diff options
author | Pete Travis <immanetize@fedoraproject.org> | 2014-05-15 14:05:22 -0600 |
---|---|---|
committer | Pete Travis <immanetize@fedoraproject.org> | 2014-05-15 14:05:22 -0600 |
commit | 6439126c141d2dddbcdacfb58882faa36383d113 (patch) | |
tree | 70e46b3f30bb19702d02e57ae356b0cf5ab2f1c3 /en-US/Security/ssh-proxy.xml | |
parent | a4cd831fbd924b766eb58b020a649f2f05b36807 (diff) | |
download | fedora-cookbook-6439126c141d2dddbcdacfb58882faa36383d113.tar.gz fedora-cookbook-6439126c141d2dddbcdacfb58882faa36383d113.tar.xz fedora-cookbook-6439126c141d2dddbcdacfb58882faa36383d113.zip |
markup repair
Diffstat (limited to 'en-US/Security/ssh-proxy.xml')
-rw-r--r-- | en-US/Security/ssh-proxy.xml | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/en-US/Security/ssh-proxy.xml b/en-US/Security/ssh-proxy.xml index 550cb82..2a06d16 100644 --- a/en-US/Security/ssh-proxy.xml +++ b/en-US/Security/ssh-proxy.xml @@ -1,4 +1,3 @@ - <?xml version='1.0' encoding='utf-8' ?> <!DOCTYPE section PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN" "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [ @@ -38,9 +37,11 @@ The outside address for your internal network. Home users with dynamically assigned IP addresses should read <xref linkend="no-ip" /> </para></listitem> <listitem><para> - The address space for your internal network. On many home routers, this will be <systemitem class="ipaddress">192.168.1.*</systemitem> or <systemitem class="ipaddress">192.168.0.1> + The address space for your internal network. On many home routers, this will be <systemitem class="ipaddress">192.168.1.*</systemitem> or <systemitem class="ipaddress">192.168.0.1</systemitem> </para> - <warning> + </listitem> + </itemizedlist> + <warning> <title>Address Space Reuse</title> <para> Adddresses like <systemitem class="ipaddress">192.168.1.0/24</systemitem> are reserved for use in private networks. Because the proxy rule is applied based on the address space of the target, you should configure your router to use a less common set of addresses. @@ -49,8 +50,7 @@ If your router can give addresses in the <systemitem class="ipaddress">192.168.42.0/24</systemitem> network, for example, your proxy rule won't get in the way when connecting to machines on a different network that uses <systemitem class="ipaddress">192.168.1.0/24</systemitem> addresses. </para> </warning> - </itemizedlist> - </section> + </section> <section id="ssh-proxy-directions"> <title>Directions</title> <procedure> @@ -62,7 +62,7 @@ Open the firewall on all machines to ssh traffic. This is the default on most systems. Use the graphical firewall application <application>firewall-config</application>, or issue the commands below as root. <screen> <command>firewall-cmd --permanent --add-service=ssh</command> - <command>firewall-cmd --reload + <command>firewall-cmd --reload</command> </screen> </para></step> <step><para> |