summaryrefslogtreecommitdiffstats
path: root/etc/rc.firewall
diff options
context:
space:
mode:
authoruqs <uqs@FreeBSD.org>2012-01-07 16:10:32 +0000
committeruqs <uqs@FreeBSD.org>2012-01-07 16:10:32 +0000
commita6f0acec2462cbe8bb36e91f7f31a2b99f2a00c3 (patch)
treecf76dc8352183d750424d745337dc73b3d75165e /etc/rc.firewall
parenta57e93785128519833b464e697ab35fa9560c9ad (diff)
downloadFreeBSD-src-a6f0acec2462cbe8bb36e91f7f31a2b99f2a00c3.zip
FreeBSD-src-a6f0acec2462cbe8bb36e91f7f31a2b99f2a00c3.tar.gz
Spelling fixes for etc/
Diffstat (limited to 'etc/rc.firewall')
-rw-r--r--etc/rc.firewall10
1 files changed, 5 insertions, 5 deletions
diff --git a/etc/rc.firewall b/etc/rc.firewall
index 3db984e..d5f2dbe 100644
--- a/etc/rc.firewall
+++ b/etc/rc.firewall
@@ -46,7 +46,7 @@ fi
# client - will try to protect just this machine
# simple - will try to protect a whole network
# closed - totally disables IP services except via lo0 interface
-# workstation - will try to protect just this machine using statefull
+# workstation - will try to protect just this machine using stateful
# firewalling. See below for rc.conf variables used
# UNKNOWN - disables the loading of firewall rules.
# filename - will load the rules in the given filename (full path required)
@@ -105,7 +105,7 @@ setup_ipv6_mandatory () {
${fwcmd} add pass ipv6-icmp from fe80::/10 to fe80::/10
${fwcmd} add pass ipv6-icmp from fe80::/10 to ff02::/16
- # Allow ICMPv6 destination unreach
+ # Allow ICMPv6 destination unreachable
${fwcmd} add pass ipv6-icmp from any to any icmp6types 1
# Allow NS/NA/toobig (don't filter it out)
@@ -437,7 +437,7 @@ case ${firewall_type} in
# default denied packets should be
# logged (in /var/log/security).
# firewall_nologports: List of TCP/UDP ports for which
- # denied incomming packets are not
+ # denied incoming packets are not
# logged.
# Allow packets for which a state has been built.
@@ -505,7 +505,7 @@ case ${firewall_type} in
${fwcmd} add deny { tcp or udp } from any to any $i in
done
- # Broadcasts and muticasts
+ # Broadcasts and multicasts
${fwcmd} add deny ip from any to 255.255.255.255
${fwcmd} add deny ip from any to 224.0.0.0/24 in # XXX
@@ -513,7 +513,7 @@ case ${firewall_type} in
${fwcmd} add deny udp from any to any 520 in
# Noise from webbrowsing.
- # The statefull filter is a bit agressive, and will cause some
+ # The stateful filter is a bit aggressive, and will cause some
# connection teardowns to be logged.
${fwcmd} add deny tcp from any 80,443 to any 1024-65535 in
OpenPOWER on IntegriCloud