diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-06-14 16:17:59 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-06-14 16:17:59 +0000 |
commit | 6dcba6bb2c8f8d96093d0942bb59dece22fdf7ac (patch) | |
tree | 5026d1469491de46164ebbc74dac1f7ba5b3cb08 /doc/configuration.rst | |
parent | Releasing progress-linux version 3.3.5-1.1~progress7.99u1. (diff) | |
download | knot-6dcba6bb2c8f8d96093d0942bb59dece22fdf7ac.tar.xz knot-6dcba6bb2c8f8d96093d0942bb59dece22fdf7ac.zip |
Merging upstream version 3.3.6.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r-- | doc/configuration.rst | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/doc/configuration.rst b/doc/configuration.rst index 55457eb..a29521b 100644 --- a/doc/configuration.rst +++ b/doc/configuration.rst @@ -89,15 +89,15 @@ zones. There is no inheritance between templates; they are exclusive. The Access control list (ACL) ========================= -Some types of incoming DNS requests must be authorized before they can be -processed by the server. A zone can have configured :ref:`zone_acl` which is -a sequence of :ref:`rules <ACL section>` describing what requests are authorized. -By default if :ref:`automatic ACL <server_automatic-acl>` is not enabled, all requests, -which require authorization, are denied. - -Every ACL rule can allow or deny one or more request types based on the -source IP address, network subnet, or address range and/or if the request is -secured by a given TSIG key. See :doc:`keymgr -t<man_keymgr>` on how +Normal DNS queries are always allowed. All other DNS requests must be +authorized before they can be processed by the server. A zone can have +configured :ref:`ACL <ACL section>` which is a sequence of rules describing +what requests are authorized. An :ref:`automatic ACL <server_automatic-acl>` +feature can be used to simplify ACL management. + +Every ACL rule can allow or deny one or more request types (:ref:`actions <acl_action>`) +based on the source IP address, network subnet, or address range and/or if the +request is secured by a given TSIG key. See :doc:`keymgr -t<man_keymgr>` on how to generate a TSIG key. If there are multiple ACL rules assigned to a zone, they are applied in the |