Hi Steve,

| The changes looks good but I think we need a couple of simple network
| diagrams to clarify the case when this mode is not needed and the case
| when it needed.

Simple network examples may be a good idea to orient the uninitiated reader. 
But adding network diagrams to scope the applicability is not an equally good 
idea. 

<snip>

| internal networks are considered "trustable" and both TWAMP endpoints

I'm not sure whether anyone really thinks that an "internal" network in the age 
of virtualization can be "trustable" :)

Best regards,

Kostas

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to