diff --git a/README.md b/README.md
index 150a06e..e34904b 100644
--- a/README.md
+++ b/README.md
@@ -1,6 +1,6 @@
# IPsec/L2TP VPN Server Auto Setup Scripts
-Scripts for automatic configuration of IPsec/L2TP VPN server on Ubuntu 14.04 & 12.04, Debian 8 and CentOS/RHEL 6 & 7. All you need to do is providing your own values for `IPSEC_PSK`, `VPN_USER` and `VPN_PASSWORD`, and they will handle the rest. These scripts can also be directly used as the Amazon EC2 "user-data" when creating a new instance.
+Scripts for automatic configuration of IPsec/L2TP VPN server on Ubuntu 14.04 & 12.04, Debian 8 and CentOS/RHEL 6 & 7. All you need to do is providing your own values for `IPSEC_PSK`, `VPN_USER` and `VPN_PASSWORD`, and let them handle the rest.
We will use Libreswan as the IPsec server, and xl2tpd as the L2TP provider.
@@ -13,12 +13,11 @@ We will use Libreswan as th
- Can be directly used as "user-data" for a new Amazon EC2 instance
- Automatically determines public IP and private IP of server
- Includes basic IPTables rules and `sysctl.conf` settings
-- Tested with Ubuntu 14.04 & 12.04, Debian 8 and CentOS/RHEL 6 & 7
-
+- Tested with Ubuntu 14.04 & 12.04, Debian 8 and CentOS 6 & 7
## Requirements
-A newly created Amazon EC2 instance, using these AMIs: (Follow the link above for instructions)
+A newly created Amazon EC2 instance, using these AMIs: (Follow this link for instructions)
- Ubuntu 14.04 (Trusty) or 12.04 (Precise)
- Debian 8 (Jessie) EC2 Images
- CentOS 7 (x86_64) with Updates HVM
@@ -26,8 +25,8 @@ A newly created Amazon EC2
**-OR-**
-A dedicated server or any KVM- or Xen-based Virtual Private Server (VPS), with these Linux OS:
- (Using the VPN scripts on a **freshly installed** system is recommended)
+A dedicated server or KVM/Xen-based Virtual Private Server (VPS), running one of these OS:
+ (Note: Using the VPN scripts on a freshly installed system is recommended)
- Ubuntu 14.04 (Trusty) or 12.04 (Precise)
- Debian 8 (Jessie)
- Debian 7 (Wheezy) - Not recommended. Requires this workaround to work.
@@ -35,9 +34,9 @@ A dedicated server or any KVM- or Xen-based Virtual Private Server (VPS), with t
OpenVZ VPS users should instead try Nyr's OpenVPN script.
-##### » I want to run my own VPN but don't have a server for that
+**» I want to run my own VPN but don't have a server for that**
-##### :warning: DO NOT run these scripts on your PC or Mac! They are meant to be run on a dedicated server or VPS!
+:warning: **DO NOT run these scripts on your PC or Mac! They are meant to be run on a dedicated server or VPS!**
## Installation
@@ -74,7 +73,7 @@ Enjoy your very own VPN! :sparkles::tada::rocket::sparkles:
## Important Notes
-For **Windows users**, a one-time registry change is required if the VPN server and/or client is behind NAT (e.g. home router). Also, make sure that `CHAP` is selected under "Allow these protocols" in the "Security" tab of VPN adapter properties. (Ref)
+For **Windows users**, a one-time registry change is required if the VPN server and/or client is behind NAT (e.g. home router). Also, make sure that `CHAP` is enabled under "Allow these protocols" in the "Security" tab of VPN connection properties. (Ref)
**Android 6 (Marshmallow) users**: After install, edit `/etc/ipsec.conf` and append `,aes256-sha2_256` to both `ike=` and `phase2alg=`. Also add a new line `sha2-truncbug=yes`. Start lines with two spaces. Finally, run `service ipsec restart`.