diff --git a/README.md b/README.md
index bd50f7b..828d5e7 100644
--- a/README.md
+++ b/README.md
@@ -1,8 +1,8 @@
# IPsec/L2TP VPN Server Auto Setup Scripts
Note: This repository was created from (and replaces) these GitHub Gists:
-- gist.github.com/hwdsl2/9030462 (224 Stars, 87 Forks as of 01/08/2016)
-- gist.github.com/hwdsl2/e9a78a50e300d12ae195 (9 Stars, 5 Forks)
+- gist.github.com/hwdsl2/9030462 (225 Stars, 88 Forks as of 01/18/2016)
+- gist.github.com/hwdsl2/e9a78a50e300d12ae195 (10 Stars, 6 Forks)
## Overview
@@ -33,10 +33,10 @@ A newly created Amazon EC2 instance, using these AMIs: (See the link above for u
**-OR-**
A dedicated server or any KVM- or Xen-based Virtual Private Server (VPS), with these Linux OS:
-(It is recommended that you use the VPN scripts on a **freshly installed** system)
+(Using the VPN scripts on a **freshly installed** system is recommended)
- Ubuntu 14.04 (Trusty) or 12.04 (Precise)
- Debian 8 (Jessie)
-- Debian 7 (Wheezy) - Not recommended. A workaround is required, see below.
+- Debian 7 (Wheezy) - NOT recommended. Requires this workaround to work.
- CentOS / Red Hat Enterprise Linux (RHEL) 6 or 7
OpenVZ VPS users should instead use Nyr's OpenVPN script.
@@ -49,7 +49,7 @@ OpenVZ VPS users should instead use edit a few lines in the scripts.
For **Windows users**, a one-time registry change is required if the VPN server and/or client is behind NAT (e.g. home router).
-**Android 6.0 users**: Edit `/etc/ipsec.conf` and append `,aes256-sha2_256` to the end of both `ike=` and `phase2alg=`, then add a new line `sha2-truncbug=yes`. Must start lines with two spaces. Finally, run `service ipsec restart`. (Ref)
+**Android 6 (Marshmallow) users**: Edit `/etc/ipsec.conf` and append `,aes256-sha2_256` to both `ike=` and `phase2alg=`. Also add a new line `sha2-truncbug=yes`. Must start lines with two spaces. Finally, run `service ipsec restart`. (Ref)
-**iPhone/iOS users**: In iOS settings, choose `L2TP` (instead of `IPSec`) for the VPN type. In case you're unable to connect, try replacing this line in /etc/ipsec.conf: `rightprotoport=17/%any` with `rightprotoport=17/0`. Then restart `ipsec` service.
+**iPhone/iPad users**: In iOS settings, choose `L2TP` (instead of `IPSec`) for the VPN type. In case you're unable to connect, edit `ipsec.conf` and replace `rightprotoport=17/%any` with `rightprotoport=17/0`. Then restart `ipsec` service.
-Clients are configured to use Google Public DNS when the VPN connection is active. This setting is controlled by `ms-dns` in `/etc/ppp/options.xl2tpd`.
+Clients are configured to use Google Public DNS when the VPN is active. To change, set `ms-dns` in `options.xl2tpd`.
-If using Amazon EC2, these ports must be open in the instance's security group: **UDP ports 500 & 4500** (for the VPN), and **TCP port 22** (optional, for SSH).
+If you configured a custom SSH port or wish to allow other services, edit the IPTables rules in the scripts before using.
-If your server uses a custom SSH port (not 22), or if you wish to allow other services through IPTables, be sure to edit the IPTables rules in the scripts before using.
-
-The scripts will backup your existing configuration files before overwriting them. Backups can be found in the same folder as the original, with `.old-date/time` suffix.
+The scripts will backup your existing config files before making changes, to the same folder with `.old-date-time` suffix.
## Upgrading Libreswan
@@ -101,7 +94,7 @@ You may use `vpnupgrade_Libreswan.sh` (for Ubuntu/Debian) and `vpnupgrade_Libres
## Bugs & Questions
-- Have a question? Please read other people's comments in this Gist and on my blog before posting.
+- Have a question? Please first read other people's comments in this Gist and on my blog.
- For Libreswan related questions, you may ask on the mailing list, or check out the official wiki.
- If you found a reproducible bug, open a GitHub Issue to submit a bug report.