File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed
Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -413,7 +413,7 @@ the most common uses for VPNs.
413413telecommuters, or contractors who need access to corporate
414414resources. :numref: `Figure %s <fig-remotevpn >` shows a simple example
415415where a remote user tunnels across the Internet to connect to their
416- corporate office.
416+ corporate office.
417417
418418.. _fig-remotevpn :
419419.. figure :: figures/remotevpn.png
@@ -469,7 +469,7 @@ establish. It also uses the idea of pre-shared public keys for mutual
469469authentication, similar to the approach used in SSH. Finally, it is
470470implemented in the operating system kernel, another contrast to
471471OpenVPN that improves performance. For further details we refer you to
472- the paper.
472+ the paper.
473473
474474.. admonition :: Further Reading
475475
@@ -514,7 +514,7 @@ most of the complexity of VPN management to a service provider, became
514514such a successful service offering in the early 2000s. MPLS does not
515515protect privacy using encryption, but it does solve the issues of routing
516516traffic among large numbers of sites and ensures that the traffic
517- belonging to one customer from does not leak to the network of another.
517+ belonging to one customer from does not leak to the network of another.
518518
519519Several approaches to reduce the configuration overhead for VPNs using
520520encrypted tunnels have appeared in recent years. With the rise of
You can’t perform that action at this time.
0 commit comments