Minor content fix which addresses incorrect usage of it's, Let's, and

most redundant word errors.

Approved by: bcr (mentor)
This commit is contained in:
Dru Lavigne 2013-01-24 14:28:05 +00:00
parent 9cf01fa948
commit bbdfbf0789
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=40732

View file

@ -720,7 +720,7 @@ ipnat_rules="/etc/ipnat.rules" # rules definition file for ipnat</programlist
as a result of applying the user coded rules against packets
going in and out of the firewall since it was last started,
or since the last time the accumulators were reset to zero
by the <command>ipf -Z</command> command.</para>
using <command>ipf -Z</command>.</para>
<para>See the &man.ipfstat.8; manual page for details.</para>
@ -776,8 +776,8 @@ ipnat_rules="/etc/ipnat.rules" # rules definition file for ipnat</programlist
354727 block out on dc0 from any to any
430918 pass out quick on dc0 proto tcp/udp from any to any keep state</screen>
<para>One of the most important functions of the
<command>ipfstat</command> command is the <option>-t</option>
<para>One of the most important functions of
<command>ipfstat</command> is the <option>-t</option>
flag which displays the state table in a way similar to the
way &man.top.1; shows the &os; running process table. When
your firewall is under attack, this function gives you the
@ -813,7 +813,7 @@ ipnat_rules="/etc/ipnat.rules" # rules definition file for ipnat</programlist
automatically rotate system logs. That is why outputting the
log information to &man.syslogd.8; is better than the default
of outputting to a regular file. In the default
<filename>rc.conf</filename> file, the
<filename>rc.conf</filename>, the
<literal>ipmon_flags</literal> statement uses the
<option>-Ds</option> flags:</para>
@ -866,8 +866,8 @@ LOG_ERR - packets which have been logged and which can be considered short</scre
<screen>&prompt.root; <userinput>touch /var/log/ipfilter.log</userinput></screen>
<para>The &man.syslogd.8; function is controlled by definition
statements in the <filename>/etc/syslog.conf</filename> file.
The <filename>syslog.conf</filename> file offers considerable
statements in <filename>/etc/syslog.conf</filename>.
This file offers considerable
flexibility in how <application>syslog</application> will
deal with system messages issued by software applications
like IPF.</para>
@ -915,7 +915,7 @@ LOG_ERR - packets which have been logged and which can be considered short</scre
</listitem>
<listitem>
<para>The group and rule number of the rule, e.g.
<para>The group and rule number of the rule, e.g.,
<literal>@0:17</literal>.</para>
</listitem>
</orderedlist>
@ -1053,7 +1053,7 @@ EOF
<listitem>
<para>Disable IPFILTER in system startup scripts by adding
<literal>ipfilter_enable="NO"</literal> (this is default
value) into <filename>/etc/rc.conf</filename> file.</para>
value) to <filename>/etc/rc.conf</filename>.</para>
<para>Add a script like the following to your
<filename
@ -1541,8 +1541,8 @@ sh /etc/ipf.rules.script</programlisting>
operating system of your server.</para>
<para>Any time there are logged messages on a rule with
the <literal>log first</literal> option, an
<command>ipfstat -hio</command> command should be executed
the <literal>log first</literal> option,
<command>ipfstat -hio</command> should be executed
to evaluate how many times the rule has actually matched.
Large number of matches usually indicate that the system is
being flooded (i.e.: under attack).</para>
@ -1710,7 +1710,7 @@ block in log first quick on dc0 proto tcp/udp from any to any port = 139
block in log first quick on dc0 proto tcp/udp from any to any port = 81
# Allow traffic in from ISP's DHCP server. This rule must contain
# the IP address of your ISP's DHCP server as it's the only
# the IP address of your ISP's DHCP server as it is the only
# authorized source to send this packet type. Only necessary for
# cable or DSL configurations. This rule is not needed for
# 'user ppp' type connection to the public Internet.
@ -1772,7 +1772,7 @@ block in log first quick on dc0 all
dynamic IP address is used to identify your system to the
public Internet.</para>
<para>Now lets say you have five PCs at home and each one needs
<para>Say you have five PCs at home and each one needs
Internet access. You would have to pay your ISP for an
individual Internet account for each PC and have five phone
lines.</para>
@ -1847,16 +1847,16 @@ block in log first quick on dc0 all
<indexterm><primary><command>ipnat</command></primary></indexterm>
<para><acronym>NAT</acronym> rules are loaded by using the
<command>ipnat</command> command. Typically the
<para><acronym>NAT</acronym> rules are loaded by using
<command>ipnat</command>. Typically the
<acronym>NAT</acronym> rules are stored in
<filename>/etc/ipnat.rules</filename>. See &man.ipnat.8; for
details.</para>
<para>When changing the <acronym>NAT</acronym> rules after
<acronym>NAT</acronym> has been started, make your changes to
the file containing the NAT rules, then run the
<command>ipnat</command> command with the <option>-CF</option>
