diff --git a/Linux-and-BSD-firewalls-cheat-sheet.adoc b/Linux-and-BSD-firewalls-cheat-sheet.adoc index f1ce72d..31b3ad7 100644 --- a/Linux-and-BSD-firewalls-cheat-sheet.adoc +++ b/Linux-and-BSD-firewalls-cheat-sheet.adoc @@ -80,7 +80,7 @@ v1.0, 2020-09-01 |Enable PF and load the rule set from file `/etc/pf.conf` in one go. |*pfctl -nf /etc/pf.conf* -|Parse security rules soterd in a file without installing them (dry run). +|Parse security rules stored in a file without installing them (dry run). |*pass in quick on egress from 62.13.77.141 to any* | 'Quick' rule (means allows this traffic on all interfaces, otherwise we would need 2nd rule allowing this traffic in _outgoing_ direction on egress interface) to allow incoming ANY port/protocol with the source being `62.13.77.141` and destination being ANY IP address behind the PF firewall. NOTE: here, `egress` is not a direction, but a group name to which the interface in question (`em0`) belongs to. In OpenBSD you set it in a file `/etc/hostname.em0: group egress`. diff --git a/Linux-and-BSD-firewalls-cheat-sheet.pdf b/Linux-and-BSD-firewalls-cheat-sheet.pdf index 027dc52..9396294 100644 --- a/Linux-and-BSD-firewalls-cheat-sheet.pdf +++ b/Linux-and-BSD-firewalls-cheat-sheet.pdf @@ -5,8 +5,8 @@ /Author (Yuri Slobodyanyuk) /Creator (Asciidoctor PDF 1.5.3, based on Prawn 2.2.2) /Producer (Yuri Slobodyanyuk) -/ModDate (D:20201030160057+00'00') -/CreationDate (D:20201030160109+00'00') +/ModDate (D:20201030160315+00'00') +/CreationDate (D:20201030160320+00'00') >> endobj 2 0 obj @@ -2098,7 +2098,7 @@ S BT 300.64 563.026 Td /F1.0 10.5 Tf -<50617273652073656375726974792072756c657320736f7465726420696e20612066696c6520776974686f7574> Tj +<50617273652073656375726974792072756c65732073746f72656420696e20612066696c6520776974686f7574> Tj ET