From: Eric Leblond Date: Sun, 9 Dec 2018 19:24:36 +0000 (+0100) Subject: doc: white space and typo fix X-Git-Tag: suricata-5.0.0-rc1~387 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=19c0a5edf5eaab3b9e8d0d2a65143dcc2bf98573;p=thirdparty%2Fsuricata.git doc: white space and typo fix --- diff --git a/doc/userguide/capture-hardware/ebpf-xdp.rst b/doc/userguide/capture-hardware/ebpf-xdp.rst index 0de990afb6..bab638929b 100644 --- a/doc/userguide/capture-hardware/ebpf-xdp.rst +++ b/doc/userguide/capture-hardware/ebpf-xdp.rst @@ -401,7 +401,7 @@ for that will be used to check for the presence of the XDP filter :: - interface: eth3 pinned-maps: true pinned-maps-name: ipv4_drop - xdp-filter-file: /etc/suricata/ebpf/xdp_filter.bpf + xdp-filter-file: /etc/suricata/ebpf/xdp_filter.bpf If XDP bypass is used in IPS mode stopping Suricata will trigger a interruption in the traffic. To fix that you can use the `pinned-maps-switch` option that will create a direct interface @@ -411,7 +411,7 @@ is exiting but it can also be activated by an external monitoring tool :: - interface: eth3 pinned-maps: true pinned-maps-switch: g_switch - xdp-filter-file: /etc/suricata/ebpf/xdp_filter.bpf + xdp-filter-file: /etc/suricata/ebpf/xdp_filter.bpf bypass: true @@ -420,5 +420,5 @@ Getting live info about bypass You can get information about bypass via the stats event and through the unix socket. `ìface-stat` will return the number of bypassed packets (adding packets for a flow when it timeout). -`ebpf-bypassed-stats` command will return the number of element in IPv4 and IPv6 flow tables for +`ebpf-bypassed-stats` command will return the number of elements in IPv4 and IPv6 flow tables for each interfaces.