From 811129e2e37dbc9632f1341bfafe7e78b2f68088 Mon Sep 17 00:00:00 2001 From: Christian Poessinger Date: Sat, 4 Jan 2020 16:20:22 +0100 Subject: dhcp: use proper indent on description inside failover section --- docs/services/dhcp.rst | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) (limited to 'docs/services') diff --git a/docs/services/dhcp.rst b/docs/services/dhcp.rst index 166f24a8..2b139b10 100644 --- a/docs/services/dhcp.rst +++ b/docs/services/dhcp.rst @@ -83,24 +83,24 @@ explicitly by the following statements. A generic `` referencing this sync service. -.. note:: `` must be identical on both sides! + .. note:: `` must be identical on both sides! .. cfgcmd:: set service dhcp-server shared-network-name subnet failover status The primary and secondary statements determines whether the server is primary or secondary. -.. note:: In order for the primary and the secondary DHCP server to keep - their lease tables in sync, they must be able to reach each other on TCP - port 647. If you have firewall rules in effect, adjust them accordingly. - -.. hint:: The dialogue between failover partners is neither encrypted nor - authenticated. Since most DHCP servers exist within an organisation's own - secure Intranet, this would be an unnecessary overhead. However, if you have - DHCP failover peers whose communications traverse insecure networks, then we - recommend that you consider the use of VPN tunneling between them to ensure - that the failover partnership is immune to disruption (accidental or - otherwise) via third parties. + .. note:: In order for the primary and the secondary DHCP server to keep + their lease tables in sync, they must be able to reach each other on TCP + port 647. If you have firewall rules in effect, adjust them accordingly. + + .. hint:: The dialogue between failover partners is neither encrypted nor + authenticated. Since most DHCP servers exist within an organisation's own + secure Intranet, this would be an unnecessary overhead. However, if you have + DHCP failover peers whose communications traverse insecure networks, then we + recommend that you consider the use of VPN tunneling between them to ensure + that the failover partnership is immune to disruption (accidental or + otherwise) via third parties. Example ^^^^^^^ -- cgit v1.2.3