CLOUDSTACK-4569 review comments on egress firewall and multiple ip per nic

Project: http://git-wip-us.apache.org/repos/asf/cloudstack/repo
Commit: http://git-wip-us.apache.org/repos/asf/cloudstack/commit/5275618b
Tree: http://git-wip-us.apache.org/repos/asf/cloudstack/tree/5275618b
Diff: http://git-wip-us.apache.org/repos/asf/cloudstack/diff/5275618b

Branch: refs/heads/disk-cache
Commit: 5275618bcc94513f2e2d463adb878aa16628731f
Parents: 7a0cd10
Author: radhikap <radhika.puthiyet...@citrix.com>
Authored: Fri Aug 30 15:44:18 2013 +0530
Committer: radhikap <radhika.puthiyet...@citrix.com>
Committed: Fri Aug 30 15:57:08 2013 +0530

----------------------------------------------------------------------
 docs/en-US/egress-firewall-rule.xml | 12 ++++++------
 docs/en-US/multiple-ip-nic.xml      |  6 +++---
 2 files changed, 9 insertions(+), 9 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/cloudstack/blob/5275618b/docs/en-US/egress-firewall-rule.xml
----------------------------------------------------------------------
diff --git a/docs/en-US/egress-firewall-rule.xml 
b/docs/en-US/egress-firewall-rule.xml
index 17bf15e..93d5a81 100644
--- a/docs/en-US/egress-firewall-rule.xml
+++ b/docs/en-US/egress-firewall-rule.xml
@@ -108,12 +108,12 @@
     </orderedlist>
   </section>
   <section id="default-egress-policy">
-    <title>Changing the Default Egress Policy</title>
-    <para>You can configure the default policy of egress firewall rules in 
Isolated Advanced
-      networks. Use the create network offering option to determine whether 
the default policy
-      should be block or allow all the traffic to the public network from a 
guest network. If no
-      policy is specified, by default all the traffic is allowed from the 
guest network that you
-      create by using this network offering.</para>
+    <title>Configuring the Default Egress Policy</title>
+    <para>The default egress policy for Isolated guest network is configured 
by using Network
+      offering.  Use the create network offering option to determine whether 
the default policy
+      should be block or allow all the traffic to the public network from a 
guest network.  Use this
+      network offering to create the network. If no policy is specified, by 
default all the traffic
+      is allowed from the guest network that you create by using this network 
offering.</para>
     <para>You have two options: Allow and Deny.</para>
     <formalpara>
       <title>Allow</title>

http://git-wip-us.apache.org/repos/asf/cloudstack/blob/5275618b/docs/en-US/multiple-ip-nic.xml
----------------------------------------------------------------------
diff --git a/docs/en-US/multiple-ip-nic.xml b/docs/en-US/multiple-ip-nic.xml
index 790befc..344dc8d 100644
--- a/docs/en-US/multiple-ip-nic.xml
+++ b/docs/en-US/multiple-ip-nic.xml
@@ -75,9 +75,9 @@
       </listitem>
       <listitem>
         <para>Click Acquire New Secondary IP, and click Yes in the 
confirmation dialog.</para>
-        <para>You need to specify the secondary IP address on the guest VM. 
&PRODUCT; will not
-          automatically configure the acquired IP address on the VM. Ensure 
that you assign IPs to
-          NIC each time the VM reboots.</para>
+        <para>You need to configure the IP on the guest VM NIC manually. 
&PRODUCT; will not
+          automatically configure the acquired IP address on the VM. Ensure 
that the IP address
+          configuration persist on VM reboot.</para>
         <para>Within a few moments, the new IP address should appear with the 
state Allocated. You
           can now use the IP address in Port Forwarding or StaticNAT 
rules.</para>
       </listitem>

Reply via email to