summaryrefslogtreecommitdiffabout
path: root/help/pumpkin.rtf
Unidiff
Diffstat (limited to 'help/pumpkin.rtf') (more/less context) (ignore whitespace changes)
-rw-r--r--help/pumpkin.rtf15
1 files changed, 13 insertions, 2 deletions
diff --git a/help/pumpkin.rtf b/help/pumpkin.rtf
index b39ca9c..9c02ca9 100644
--- a/help/pumpkin.rtf
+++ b/help/pumpkin.rtf
@@ -20,3 +20,3 @@ K{\footnote about}
20{ 20{
21\par\pard\plain\sb360\sa120 \f1\fs16 Copyright (c) 1997-2005 {\uldb\cf0 Klever Group (http://www.klever.net/)}{\v %!ExecFile("http://www.klever.net/")} 21\par\pard\plain\sb360\sa120 \f1\fs16 Copyright (c) 1997-2006 {\uldb\cf0 Klever Group (http://www.klever.net/)}{\v %!ExecFile("http://www.klever.net/")}
22\par\qj\sb120\sa120Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: 22\par\qj\sb120\sa120Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
@@ -30,2 +30,5 @@ K{\footnote about}
30${\footnote What's New} 30${\footnote What's New}
31\par\pard\plain\f1\fs24\qc\cf2\b 2.7 - February 1st, 2006
32\par\pard\plain\fi0\li0\f1\fs18 \bullet Added acess lists based on request IP address and TFTP opcode for automating access policy
33\par\pard\plain\fi0\li0\f1\fs18 \bullet Added possibility to start/stop TFTP server, while keeping client functionality intact
31\par\pard\plain\f1\fs24\qc\cf2\b 2.6 - August 6th, 2005 34\par\pard\plain\f1\fs24\qc\cf2\b 2.6 - August 6th, 2005
@@ -114,3 +117,3 @@ ${\footnote Server Options}
114\pard\plain\keepn 117\pard\plain\keepn
115#{\footnote SoundsOptoins} 118#{\footnote SoundsOptions}
116${\footnote Sounds Options} 119${\footnote Sounds Options}
@@ -120,2 +123,10 @@ ${\footnote Sounds Options}
120\page 123\page
124
125\pard\plain\keepn
126#{\footnote ACL}
127${\footnote Access Lists}
128{ \f1\fs18\b\sb120 Access Lists}
129\par\sa120\sb120\qj\pard \f1\fs18\sb120 You can slightly automate your access policies by setting up read/write request behavior for different incoming requests.
130\par\sa120\sb120\qj\pard \f1\fs18\sb120 The rule consists of {\b request type}, source networke ({\b ip} and {\b netmask}) and {\b action} to take (see also {\uldb Server Options}{\v ServerOptions}).
131\page
121} \ No newline at end of file 132} \ No newline at end of file