
<sect2>
<sect2 id="firewalls-rulesets">
<title>Firewall Rule Set Types</title>
<para>Constructing a software application firewall rule set may
seem to be trivial, but most people get it wrong. The most
@ -3055,7 +3055,7 @@ jdoe@example.org</screen>
of attack.</para>
</sect2>
<sect2>
<sect2 id="firewalls-apps">
<title>Firewall Software Applications</title>
<para>&os; has two different firewall software products built
into the base system. They are IPFILTER (i.e. also known as IPF)
@ -3107,7 +3107,7 @@ jdoe@example.org</screen>
<ulink url="http://www.ipprimer.com/overview.cfm"></ulink>.</para>
</sect2>
<sect2>
<sect2 id="firewalls-pf">
<title>The Packet Filter Firewall</title>
<para>As of July 2003 the OpenBSD firewall software application
@ -3202,7 +3202,7 @@ pflog_flags="" # additional flags for pflogd startup</programli
</sect3>
</sect2>
<sect2>
<sect2 id="firewalls-ipf">
<title>The IPFILTER (IPF) Firewall</title>
<para>The author of IPFILTER is Darren Reed. IPFILTER is not
operating system dependent. IPFILTER is a open source
@ -3351,9 +3351,8 @@ ipnat_rules="/etc/ipnat.rules" # rules definition file for ipnat</programlist
script with symbolic substitution.</para>
<para>There is a way to build IPF rules that utilities the power of
script symbolic substitution. See the Building Rule Script
section.</para>
script symbolic substitution. For more information, see <xref
linkend="firewalls-ipfw-rules-script">.</para>
</sect3>
<sect3>
@ -4610,7 +4609,7 @@ pass in quick on rl0 proto tcp from any to any port = 20 flags S keep state</pro
</sect3>
</sect2>
<sect2>
<sect2 id="firewalls-ipfw">
<title>IPFW</title>
<para>The IPFIREWALL (IPFW) is a &os; sponsored firewall
software application authored and maintained by &os;
@ -4637,7 +4636,7 @@ pass in quick on rl0 proto tcp from any to any port = 20 flags S keep state</pro
'fwd rule' forward facility, the bridge facility, and the
ipstealth facility.</para>
<sect3>
<sect3 id="firewalls-ipfw-enable">
<title>Enabling IPFW</title>
<para>IPFW is included in the basic &os; install as a
separate run time loadable module. IPFW will dynamically load
@ -4666,7 +4665,7 @@ enabled, default to deny, logging disabled</screen>
<programlisting>net.inet.ip.fw.verbose_limit=5</programlisting>
</sect3>
<sect3>
<sect3 id="firewalls-ipfw-kernel">
<title>Kernel Options</title>
<para>It is not a mandatory requirement that you enable IPFW by
compiling the following options into the &os; kernel unless
@ -4718,7 +4717,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT</programlisting>
</note>
</sect3>
<sect3>
<sect3 id="firewalls-ipfw-rc">
<title><filename>/etc/rc.conf</filename> Options</title>
<para>If you do not have IPFW compiled into your kernel you will
need to load it with the following statement in your
@ -4735,7 +4734,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT</programlisting>
<programlisting>firewall_logging="YES"</programlisting>
</sect3>
<sect3>
<sect3 id="firewalls-ipfw-cmd">
<title>The IPFW Command</title>
<para>The ipfw command is the normal vehicle for making manual
single rule additions or deletions to the firewall active
@ -4791,7 +4790,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT</programlisting>
<programlisting><command>ipfw zero NUM</command></programlisting>
</sect3>
<sect3>
<sect3 id="firewalls-ipfw-rules">
<title>IPFW Rule Sets</title>
<para>A rule set is a group of ipfw rules coded to allow or deny
packets based on the values contained in the packet. The
@ -4835,7 +4834,7 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT</programlisting>
careful, you can end up locking your self out.</para>
</warning>
<sect4>
<sect4 id="firewalls-ipfw-rules-syntax">
<title>Rule Syntax</title>
<para>The rule syntax presented here has been simplified to
what is necessary to create a standard inclusive type
@ -5078,8 +5077,8 @@ options IPV6FIREWALL_DEFAULT_TO_ACCEPT</programlisting>
</para>
</sect4>
<sect4>
<title>Building Rule Script</title>
<sect4 id="firewalls-ipfw-rules-script">
<title>Building a Rule Script</title>
<para>Most experienced IPFW users create a file containing the
rules and code them in a manner compatible with running them
as a script. The major benefit of doing this is the firewall