mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
service: Corrected spelling mistakes
This commit is contained in:
parent
0389f28eac
commit
4c27b48a71
@ -20,7 +20,7 @@ Configuration
|
||||
.. cfgcmd:: set service broadcast-relay id <n> description <description>
|
||||
|
||||
A description can be added for each and every unique relay ID. This is
|
||||
useful to distinguish between multiple different ports/appliactions.
|
||||
useful to distinguish between multiple different ports/applications.
|
||||
|
||||
.. cfgcmd:: set service broadcast-relay id <n> interface <interface>
|
||||
|
||||
@ -35,7 +35,7 @@ Configuration
|
||||
|
||||
.. cfgcmd:: set service broadcast-relay id <n> port <port>
|
||||
|
||||
The UDP port number used by your apllication. It is mandatory for this kind
|
||||
The UDP port number used by your application. It is mandatory for this kind
|
||||
of operation.
|
||||
|
||||
.. cfgcmd:: set service broadcast-relay id <n> disable
|
||||
|
||||
@ -29,7 +29,7 @@ will be mandatorily defragmented.
|
||||
|
||||
It is possible to use either Multicast or Unicast to sync conntrack traffic.
|
||||
Most examples below show Multicast, but unicast can be specified by using the
|
||||
"peer" keywork after the specificed interface, as in the following example:
|
||||
"peer" keywork after the specified interface, as in the following example:
|
||||
|
||||
:cfgcmd:`set service conntrack-sync interface eth0 peer 192.168.0.250`
|
||||
|
||||
@ -204,7 +204,7 @@ Now configure conntrack-sync service on ``router1`` **and** ``router2``
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set high-availablilty vrrp group internal virtual-address ... etc ...
|
||||
set high-availability vrrp group internal virtual-address ... etc ...
|
||||
set high-availability vrrp sync-group syncgrp member 'internal'
|
||||
set service conntrack-sync accept-protocol 'tcp'
|
||||
set service conntrack-sync accept-protocol 'udp'
|
||||
|
||||
@ -33,7 +33,7 @@ Configuration
|
||||
Configure direction for processing traffic.
|
||||
|
||||
.. cfgcmd:: set service ids ddos-protection exclude-network <x.x.x.x/x>
|
||||
.. cfgcmd:: set service ids ddos-protection exlude-network <h:h:h:h:h:h:h:h/x>
|
||||
.. cfgcmd:: set service ids ddos-protection exclude-network <h:h:h:h:h:h:h:h/x>
|
||||
|
||||
Specify IPv4 and/or IPv6 networks which are going to be excluded.
|
||||
|
||||
@ -56,7 +56,7 @@ Configuration
|
||||
|
||||
.. cfgcmd:: set service ids ddos-protection sflow port <1-65535>
|
||||
|
||||
Configure port number to be used for sflow conection. Default port is 6343.
|
||||
Configure port number to be used for sflow connection. Default port is 6343.
|
||||
|
||||
.. cfgcmd:: set service ids ddos-protection threshold general
|
||||
[fps | mbps | pps] <0-4294967294>
|
||||
@ -96,7 +96,7 @@ In this simplified scenario, main things to be considered are:
|
||||
* Interface **eth0** used to connect to upstream.
|
||||
|
||||
Since we are analyzing attacks to and from our internal network, two types
|
||||
of attacks can be identified, and differents actions are needed:
|
||||
of attacks can be identified, and different actions are needed:
|
||||
|
||||
* External attack: an attack from the internet towards an internal IP
|
||||
is identify. In this case, all connections towards such IP will be
|
||||
|
||||
@ -38,7 +38,7 @@ Configuration
|
||||
"Cur Hop Limit", "hop-limit", "Hop count field of the outgoing RA packets"
|
||||
"""Managed address configuration"" flag", "managed-flag", "Tell hosts to use the administered stateful protocol (i.e. DHCP) for autoconfiguration"
|
||||
"""Other configuration"" flag", "other-config-flag", "Tell hosts to use the administered (stateful) protocol (i.e. DHCP) for autoconfiguration of other (non-address) information"
|
||||
"MTU","link-mtu","Link MTU value placed in RAs, exluded in RAs if unset"
|
||||
"MTU","link-mtu","Link MTU value placed in RAs, excluded in RAs if unset"
|
||||
"Router Lifetime","default-lifetime","Lifetime associated with the default router in units of seconds"
|
||||
"Reachable Time","reachable-time","Time, in milliseconds, that a node assumes a neighbor is reachable after having received a reachability confirmation"
|
||||
"Retransmit Timer","retrans-timer","Time in milliseconds between retransmitted Neighbor Solicitation messages"
|
||||
|
||||
@ -17,7 +17,7 @@ Requirements
|
||||
************
|
||||
|
||||
To use the Salt-Minion, a running Salt-Master is required. You can find more
|
||||
in the `Salt Poject Documentaion
|
||||
in the `Salt Project Documentation
|
||||
<https://docs.saltproject.io/en/latest/contents.html>`_
|
||||
|
||||
*************
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user