svn commit: r40732 - head/en_US.ISO8859-1/books/handbook/firewalls

Dru Lavigne dru at FreeBSD.org
Thu Jan 24 14:28:06 UTC 2013


Author: dru
Date: Thu Jan 24 14:28:05 2013
New Revision: 40732
URL: http://svnweb.freebsd.org/changeset/doc/40732

Log:
  Minor content fix which addresses incorrect usage of it's, Let's, and
  most redundant word errors.
  
  Approved by: bcr (mentor)

Modified:
  head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml

Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml	Thu Jan 24 10:39:46 2013	(r40731)
+++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml	Thu Jan 24 14:28:05 2013	(r40732)
@@ -720,7 +720,7 @@ ipnat_rules="/etc/ipnat.rules"    # rule
 	as a result of applying the user coded rules against packets
 	going in and out of the firewall since it was last started,
 	or since the last time the accumulators were reset to zero
-	by the <command>ipf -Z</command> command.</para>
+	using <command>ipf -Z</command>.</para>
 
       <para>See the &man.ipfstat.8; manual page for details.</para>
 
@@ -776,8 +776,8 @@ ipnat_rules="/etc/ipnat.rules"    # rule
 354727 block out on dc0 from any to any
 430918 pass out quick on dc0 proto tcp/udp from any to any keep state</screen>
 
-      <para>One of the most important functions of the
-	<command>ipfstat</command> command is the <option>-t</option>
+      <para>One of the most important functions of
+	<command>ipfstat</command> is the <option>-t</option>
 	flag which displays the state table in a way similar to the
 	way &man.top.1; shows the &os; running process table.  When
 	your firewall is under attack, this function gives you the
@@ -813,7 +813,7 @@ ipnat_rules="/etc/ipnat.rules"    # rule
 	automatically rotate system logs.  That is why outputting the
 	log information to &man.syslogd.8; is better than the default
 	of outputting to a regular file.  In the default
-	<filename>rc.conf</filename> file, the
+	<filename>rc.conf</filename>, the
 	<literal>ipmon_flags</literal> statement uses the
 	<option>-Ds</option> flags:</para>
 
@@ -866,8 +866,8 @@ LOG_ERR - packets which have been logged
        <screen>&prompt.root; <userinput>touch /var/log/ipfilter.log</userinput></screen>
 
       <para>The &man.syslogd.8; function is controlled by definition
-	statements in the <filename>/etc/syslog.conf</filename> file.
-	The <filename>syslog.conf</filename> file offers considerable
+	statements in <filename>/etc/syslog.conf</filename>.
+	This file offers considerable
 	flexibility in how <application>syslog</application> will
 	deal with system messages issued by software applications
 	like IPF.</para>
@@ -915,7 +915,7 @@ LOG_ERR - packets which have been logged
 	</listitem>
 
 	<listitem>
-	  <para>The group and rule number of the rule, e.g.
+	  <para>The group and rule number of the rule, e.g.,
 	    <literal>@0:17</literal>.</para>
 	</listitem>
       </orderedlist>
@@ -1053,7 +1053,7 @@ EOF
 	<listitem>
 	  <para>Disable IPFILTER in system startup scripts by adding
 	    <literal>ipfilter_enable="NO"</literal> (this is default
-	    value) into <filename>/etc/rc.conf</filename> file.</para>
+	    value) to <filename>/etc/rc.conf</filename>.</para>
 
 	  <para>Add a script like the following to your
 	    <filename
@@ -1541,8 +1541,8 @@ sh /etc/ipf.rules.script</programlisting
 	operating system of your server.</para>
 
       <para>Any time there are logged messages on a rule with
-	the <literal>log first</literal> option, an
-	<command>ipfstat -hio</command> command should be executed
+	the <literal>log first</literal> option,
+	<command>ipfstat -hio</command> should be executed
 	to evaluate how many times the rule has actually matched.
 	Large number of matches usually indicate that the system is
 	being flooded (i.e.: under attack).</para>
@@ -1710,7 +1710,7 @@ block in log first quick on dc0 proto tc
 block in log first quick on dc0 proto tcp/udp from any to any port = 81
 
 # Allow traffic in from ISP's DHCP server. This rule must contain
-# the IP address of your ISP's DHCP server as it's the only
+# the IP address of your ISP's DHCP server as it is the only
 # authorized source to send this packet type. Only necessary for
 # cable or DSL configurations. This rule is not needed for
 # 'user ppp' type connection to the public Internet.
@@ -1772,7 +1772,7 @@ block in log first quick on dc0 all
 	dynamic IP address is used to identify your system to the
 	public Internet.</para>
 
-      <para>Now lets say you have five PCs at home and each one needs
+      <para>Say you have five PCs at home and each one needs
 	Internet access.  You would have to pay your ISP for an
 	individual Internet account for each PC and have five phone
 	lines.</para>
@@ -1847,16 +1847,16 @@ block in log first quick on dc0 all
 
       <indexterm><primary><command>ipnat</command></primary></indexterm>
 
-      <para><acronym>NAT</acronym> rules are loaded by using the
-	<command>ipnat</command> command.  Typically the
+      <para><acronym>NAT</acronym> rules are loaded by using
+	<command>ipnat</command>.  Typically the
 	<acronym>NAT</acronym> rules are stored in
 	<filename>/etc/ipnat.rules</filename>.  See &man.ipnat.8; for
 	details.</para>
 
