docs/78120: Lan -> LAN
Brad Davis
so14k at so14k.com
Sat Feb 26 16:00:33 UTC 2005
>Number: 78120
>Category: docs
>Synopsis: Lan -> LAN
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: freebsd-doc
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: doc-bug
>Submitter-Id: current-users
>Arrival-Date: Sat Feb 26 16:00:32 GMT 2005
>Closed-Date:
>Last-Modified:
>Originator: Brad Davis
>Release: FreeBSD 5.4-PRERELEASE i386
>Organization:
>Environment:
System: FreeBSD mccaffrey.house.so14k.com 5.4-PRERELEASE FreeBSD 5.4-PRERELEASE #0: Thu Feb 24 17:03:44 MST 2005 root at mccaffrey.house.so14k.com:/usr/obj/usr/src/sys/SMP i386
>Description:
Lan -> LAN in the firewall section.
>How-To-Repeat:
>Fix:
--- doc-ori/en_US.ISO8859-1/books/handbook/firewalls/chapter.sgml Fri Feb 25 13:31:41 2005
+++ doc2/en_US.ISO8859-1/books/handbook/firewalls/chapter.sgml Sat Feb 26 08:52:48 2005
@@ -355,7 +355,7 @@
packets for the computers in the LAN or want to do NAT, you have to
enable the following option as well:</para>
- <programlisting>gateway_enable="YES" # Enable as Lan gateway</programlisting>
+ <programlisting>gateway_enable="YES" # Enable as LAN gateway</programlisting>
</sect2>
</sect1>
@@ -511,7 +511,7 @@
reserved private IP address ranges, then you need to add the
following to enable <acronym>NAT</acronym> functionality:</para>
- <programlisting>gateway_enable="YES" # Enable as Lan gateway
+ <programlisting>gateway_enable="YES" # Enable as LAN gateway
ipnat_enable="YES" # Start ipnat function
ipnat_rules="/etc/ipnat.rules" # rules definition file for ipnat</programlisting>
@@ -1718,7 +1718,7 @@
wins. <acronym>NAT</acronym> tests each of its rules against
the packets interface name and source IP address. When a
packets interface name matches a <acronym>NAT</acronym> rule
- then the [source IP address, i.e. private Lan IP address] of
+ then the [source IP address, i.e. private LAN IP address] of
the packet is checked to see if it falls within the IP address
range specified to the left of the arrow symbol on the
<acronym>NAT</acronym> rule. On a match the packet has its
@@ -2876,7 +2876,7 @@
of the location of rule numbers 100 101, 450, 500, and 510.
These rules control the translation of the outbound and
inbound packets so their entries in the keep-state dynamic
- table always register the private Lan IP address. Next
+ table always register the private LAN IP address. Next
notice that all the allow and deny rules specified the
direction the packet is going (IE outbound or inbound) and
the interface. Also notice that all the start outbound
@@ -2891,7 +2891,7 @@
dynamic table yet. The packet finally comes to rule 125 a
matches. It is outbound through the NIC facing the public
Internet. The packet still has it's source IP address as a
- private Lan IP address. On the match to this rule, two
+ private LAN IP address. On the match to this rule, two
actions take place. The keep-state option will post this rule
into the keep-state dynamic rules table and the specified
action is executed. The action is part of the info posted to
@@ -2900,7 +2900,7 @@
this, this is very important. This packet makes its way to
the destination and returns and enters the top of the rule
set. This time it does match rule 100 and has it destination
- IP address mapped back to its corresponding Lan IP address.
+ IP address mapped back to its corresponding LAN IP address.
It then is processed by the check-state rule, it's found in
the table as an existing session conversation and released
to the LAN. It goes to the LAN PC that sent it and a new
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-doc
mailing list