Small fixes (#159)

pull/160/head
Michael Steenbeek 5 years ago committed by Ad Schellevis
parent c79df04ca9
commit ec942b034b

@ -200,7 +200,7 @@ Social media
------------
Contribute to the success of the project by letting others know how OPNsense helped
solving your network or security challenges. Let others know about OPNsense and/or
follow us & retweet our messages on `twitter <https://twitter.com/opnsense>`__.
follow us & retweet our messages on `Twitter <https://twitter.com/opnsense>`__.
Anything you can do to spread the word about OPNsense will help to reach our goal
to become the most widely used open source security & firewall platform.

@ -43,7 +43,7 @@ First of all, select Plugins in the menu:
.. image:: images/menu_plugins.png
On this page, you can install the frr plugin by clicking the `+` icon:
On this page, you can install the FRR plugin by clicking the `+` icon:
.. image:: images/plugins_frr.png

@ -42,7 +42,7 @@ Prerequisites
--------------------------------------
Setup Intrusion Detection & Prevention
--------------------------------------
To enable IDS/IPS just go to :menuselection:`Services -> Intrusion Detection` and select
To enable IDS/IPS just go to :menuselection:`Services --> Intrusion Detection` and select
**enabled & IPS mode**. Make sure you have selected the right interface for the intrusion
detection system too run on. For our example we will use the WAN interface, as
that will most likely be you connection with the public Internet.

@ -46,7 +46,7 @@ be redirected to it.
Port forwarding is also referred to as “Destination NAT” or “DNAT”.
In OPNsense, port forwarding can be set up by navigating to **Firewall->NAT->Port Forward**. Here, you will see
In OPNsense, port forwarding can be set up by navigating to :menuselection:`Firewall --> NAT --> Port Forward`. Here, you will see
an overview of port forwarding rules. New rules can be added by clicking **Add** in the upper right corner.
When adding a rule, the following fields are available:
@ -89,7 +89,7 @@ One-to-one
One-to-one NAT will, as the name implies, translate two IPs one-to-one, rather than one-to-many as is most common.
In this respect, it is similar to what NPT does for IPv6.
In OPNsense, one-to-one NAT can be set up by navigating to **Firewall->NAT->One-to-one**. Here, you will see an
In OPNsense, one-to-one NAT can be set up by navigating to :menuselection:`Firewall --> NAT --> One-to-one`. Here, you will see an
overview of one-to-one rules. New rules can be added by clicking **Add** in the upper right corner.
When adding a rule, the following fields are available:

Loading…
Cancel
Save