From 6c762c6210102a9bbdc5d796dc74490f0148ad05 Mon Sep 17 00:00:00 2001 From: Chris Buechler Date: Sat, 19 Jul 2008 21:13:19 +0000 Subject: fix up text. This page still needs some help Ticket #1775 --- usr/local/www/vpn_pptp.php | 32 ++++++++++++++++---------------- 1 file changed, 16 insertions(+), 16 deletions(-) (limited to 'usr/local/www/vpn_pptp.php') diff --git a/usr/local/www/vpn_pptp.php b/usr/local/www/vpn_pptp.php index 0320052..41c5a87 100755 --- a/usr/local/www/vpn_pptp.php +++ b/usr/local/www/vpn_pptp.php @@ -343,7 +343,7 @@ function enable_change(enable_over) {
- Specify the starting address for the client IP address subnet.
+ Specify the starting address for the client IP subnet.
Subnet netmask @@ -387,10 +387,10 @@ function enable_change(enable_over) {
- primary and secondary dns servers for pptp clients
+ primary and secondary DNS servers assigned to PPTP clients
- RADIUS issued IP's + RADIUS issued IPs /> @@ -415,30 +415,30 @@ function enable_change(enable_over) { Sends accounting packets to the RADIUS server.

> - backup RADIUS server for failover authentication
- When set, if primary radius fails all request will go to the backup server + Secondary RADIUS server for failover authentication
+ When set, all requests will go to the secondary server when primary fails - Radius NAS IP + RADIUS NAS IP - Radius Accounting Update + RADIUS Accounting Update - RADIUS issued IP's + RADIUS issued IPs > -
Issue IP Addresses via RADIUS server. +
Issue IP addresses via RADIUS server. - RADIUS server + RADIUS Server @@ -455,21 +455,21 @@ function enable_change(enable_over) { to the RADIUS server. - BACKUP RADIUS server + Secondary RADIUS server
- Enter the IP address of the RADIUS server. + Enter the IP address of the secondary RADIUS server. - BACKUP RADIUS shared secret + Secondary RADIUS shared secret
Enter the shared secret that will be used to authenticate - to the RADIUS server. + to the secondary RADIUS server. @@ -479,8 +479,8 @@ function enable_change(enable_over) { > Require 128-bit encryption
- When set, 128-bit encryption will be accepted. Otherwise, - 40-bit and 56-bit encryption will be accepted, too. Note that + When set, only 128-bit encryption will be accepted. Otherwise + 40-bit and 56-bit encryption will be accepted as well. Note that encryption will always be forced on PPTP connections (i.e. unencrypted connections will not be accepted). -- cgit v1.1