summaryrefslogtreecommitdiffstats
path: root/en-US/Security/ssh-proxy.xml
diff options
context:
space:
mode:
authorPete Travis <immanetize@fedoraproject.org>2014-05-15 14:05:22 -0600
committerPete Travis <immanetize@fedoraproject.org>2014-05-15 14:05:22 -0600
commit6439126c141d2dddbcdacfb58882faa36383d113 (patch)
tree70e46b3f30bb19702d02e57ae356b0cf5ab2f1c3 /en-US/Security/ssh-proxy.xml
parenta4cd831fbd924b766eb58b020a649f2f05b36807 (diff)
downloadfedora-cookbook-6439126c141d2dddbcdacfb58882faa36383d113.tar.gz
fedora-cookbook-6439126c141d2dddbcdacfb58882faa36383d113.tar.xz
fedora-cookbook-6439126c141d2dddbcdacfb58882faa36383d113.zip
markup repair
Diffstat (limited to 'en-US/Security/ssh-proxy.xml')
-rw-r--r--en-US/Security/ssh-proxy.xml12
1 files changed, 6 insertions, 6 deletions
diff --git a/en-US/Security/ssh-proxy.xml b/en-US/Security/ssh-proxy.xml
index 550cb82..2a06d16 100644
--- a/en-US/Security/ssh-proxy.xml
+++ b/en-US/Security/ssh-proxy.xml
@@ -1,4 +1,3 @@
-
<?xml version='1.0' encoding='utf-8' ?>
<!DOCTYPE section PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
"http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
@@ -38,9 +37,11 @@
The outside address for your internal network. Home users with dynamically assigned IP addresses should read <xref linkend="no-ip" />
</para></listitem>
<listitem><para>
- The address space for your internal network. On many home routers, this will be <systemitem class="ipaddress">192.168.1.*</systemitem> or <systemitem class="ipaddress">192.168.0.1>
+ The address space for your internal network. On many home routers, this will be <systemitem class="ipaddress">192.168.1.*</systemitem> or <systemitem class="ipaddress">192.168.0.1</systemitem>
</para>
- <warning>
+ </listitem>
+ </itemizedlist>
+ <warning>
<title>Address Space Reuse</title>
<para>
Adddresses like <systemitem class="ipaddress">192.168.1.0/24</systemitem> are reserved for use in private networks. Because the proxy rule is applied based on the address space of the target, you should configure your router to use a less common set of addresses.
@@ -49,8 +50,7 @@
If your router can give addresses in the <systemitem class="ipaddress">192.168.42.0/24</systemitem> network, for example, your proxy rule won't get in the way when connecting to machines on a different network that uses <systemitem class="ipaddress">192.168.1.0/24</systemitem> addresses.
</para>
</warning>
- </itemizedlist>
- </section>
+ </section>
<section id="ssh-proxy-directions">
<title>Directions</title>
<procedure>
@@ -62,7 +62,7 @@
Open the firewall on all machines to ssh traffic. This is the default on most systems. Use the graphical firewall application <application>firewall-config</application>, or issue the commands below as root.
<screen>
<command>firewall-cmd --permanent --add-service=ssh</command>
- <command>firewall-cmd --reload
+ <command>firewall-cmd --reload</command>
</screen>
</para></step>
<step><para>