Skip to content

Commit 503e8cf

Browse files
authored
Add files via upload
1 parent 1892896 commit 503e8cf

2 files changed

+18
-18
lines changed

draft-reddy-add-enterprise-split-dns-01.txt

+9-9
Original file line numberDiff line numberDiff line change
@@ -194,15 +194,15 @@ Internet-Draft Split-Horizon DNS Configuration March 2021
194194

195195
The scope of this document is restricted to unmanaged BYOD devices
196196
without a configuration profile and split DNS configuration on
197-
explicitly trusted networks. It is similar to the way users
198-
explicitly disable VPN connection in specific networks and VPN
199-
connection is enabled by default in other networks for privacy. In
200-
this use case, the the user has authorized the client to override
201-
local DNS settings for a specific network. The unmanaged BYOD
202-
devices typically use the credentials (user name and password)
203-
provided by the IT admin to mutually authenticate to the Enterprise
204-
WLAN Access Point (e.g., PEAP-MSCHAPv2 [PEAP], EAP-pwd [RFC8146],
205-
EAP-PSK [RFC4764]).
197+
explicitly trusted networks. In this use case, the user has
198+
authorized the client to override local DNS settings for a specific
199+
network. It is similar to the way users explicitly disable VPN
200+
connection in specific networks and VPN connection is enabled by
201+
default in other networks for privacy. The unmanaged BYOD devices
202+
typically use the credentials (user name and password) provided by
203+
the IT admin to mutually authenticate to the Enterprise WLAN Access
204+
Point (e.g., PEAP-MSCHAPv2 [PEAP], EAP-pwd [RFC8146], EAP-PSK
205+
[RFC4764]).
206206

207207
Note: Many users have privacy and personal data sovereignty
208208
concerns with employers installing MDM on their personal devices;

draft-reddy-add-enterprise-split-dns-01.xml

+9-9
Original file line numberDiff line numberDiff line change
@@ -194,15 +194,15 @@
194194

195195
<t>The scope of this document is restricted to unmanaged BYOD devices
196196
without a configuration profile and split DNS configuration on
197-
explicitly trusted networks. It is similar to the way users explicitly
198-
disable VPN connection in specific networks and VPN connection is
199-
enabled by default in other networks for privacy. In this use case, the
200-
the user has authorized the client to override local DNS settings for a
201-
specific network. The unmanaged BYOD devices typically use the
202-
credentials (user name and password) provided by the IT admin to
203-
mutually authenticate to the Enterprise WLAN Access Point (e.g.,
204-
PEAP-MSCHAPv2 <xref target="PEAP"></xref>, EAP-pwd <xref
205-
target="RFC8146"></xref>, EAP-PSK <xref target="RFC4764"></xref>). </t>
197+
explicitly trusted networks. In this use case, the user has authorized
198+
the client to override local DNS settings for a specific network. It is
199+
similar to the way users explicitly disable VPN connection in specific
200+
networks and VPN connection is enabled by default in other networks for
201+
privacy. The unmanaged BYOD devices typically use the credentials (user
202+
name and password) provided by the IT admin to mutually authenticate to
203+
the Enterprise WLAN Access Point (e.g., PEAP-MSCHAPv2 <xref
204+
target="PEAP"></xref>, EAP-pwd <xref target="RFC8146"></xref>, EAP-PSK
205+
<xref target="RFC4764"></xref>). </t>
206206

207207
<t><list style="hanging">
208208
<t hangText="Note: ">Many users have privacy and personal data

0 commit comments

Comments
 (0)