diff --git a/en_US.ISO8859-1/articles/dialup-firewall/article.sgml b/en_US.ISO8859-1/articles/dialup-firewall/article.sgml index 5b3c9d3283..a1dd71ce69 100644 --- a/en_US.ISO8859-1/articles/dialup-firewall/article.sgml +++ b/en_US.ISO8859-1/articles/dialup-firewall/article.sgml @@ -1,7 +1,7 @@ - $Date: 2001-06-24 21:01:53 $ + $Date: 2001-07-06 12:50:08 $ This article documents how to setup a firewall using a PPP @@ -176,7 +176,7 @@ ppp_profile="profile" We're nearly done now. All that remains now is to define the firewall rules and then we can reboot and the firewall should be up and - running. I realise that everyone will want something slightly different + running. I realize that everyone will want something slightly different when it comes to their rulebase. What I've tried to do is write a rulebase that suits most dialup users. You can obviously modify it to your needs by simply using the following rules as the foundation for @@ -187,9 +187,10 @@ ppp_profile="profile" rules for your allows, and then everything else is denied. :) Now, let's make the dir /etc/firewall. Change into the directory and - edit the file fwrules as we specified in rc.conf. Please note that you - can change this filename to be anything you wish. This guide just gives - an example of a filename. + edit the file fwrules as we specified in + rc.conf. Please note that you can change this + filename to be anything you wish. This guide just gives an example of a + filename. Now, let's look at a sample firewall file, and we'll detail everything in it. @@ -263,8 +264,8 @@ $fwcmd add 65435 deny log ip from any to any I'll have to be honest and say there's no definitive reason - why I use ipfw and natd instead of the built in ppp filters. From - the discussions I've had with people the consensus seems to be + why I use ipfw and natd instead of the built in ppp filters. From + the discussions I've had with people the consensus seems to be that while ipfw is certainly more powerful and more configurable than the ppp filters, what it makes up for in functionality it loses in being easy to customise. One of the reasons I use it is @@ -276,7 +277,7 @@ $fwcmd add 65435 deny log ip from any to any If I'm using private addresses internally, such as in the - 192.168.0.0 range, Could I add a command like $fwcmd add + 192.168.0.0 range, could I add a command like $fwcmd add deny all from any to 192.168.0.0:255.255.0.0 via tun0 to the firewall rules to prevent outside attempts to connect to internal machines?