the file containing the NAT rules, then run
<command>ipnat</command> with the <option>-CF</option>
flags to delete the internal in use <acronym>NAT</acronym>
rules and flush the contents of the translation table of all
active entries.</para>
@ -2304,8 +2304,8 @@ net.inet.ip.fw.verbose_limit=5</programlisting>
<programlisting>firewall_enable="YES"</programlisting>
<para>To select one of the default firewall types provided by
&os;, select one by reading the
<filename>/etc/rc.firewall</filename> file and place it in
&os;, select one by reading
<filename>/etc/rc.firewall</filename> and place it in
the following:</para>
<programlisting>firewall_type="open"</programlisting>
@ -2388,8 +2388,7 @@ ipfw add deny out</programlisting>
linkend="firewalls-ipfw-enable"/>). There is no
<filename>rc.conf</filename> variable to set log
limitations, but it can be set via sysctl variable, manually
or from the <filename>/etc/sysctl.conf</filename>
file:</para>
or from <filename>/etc/sysctl.conf</filename>:</para>
<programlisting>net.inet.ip.fw.verbose_limit=5</programlisting>
</warning>
@ -2610,8 +2609,7 @@ ipfw add deny out</programlisting>
cases, a value of zero removes the logging limit. Once
the limit is reached, logging can be re-enabled by
clearing the logging counter or the packet counter for
that rule, see the <command>ipfw reset log</command>
command.</para>
that rule, use <command>ipfw reset log</command>.</para>
<note>
<para>Logging is done after
@ -2779,7 +2777,7 @@ ipfw add deny out</programlisting>
down attackers.</para>
<para>Even with the logging facility enabled, IPFW will not
generate any rule logging on it's own. The firewall
generate any rule logging on its own. The firewall
administrator decides what rules in the ruleset will be
logged, and adds the <literal>log</literal> verb to those
rules. Normally only deny rules are logged, like the deny
@ -2816,9 +2814,8 @@ ipfw add deny out</programlisting>
<programlisting>last message repeated 45 times</programlisting>
<para>All logged packets messages are written by default to
<filename>/var/log/security</filename> file, which is
defined in the <filename>/etc/syslog.conf</filename>
file.</para>
<filename>/var/log/security</filename>, which is
defined in <filename>/etc/syslog.conf</filename>.</para>
</sect3>
<sect3 id="firewalls-ipfw-rules-script">
@ -2864,8 +2861,8 @@ ks="keep-state" # just too lazy to key this each time
in this example, how the symbolic substitution field are
populated and used are.</para>
<para>If the above example was in the
<filename>/etc/ipfw.rules</filename> file, the rules could
<para>If the above example was in
<filename>/etc/ipfw.rules</filename>, the rules could
be reloaded by entering the following on the command
line.</para>
@ -3223,7 +3220,7 @@ natd_flags="-dynamic -m" # -m = preserve port numbers if possible</pr
<literal>skipto rule 500</literal> for the network address
translation.</para>
<para>Lets say a LAN user uses their web browser to get a web
<para>Say a LAN user uses their web browser to get a web
page. Web pages are transmitted over port 80. So the
packet enters the firewall. It does not match rule 100
because it is headed out rather than in. It passes rule
@ -3231,7 +3228,7 @@ natd_flags="-dynamic -m" # -m = preserve port numbers if possible</pr
posted to the keep-state dynamic table yet. The packet
finally comes to rule 125 a matches. It is outbound through
the NIC facing the public Internet. The packet still has
it's source IP address as a private LAN IP address. On
its source IP address as a private LAN IP address. On
the match to this rule, two actions take place. The
<literal>keep-state</literal> option will post this rule
into the keep-state dynamic rules table and the specified
@ -3254,14 +3251,14 @@ natd_flags="-dynamic -m" # -m = preserve port numbers if possible</pr
entry is found, the associated action,
<literal>skipto 500</literal>, is executed. The packet
jumps to rule 500 gets <acronym>NAT</acronym>ed and released
on it's way out.</para>
on its way out.</para>
<para>On the inbound side, everything coming in that is part
of an existing session conversation is being automatically
handled by the <literal>check-state</literal> rule and the
properly placed <literal>divert natd</literal> rules. All
we have to address is denying all the bad packets and only
allowing in the authorized services. Lets say there is an
allowing in the authorized services. Say there is an
apache server running on the firewall box and we want people
on the public Internet to be able to access the local web
site. The new inbound start request packet matches rule
@ -3454,7 +3451,7 @@ pif="rl0" # public interface name of NIC
&dollar;cmd 332 deny tcp from any to any established in via &dollar;pif
# Allow traffic in from ISP's DHCP server. This rule must contain
# the IP address of your ISP's DHCP server as it's the only
# the IP address of your ISP's DHCP server as it is the only
# authorized source to send this packet type.
# Only necessary for cable or DSL configurations.
# This rule is not needed for 'user ppp' type connection to