cloudstack-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From radh...@apache.org
Subject git commit: updated refs/heads/4.2 to 575bf4e
Date Wed, 17 Jul 2013 05:12:43 GMT
Updated Branches:
  refs/heads/4.2 4d1f2cf20 -> 575bf4e42


CLOUDSTACK-2381


Project: http://git-wip-us.apache.org/repos/asf/cloudstack/repo
Commit: http://git-wip-us.apache.org/repos/asf/cloudstack/commit/575bf4e4
Tree: http://git-wip-us.apache.org/repos/asf/cloudstack/tree/575bf4e4
Diff: http://git-wip-us.apache.org/repos/asf/cloudstack/diff/575bf4e4

Branch: refs/heads/4.2
Commit: 575bf4e42c00fe076bf9187246a650c518e74d8f
Parents: 4d1f2cf
Author: radhikap <radhika.puthiyetath@citrix.com>
Authored: Wed Jul 17 10:42:23 2013 +0530
Committer: radhikap <radhika.puthiyetath@citrix.com>
Committed: Wed Jul 17 10:42:23 2013 +0530

----------------------------------------------------------------------
 docs/en-US/egress-firewall-rule.xml | 6 ++----
 1 file changed, 2 insertions(+), 4 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/cloudstack/blob/575bf4e4/docs/en-US/egress-firewall-rule.xml
----------------------------------------------------------------------
diff --git a/docs/en-US/egress-firewall-rule.xml b/docs/en-US/egress-firewall-rule.xml
index ab16517..9b45e2e 100644
--- a/docs/en-US/egress-firewall-rule.xml
+++ b/docs/en-US/egress-firewall-rule.xml
@@ -20,16 +20,14 @@
 -->
 <section id="egress-firewall-rule">
   <title>Creating Egress Firewall Rules in an Advanced Zone</title>
-  <note>
-    <para>The egress firewall rules are supported only on virtual routers.</para>
-  </note>
   <para>The egress traffic originates from a private network to a public network, such
as the
     Internet. By default, the egress traffic is blocked, so no outgoing traffic is allowed
from a
     guest network to the Internet. However, you can control the egress traffic in an Advanced
zone
     by creating egress firewall rules. When an egress firewall rule is applied, the traffic
specific
     to the rule is allowed and the remaining traffic is blocked. When all the firewall rules
are
     removed the default policy, Block, is applied.</para>
-  <note>
+  <para>Egress firewall rules are supported on Juniper SRX and virtual router.</para>
+    <note>
     <para>The egress firewall rules are not supported on shared networks.</para>
   </note>
   <para>Consider the following scenarios to apply egress firewall rules:</para>


Mime
View raw message