Skip to content

Commit 431d26d

Browse files
committed
whitespace
1 parent 5298a91 commit 431d26d

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

systems.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -413,7 +413,7 @@ the most common uses for VPNs.
413413
telecommuters, or contractors who need access to corporate
414414
resources. :numref:`Figure %s <fig-remotevpn>` shows a simple example
415415
where a remote user tunnels across the Internet to connect to their
416-
corporate office.
416+
corporate office.
417417

418418
.. _fig-remotevpn:
419419
.. figure:: figures/remotevpn.png
@@ -469,7 +469,7 @@ establish. It also uses the idea of pre-shared public keys for mutual
469469
authentication, similar to the approach used in SSH. Finally, it is
470470
implemented in the operating system kernel, another contrast to
471471
OpenVPN that improves performance. For further details we refer you to
472-
the paper.
472+
the paper.
473473

474474
.. admonition:: Further Reading
475475

@@ -514,7 +514,7 @@ most of the complexity of VPN management to a service provider, became
514514
such a successful service offering in the early 2000s. MPLS does not
515515
protect privacy using encryption, but it does solve the issues of routing
516516
traffic among large numbers of sites and ensures that the traffic
517-
belonging to one customer from does not leak to the network of another.
517+
belonging to one customer from does not leak to the network of another.
518518

519519
Several approaches to reduce the configuration overhead for VPNs using
520520
encrypted tunnels have appeared in recent years. With the rise of

0 commit comments

Comments
 (0)