-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IPSec Client Documentation #715
base: master
Are you sure you want to change the base?
Conversation
we'll be using this documentation to handover to Teron. |
docs/plugin_ipsec_client.md
Outdated
The `router > ipsec-profile`'s are reusable IPsec settings that can be used across multiple nodes in a router and multiple IPsec endpoint `remote`s. The examples below shows two examples of ipsec profiles that mutually exclusive one using pre-shared keys, and one using certificate based authentication. | ||
|
||
:::note | ||
This plugin can only connect to IPsec endpoints that support pre-shared key or X.509 certificate. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe change endpoints
to servers
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also in this same line: I'm not sure if IPsec endpoints can share more than one pre-shared key or X.509 certificate. So if they can only share one pre-shared key etc:
This plugin can only connect to IPsec endpoints that support a pre-shared key or X.509 certificate.
If they can share more than pre-shared key:
This plugin can only connect to IPsec endpoints that support pre-shared keys or X.509 certificates.
docs/plugin_ipsec_client.md
Outdated
The `router > ipsec-profile`'s are reusable IPsec settings that can be used across multiple nodes in a router and multiple IPsec endpoint `remote`s. The examples below shows two examples of ipsec profiles that mutually exclusive one using pre-shared keys, and one using certificate based authentication. | ||
|
||
:::note | ||
This plugin can only connect to IPsec endpoints that support pre-shared key or X.509 certificate. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also in this same line: I'm not sure if IPsec endpoints can share more than one pre-shared key or X.509 certificate. So if they can only share one pre-shared key etc:
This plugin can only connect to IPsec endpoints that support a pre-shared key or X.509 certificate.
If they can share more than pre-shared key:
This plugin can only connect to IPsec endpoints that support pre-shared keys or X.509 certificates.
Co-authored-by: Chris Turner <47952861+Chr1st0ph3rTurn3r@users.noreply.github.com>
Co-authored-by: Chris Turner <47952861+Chr1st0ph3rTurn3r@users.noreply.github.com>
Co-authored-by: Chris Turner <47952861+Chr1st0ph3rTurn3r@users.noreply.github.com>
Co-authored-by: Chris Turner <47952861+Chr1st0ph3rTurn3r@users.noreply.github.com>
Co-authored-by: Chris Turner <47952861+Chr1st0ph3rTurn3r@users.noreply.github.com>
Co-authored-by: Chris Turner <47952861+Chr1st0ph3rTurn3r@users.noreply.github.com>
Co-authored-by: Chris Turner <47952861+Chr1st0ph3rTurn3r@users.noreply.github.com>
Co-authored-by: Chris Turner <47952861+Chr1st0ph3rTurn3r@users.noreply.github.com>
Co-authored-by: Chris Turner <47952861+Chr1st0ph3rTurn3r@users.noreply.github.com>
…/docs into sunanj/ipsec-documentation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just the one new change everything else looks good.
Co-authored-by: Chris Turner <47952861+Chr1st0ph3rTurn3r@users.noreply.github.com>
…/docs into sunanj/ipsec-documentation
a108604
No description provided.