diff --git a/en_US.ISO8859-1/books/handbook/firewalls/chapter.sgml b/en_US.ISO8859-1/books/handbook/firewalls/chapter.sgml
index 1fdee36923..af7d378a50 100644
--- a/en_US.ISO8859-1/books/handbook/firewalls/chapter.sgml
+++ b/en_US.ISO8859-1/books/handbook/firewalls/chapter.sgml
@@ -1686,7 +1686,7 @@ block in log first quick on dc0 all
role="ipaddr">192.168.1.0/24.
The PUBLIC_ADDRESS can either
- be the external IP address or the special keyword `0.32',
+ be the external IP address or the special keyword 0/32,
which means to use the IP address assigned to
IF.
@@ -1706,7 +1706,7 @@ block in log first quick on dc0 all
range specified to the left of the arrow symbol on the
NAT rule. On a match the packet has its
source IP address rewritten with the public IP address
- obtained by the `0.32' keyword. NAT posts a
+ obtained by the 0/32 keyword. NAT posts a
entry in its internal NAT table so when the
packet returns from the public Internet it can be mapped back
to its original private IP address and then passed to the
@@ -1753,7 +1753,7 @@ block in log first quick on dc0 all
with a tag ?-->
A normal NAT rule would look like:
- map dc0 192.168.1.0/24 -> 0.32
+ map dc0 192.168.1.0/24 -> 0/32
In the above rule the packet's source port is unchanged
as the packet passes through IPNAT. By
@@ -1763,13 +1763,13 @@ block in log first quick on dc0 all
IPNAT to modify the source port to be
within that range:
- map dc0 192.168.1.0/24 -> 0.32 portmap tcp/udp 20000:60000
+ map dc0 192.168.1.0/24 -> 0/32 portmap tcp/udp 20000:60000
Additionally we can make things even easier by using the
auto keyword to tell IPNAT to determine
by itself which ports are available to use:
- map dc0 192.168.1.0/24 -> 0.32 portmap tcp/udp auto
+ map dc0 192.168.1.0/24 -> 0/32 portmap tcp/udp auto