diff --git a/en_US.ISO8859-1/books/handbook/firewalls/chapter.sgml b/en_US.ISO8859-1/books/handbook/firewalls/chapter.sgml index 1fdee36923..af7d378a50 100644 --- a/en_US.ISO8859-1/books/handbook/firewalls/chapter.sgml +++ b/en_US.ISO8859-1/books/handbook/firewalls/chapter.sgml @@ -1686,7 +1686,7 @@ block in log first quick on dc0 all role="ipaddr">192.168.1.0/24. The PUBLIC_ADDRESS can either - be the external IP address or the special keyword `0.32', + be the external IP address or the special keyword 0/32, which means to use the IP address assigned to IF. @@ -1706,7 +1706,7 @@ block in log first quick on dc0 all range specified to the left of the arrow symbol on the NAT rule. On a match the packet has its source IP address rewritten with the public IP address - obtained by the `0.32' keyword. NAT posts a + obtained by the 0/32 keyword. NAT posts a entry in its internal NAT table so when the packet returns from the public Internet it can be mapped back to its original private IP address and then passed to the @@ -1753,7 +1753,7 @@ block in log first quick on dc0 all with a tag ?--> A normal NAT rule would look like: - map dc0 192.168.1.0/24 -> 0.32 + map dc0 192.168.1.0/24 -> 0/32 In the above rule the packet's source port is unchanged as the packet passes through IPNAT. By @@ -1763,13 +1763,13 @@ block in log first quick on dc0 all IPNAT to modify the source port to be within that range: - map dc0 192.168.1.0/24 -> 0.32 portmap tcp/udp 20000:60000 + map dc0 192.168.1.0/24 -> 0/32 portmap tcp/udp 20000:60000 Additionally we can make things even easier by using the auto keyword to tell IPNAT to determine by itself which ports are available to use: - map dc0 192.168.1.0/24 -> 0.32 portmap tcp/udp auto + map dc0 192.168.1.0/24 -> 0/32 portmap tcp/udp auto