Hi Steve, | The changes looks good but I think we need a couple of simple network | diagrams to clarify the case when this mode is not needed and the case | when it needed.
Simple network examples may be a good idea to orient the uninitiated reader. But adding network diagrams to scope the applicability is not an equally good idea. <snip> | internal networks are considered "trustable" and both TWAMP endpoints I'm not sure whether anyone really thinks that an "internal" network in the age of virtualization can be "trustable" :) Best regards, Kostas _______________________________________________ IPsec mailing list [email protected] https://www.ietf.org/mailman/listinfo/ipsec
