Module Name:    src
Committed By:   degroote
Date:           Mon Sep 14 11:45:01 UTC 2009

Modified Files:
        src/dist/pf/share/man/man4: pfsync.4

Log Message:
Improve the pfsync(4) man page

hostname.if(5) is ifconfig.if(5) on NetBSD
Don't speak about enc, as we don't support it at the moment
Make clear that we don't support ipsec protection of pfsync traffic (as long we
doesn't support enc, or similar thing)

Catched by wiz@


To generate a diff of this commit:
cvs rdiff -u -r1.2 -r1.3 src/dist/pf/share/man/man4/pfsync.4

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/dist/pf/share/man/man4/pfsync.4
diff -u src/dist/pf/share/man/man4/pfsync.4:1.2 src/dist/pf/share/man/man4/pfsync.4:1.3
--- src/dist/pf/share/man/man4/pfsync.4:1.2	Mon Sep 14 11:17:42 2009
+++ src/dist/pf/share/man/man4/pfsync.4	Mon Sep 14 11:45:01 2009
@@ -1,4 +1,4 @@
-.\"	$NetBSD: pfsync.4,v 1.2 2009/09/14 11:17:42 wiz Exp $
+.\"	$NetBSD: pfsync.4,v 1.3 2009/09/14 11:45:01 degroote Exp $
 .\"	$OpenBSD: pfsync.4,v 1.25 2007/05/31 19:19:51 jmc Exp $
 .\"
 .\" Copyright (c) 2002 Michael Shalayeff
@@ -108,16 +108,16 @@
 used is 224.0.0.240.
 When a peer address is specified using the
 .Ic syncpeer
-keyword, the peer address is used as a destination for the pfsync traffic,
-and the traffic can then be protected using
-.Xr ipsec 4 .
-In such a configuration, the syncdev should be set to the
-.Xr enc 4
-interface, as this is where the traffic arrives when it is decapsulated,
-e.g.:
-.Bd -literal -offset indent
-# ifconfig pfsync0 syncpeer 10.0.0.2 syncdev enc0
-.Ed
+keyword, the peer address is used as a destination for the pfsync traffic.
+.\"and the traffic can then be protected using
+.\".Xr ipsec 4 .
+.\"In such a configuration, the syncdev should be set to the
+.\".Xr enc 4
+.\"interface, as this is where the traffic arrives when it is decapsulated,
+.\"e.g.:
+.\".Bd -literal -offset indent
+.\"# ifconfig pfsync0 syncpeer 10.0.0.2 syncdev enc0
+.\".Ed
 .Pp
 It is important that the pfsync traffic be well secured
 as there is no authentication on the protocol and it would
@@ -125,7 +125,9 @@
 Either run the pfsync protocol on a trusted network \- ideally  a network
 dedicated to pfsync messages such as a crossover cable between two firewalls,
 or specify a peer address and protect the traffic with
-.Xr ipsec 4 .
+.Xr ipsec 4 (it is not supported at the moment on
+.Nx
+due to the lack of any encapsulation pseudo-device).
 .Pp
 There is a one-to-one correspondence between packets seen by
 .Xr bpf 4
@@ -161,32 +163,32 @@
 The interfaces are configured as follows (firewall A unless otherwise
 indicated):
 .Pp
-.Pa /etc/hostname.sis0 :
+.Pa /etc/ifconfig.sis0 :
 .Bd -literal -offset indent
 inet 10.0.0.254 255.255.255.0 NONE
 .Ed
 .Pp
-.Pa /etc/hostname.sis1 :
+.Pa /etc/ifconfig.sis1 :
 .Bd -literal -offset indent
 inet 192.168.0.254 255.255.255.0 NONE
 .Ed
 .Pp
-.Pa /etc/hostname.sis2 :
+.Pa /etc/ifconfig.sis2 :
 .Bd -literal -offset indent
 inet 192.168.254.254 255.255.255.0 NONE
 .Ed
 .Pp
-.Pa /etc/hostname.carp0 :
+.Pa /etc/ifconfig.carp0 :
 .Bd -literal -offset indent
 inet 10.0.0.1 255.255.255.0 10.0.0.255 vhid 1 pass foo
 .Ed
 .Pp
-.Pa /etc/hostname.carp1 :
+.Pa /etc/ifconfig.carp1 :
 .Bd -literal -offset indent
 inet 192.168.0.1 255.255.255.0 192.168.0.255 vhid 2 pass bar
 .Ed
 .Pp
-.Pa /etc/hostname.pfsync0 :
+.Pa /etc/ifconfig.pfsync0 :
 .Bd -literal -offset indent
 up syncdev sis2
 .Ed
@@ -212,7 +214,7 @@
 interfaces should be set to something higher than
 the primary's.
 For example, if firewall B is the backup, its
-.Pa /etc/hostname.carp1
+.Pa /etc/ifconfig.carp1
 would look like this:
 .Bd -literal -offset indent
 inet 192.168.0.1 255.255.255.0 192.168.0.255 vhid 2 pass bar \e
@@ -232,9 +234,10 @@
 .Xr ipsec 4 ,
 .Xr netintro 4 ,
 .Xr pf 4 ,
-.Xr hostname.if 5 ,
+.Xr ifconfig.if 5 ,
 .Xr pf.conf 5 ,
 .Xr protocols 5 ,
+.\" enc 8,
 .Xr ifconfig 8 ,
 .Xr tcpdump 8
 .Sh HISTORY

Reply via email to