From 74b24c5f5fcc02265faa8d259de1d12574b0db6a Mon Sep 17 00:00:00 2001 From: Daniil Baturin Date: Tue, 14 Jun 2022 15:28:55 -0400 Subject: Improve IPsec help strings --- interface-definitions/vpn_ipsec.xml.in | 34 +++++++++++++++++----------------- 1 file changed, 17 insertions(+), 17 deletions(-) diff --git a/interface-definitions/vpn_ipsec.xml.in b/interface-definitions/vpn_ipsec.xml.in index d884d6ce6..d36fbb024 100644 --- a/interface-definitions/vpn_ipsec.xml.in +++ b/interface-definitions/vpn_ipsec.xml.in @@ -19,7 +19,7 @@ - Encapsulated Security Payload (ESP) group name + Encapsulating Security Payload (ESP) group name @@ -44,10 +44,10 @@ - ESP lifetime + Security Association time to expire u32:30-86400 - ESP lifetime in seconds + SA lifetime in seconds @@ -57,10 +57,10 @@ - ESP life in bytes + Security Association byte count to expire u32:1024-26843545600000 - ESP life in bytes + SA life in bytes @@ -69,10 +69,10 @@ - ESP life in packets + Security Association packet count to expire u32:1000-26843545600000 - ESP life in packets + SA life in packets @@ -308,13 +308,13 @@ - Re-authentication of the remote peer during an IKE re-key - IKEv2 only + Re-authentication of the remote peer during an IKE re-key (IKEv2 only) yes no yes - Enable remote host re-authentication during an IKE rekey. Currently broken due to a strongswan bug + Enable remote host re-authentication during an IKE rekey (currently broken due to a strongswan bug) no @@ -379,7 +379,7 @@ - IKEv1 phase 1 mode selection + IKEv1 phase 1 mode main aggressive @@ -530,10 +530,10 @@ - strongSwan logging Level + Global IPsec logging Level 0 - Very basic auditing logs e.g. SA up/SA down + Very basic auditing logs (e.g., SA up/SA down) 1 @@ -663,7 +663,7 @@ - VPN IPSec profile + VPN IPsec profile #include @@ -689,7 +689,7 @@ - DMVPN crypto configuration + DMVPN tunnel configuration @@ -1010,7 +1010,7 @@ respond - Bring the connection up only if traffic is detected + Wait for the peer to initiate the connection none @@ -1090,10 +1090,10 @@ #include - Priority for IPSec policy (lowest value more preferable) + Priority for IPsec policy (lowest value more preferable) u32:1-100 - Priority for IPSec policy (lowest value more preferable) + Priority for IPsec policy (lowest value more preferable) -- cgit v1.2.3