Skip to content

Commit

Permalink
DOCUMENT-75: cstate param in my_fw::pre example should be state
Browse files Browse the repository at this point in the history
Fixed!
  • Loading branch information
jbondpdx committed Oct 17, 2014
1 parent de7d781 commit b65afaf
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions README.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@ Therefore, the run order is:
* Your rules (defined in code)
* The rules in `my_fw::post`

The rules in the `pre` and `post` classes are fairly general. These two classes ensure that you retain connectivity, and that you drop unmatched packets appropriately. The rules you define in your manifests are likely specific to the applications you run.
The rules in the `pre` and `post` classes are fairly general. These two classes ensure that you retain connectivity and that you drop unmatched packets appropriately. The rules you define in your manifests are likely specific to the applications you run.

1. Add the `pre` class to `my_fw/manifests/pre.pp`. `pre.pp` should contain any default rules to be applied first. The rules in this class should be added in the order you want them to run.

Expand All @@ -88,12 +88,12 @@ The rules in the `pre` and `post` classes are fairly general. These two classes
}->
firewall { '002 accept related established rules':
proto => 'all',
ctstate => ['RELATED', 'ESTABLISHED'],
state => ['RELATED', 'ESTABLISHED'],
action => 'accept',
}
}

The rules in `pre` should allow basic networking (such as ICMP and TCP), and ensure that existing connections are not closed.
The rules in `pre` should allow basic networking (such as ICMP and TCP) and ensure that existing connections are not closed.

2. Add the `post` class to `my_fw/manifests/post.pp` and include any default rules to be applied last.

Expand Down

0 comments on commit b65afaf

Please sign in to comment.