Skip to content

Commit e07c26f

Browse files
committed
update readme
1 parent 0f3b3bf commit e07c26f

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ Refer [examples](https://gitlab.com/squareops/sal/terraform/aws/network/-/tree/q
2222

2323
## Network Scenarios
2424

25-
Users only need to provide `vpc_cidr` and subnets are calculated with the help of [in-built functions](https://gitlab.com/squareops/sal/terraform/aws/network/-/blob/qa/main.tf#L2).
25+
Users need to provide `vpc_cidr` and subnets are calculated with the help of [in-built functions](https://gitlab.com/squareops/sal/terraform/aws/network/-/blob/qa/main.tf#L2).
2626

27-
This module supports three scenarios for creating Network resource on AWS. Each will be explained in further detail in the corresponding sections.
27+
This module supports three scenarios for creating Network resource on AWS. Each will be explained in detail in the corresponding sections.
2828

2929
- **simple-vpc (default behavior):** For creating a VPC with only public subnets and IGW.
3030
- `vpc_cidr = ""`
@@ -52,18 +52,18 @@ This module supports three scenarios for creating Network resource on AWS. Each
5252

5353
To configure Pritunl VPN:
5454

55-
1. Open the public IP of instance.
56-
2. Get the initial key and user, password for setting up Pritunl from Secret Manager and log in to Pritunl.
57-
3. Create a DNS record mapping to the vpn host public IP
58-
4. After login,in the Initial setup window, add the record created in the 'Lets Encrypt Domain' field.
55+
1. Access the Pritunl UI using the public IP of EC2 instance in browser
56+
2. Get the initial key, user and password for setting up Pritunl from Secret Manager and log in to Pritunl.
57+
3. Create a DNS record mapping to the EC2 instance's public IP
58+
4. After login, in the Initial setup window, add the record created in the 'Lets Encrypt Domain' field.
5959
5. Pritunl will automatically configure a signed SSL certificate from Lets Encrypt.
6060
6. Add organization and user to pritunl.
61-
7. Add server port as 10150 which is already allowed from security group while creating vpn.
61+
7. Set server port as 10150 which is already allowed from security group while creating vpn.
6262
8. Attach organization to the server and Start the server.
6363
9. Copy or download user profile link or file.
6464
10. Import the profile in Pritunl client.
6565

66-
NOTE: Port 80 to be open publicly in the vpn security group to verify and renewing the domain certificate.
66+
NOTE: Port 80 should be open publicly in the vpn security group to verify and renewing the domain certificate.
6767

6868
# CIS COMPLIANCE
6969

0 commit comments

Comments
 (0)