summaryrefslogtreecommitdiff
path: root/share/man
diff options
context:
space:
mode:
authorHenning Brauer <henning@cvs.openbsd.org>2002-09-18 16:28:48 +0000
committerHenning Brauer <henning@cvs.openbsd.org>2002-09-18 16:28:48 +0000
commit81cd30fdb38bf839b31670a7ed9bad051eb2db9e (patch)
treef07993921df9f8886b3eebd8390b4071a4d234aa /share/man
parent310e773332bfaf00e9f9f7b418e0a8eab9353650 (diff)
not good; back to old version
Diffstat (limited to 'share/man')
-rw-r--r--share/man/man5/pf.conf.536
1 files changed, 16 insertions, 20 deletions
diff --git a/share/man/man5/pf.conf.5 b/share/man/man5/pf.conf.5
index 8d5ccef7aaa..c5be96e95f3 100644
--- a/share/man/man5/pf.conf.5
+++ b/share/man/man5/pf.conf.5
@@ -1,4 +1,4 @@
-.\" $OpenBSD: pf.conf.5,v 1.85 2002/09/18 16:14:31 henning Exp $
+.\" $OpenBSD: pf.conf.5,v 1.86 2002/09/18 16:28:47 henning Exp $
.\"
.\" Copyright (c) 2002, Daniel Hartmeier
.\" All rights reserved.
@@ -33,11 +33,11 @@
.Sh NAME
.Nm pf.conf
.Nd filtering and translation (NAT) rules file for the
-Packet Filter
+packet filter
.Sh DESCRIPTION
The
.Xr pf 4
-Packet Filter drops, passes and modifies packets according to the
+packet filter drops, passes and modifies packets according to the
rules defined in this file.
Filter rules are used to selectively pass traffic while translation
rules specify which addresses are to be mapped and which are to be
@@ -51,14 +51,14 @@ performed.
In short: filters are last match, nat is first match.
Rules must be in order: options, scrub, nat, filter.
.Sh FILTER RULES
-Although filter rules are typically manipulated using
-.Xr pfctl 8 ,
+While filter rules are typically manipulated using
+.Xr pfctl 8
other utilities may be written using the
.Xr ioctl 2
interface described in
.Xr pf 4 .
.Pp
-For each packet processed by the Packet Filter, the filter rules are
+For each packet processed by the packet filter, the filter rules are
evaluated in sequential order, from first to last.
Each rule either matches the packet or doesn't.
The last matching rule decides what action is taken.
@@ -173,13 +173,13 @@ In this example pf is told to collect statistics on the interface named dc0:
set loginterface dc0
.Ed
.Pp
-One stops interface statistics collection using
+One can unset the loginterface using
.Bd -literal
set loginterface none
.Ed
.Pp
.Ss limit
-Sets hard limits on the memory pools used by the Packet Filter.
+Sets hard limits on the memory pools used by the packet filter.
See
.Xr pool 9
for an explanation of memory pools.
@@ -208,7 +208,7 @@ environments:
.Bl -tag -width "O high-latency " -compact
.It Em default
A normal network environment.
-Suitable for most networks.
+Suitable for almost all networks.
.It Em normal
Alias for
.Em default
@@ -336,10 +336,8 @@ Common protocols used here are tcp, udp, icmp and ipv6-icmp.
The rule applies only to packets with the specified source and destination
addresses/ports.
.Pp
-Addresses can be specified in CIDR notation (1.2.3.0/24, matching
-the entire netblock), as
-symbolic host names (www.openbsd.org) or interface names (dc0), or as
-any of the following keywords:
+Addresses can be specified in CIDR notation (matching netblocks), as
+symbolic host names or interface names, or as any of the following keywords:
.Bl -tag -width no-route -compact
.It Em any
means any address;
@@ -350,8 +348,7 @@ means any address which is not currently routable.
Host name resolution and interface to address translation are done at
rule set load-time.
When the address of an interface (or host name) changes (by DHCP or PPP,
-for instance), the rule set normally must be reloaded for the change
-to be reflected
+for instance), the rule set must be reloaded for the change to be reflected
in the kernel.
Interface names surrounded by parentheses cause an automatic update of
the rule whenever the referenced interface changes its address.
@@ -372,7 +369,7 @@ means
hence ports 2001, 2002 and 2003.
.It Em port 2000 <> 2004
means
-.Sq all ports < 2000 and > 2004 ,
+.Sq all ports < 2000 or > 2004 ,
hence ports 1-1999 and 2005-65535.
.El
.Pp
@@ -515,7 +512,7 @@ option is to a NAT rule what the
option is to a filter rule.
This option causes matching packets to remain untranslated.
.Sh ROUTING
-If a packet matches a rule with a route option set, the Packet Filter will
+If a packet matches a rule with a route option set, the packet filter will
route the packet according to the type of route option.
.Ss fastroute
The
@@ -546,7 +543,7 @@ and underscores.
Macros are not expanded recursively.
.Sh STATEFUL INSPECTION
.Em pf
-is a stateful Packet Filter, which means it can track the state of
+is a stateful packet filter, which means it can track the state of
a connection.
Instead of passing all traffic to port 25, for instance, one can pass
only the initial packet and keep state.
@@ -744,8 +741,7 @@ on IP level, and such headers are not part of all fragments of a packet.
It's even possible that no fragment contains a complete subprotocol
header, because that header is split among fragments.
.Pp
-There are two options for handling fragments in the Packet Filter:
-A
+There are two options for handling fragments in the packet filter:
.Pp
Using scrub rules, fragments can be reassembled by normalization.
In this case, fragments are cached until they form a complete