diff options
author | 2006-09-15 11:45:04 +0000 | |
---|---|---|
committer | 2006-09-15 11:45:04 +0000 | |
commit | 4f15a6c919d40dc1c2a569bd415d55a0a8d23492 (patch) | |
tree | c5a2cc9361418a2458429255275f42443a7508d9 | |
parent | add in filtering rules to allow keying daemons to talk; (diff) | |
download | wireguard-openbsd-4f15a6c919d40dc1c2a569bd415d55a0a8d23492.tar.xz wireguard-openbsd-4f15a6c919d40dc1c2a569bd415d55a0a8d23492.zip |
clarification;
-rw-r--r-- | sbin/ipsecctl/ipsec.conf.5 | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/sbin/ipsecctl/ipsec.conf.5 b/sbin/ipsecctl/ipsec.conf.5 index f45c0a71085..f1e8df4dd42 100644 --- a/sbin/ipsecctl/ipsec.conf.5 +++ b/sbin/ipsecctl/ipsec.conf.5 @@ -1,4 +1,4 @@ -.\" $OpenBSD: ipsec.conf.5,v 1.95 2006/09/15 11:35:50 jmc Exp $ +.\" $OpenBSD: ipsec.conf.5,v 1.96 2006/09/15 11:45:04 jmc Exp $ .\" .\" Copyright (c) 2004 Mathieu Sauve-Frankel All rights reserved. .\" @@ -682,7 +682,7 @@ set skip on enc0 .Ed .Pp In the following example, all traffic is blocked by default. -IPsec traffic from hosts {192.168.3.1, 192.168.3.2} and +IPsec traffic from gateways {192.168.3.1, 192.168.3.2} and networks {10.0.1.0/24, 10.0.2.0/24} is permitted. The external interface, sk0, has to allow the keying daemons to talk to each other. |