       <para>When changing the <acronym>NAT</acronym> rules after
 	<acronym>NAT</acronym> has been started, make your changes to
-	the file containing the NAT rules, then run the
-	<command>ipnat</command> command with the <option>-CF</option>
+	the file containing the NAT rules, then run
+	<command>ipnat</command> with the <option>-CF</option>
 	flags to delete the internal in use <acronym>NAT</acronym>
 	rules and flush the contents of the translation table of all
 	active entries.</para>
@@ -2304,8 +2304,8 @@ net.inet.ip.fw.verbose_limit=5</programl
       <programlisting>firewall_enable="YES"</programlisting>
 
       <para>To select one of the default firewall types provided by
-	&os;, select one by reading the
-	<filename>/etc/rc.firewall</filename> file and place it in
+	&os;, select one by reading
+	<filename>/etc/rc.firewall</filename> and place it in
 	the following:</para>
 
       <programlisting>firewall_type="open"</programlisting>
@@ -2388,8 +2388,7 @@ ipfw add deny out</programlisting>
 	    linkend="firewalls-ipfw-enable"/>).  There is no
 	  <filename>rc.conf</filename> variable to set log
 	  limitations, but it can be set via sysctl variable, manually
-	  or from the <filename>/etc/sysctl.conf</filename>
-	  file:</para>
+	  or from <filename>/etc/sysctl.conf</filename>:</para>
 
 	<programlisting>net.inet.ip.fw.verbose_limit=5</programlisting>
       </warning>
@@ -2610,8 +2609,7 @@ ipfw add deny out</programlisting>
 	    cases, a value of zero removes the logging limit.  Once
 	    the limit is reached, logging can be re-enabled by
 	    clearing the logging counter or the packet counter for
-	    that rule, see the <command>ipfw reset log</command>
-	    command.</para>
+	    that rule, use <command>ipfw reset log</command>.</para>
 
 	  <note>
 	    <para>Logging is done after
@@ -2779,7 +2777,7 @@ ipfw add deny out</programlisting>
 	  down attackers.</para>
 
 	<para>Even with the logging facility enabled, IPFW will not
-	  generate any rule logging on it's own.  The firewall
+	  generate any rule logging on its own.  The firewall
 	  administrator decides what rules in the ruleset will be
 	  logged, and adds the <literal>log</literal> verb to those
 	  rules.  Normally only deny rules are logged, like the deny
@@ -2816,9 +2814,8 @@ ipfw add deny out</programlisting>
 	<programlisting>last message repeated 45 times</programlisting>
 
 	<para>All logged packets messages are written by default to
-	  <filename>/var/log/security</filename> file, which is
-	  defined in the <filename>/etc/syslog.conf</filename>
-	  file.</para>
+	  <filename>/var/log/security</filename>, which is
+	  defined in <filename>/etc/syslog.conf</filename>.</para>
       </sect3>
 
       <sect3 id="firewalls-ipfw-rules-script">
@@ -2864,8 +2861,8 @@ ks="keep-state"        # just too lazy t
 	  in this example, how the symbolic substitution field are
 	  populated and used are.</para>
 
-	<para>If the above example was in the
-	  <filename>/etc/ipfw.rules</filename> file, the rules could
+	<para>If the above example was in
+	  <filename>/etc/ipfw.rules</filename>, the rules could
 	  be reloaded by entering the following on the command
 	  line.</para>
 
@@ -3223,7 +3220,7 @@ natd_flags="-dynamic -m"            # -m
 	  <literal>skipto rule 500</literal> for the network address
 	  translation.</para>
 
-	<para>Lets say a LAN user uses their web browser to get a web
+	<para>Say a LAN user uses their web browser to get a web
 	  page.  Web pages are transmitted over port 80.  So the
 	  packet enters the firewall.  It does not match rule 100
 	  because it is headed out rather than  in.  It passes rule
@@ -3231,7 +3228,7 @@ natd_flags="-dynamic -m"            # -m
 	  posted to the keep-state dynamic table yet.  The packet
 	  finally comes to rule 125 a matches.  It is outbound through
 	  the NIC facing the public Internet.  The packet still has
-	  it's source IP address as a private LAN IP address.  On
+	  its source IP address as a private LAN IP address.  On
 	  the match to this rule, two actions take place.  The
 	  <literal>keep-state</literal> option will post this rule
 	  into the keep-state dynamic rules table and the specified
@@ -3254,14 +3251,14 @@ natd_flags="-dynamic -m"            # -m
 	  entry is found,  the associated action,
 	  <literal>skipto 500</literal>, is executed.  The packet
 	  jumps to rule 500 gets <acronym>NAT</acronym>ed and released
-	  on it's way out.</para>
+	  on its way out.</para>
 
 	<para>On the inbound side, everything coming in that is part
 	  of an existing session conversation is being automatically
 	  handled by the <literal>check-state</literal> rule and the
 	  properly placed <literal>divert natd</literal> rules.  All
 	  we have to address is denying all the bad packets and only
-	  allowing in the authorized services.  Lets say there is an
+	  allowing in the authorized services.  Say there is an
 	  apache server running on the firewall box and we want people
 	  on the public Internet to be able to access the local web
 	  site.  The new inbound start request packet matches rule
@@ -3454,7 +3451,7 @@ pif="rl0"     # public interface name of
 $cmd 332 deny tcp from any to any established in via $pif
 
 # Allow traffic in from ISP's DHCP server. This rule must contain
-# the IP address of your ISP's DHCP server as it's the only
+# the IP address of your ISP's DHCP server as it is the only
 # authorized source to send this packet type.
 # Only necessary for cable or DSL configurations.
 # This rule is not needed for 'user ppp' type connection to


More information about the svn-doc-head mailing list