diff --git a/module002-ch004-security-in-neutron.xml b/module002-ch004-security-in-neutron.xml
index c8f16951..672d2df0 100644
--- a/module002-ch004-security-in-neutron.xml
+++ b/module002-ch004-security-in-neutron.xml
@@ -6,7 +6,7 @@
xml:id="module002-ch004-security-in-neutron">
Security in Neutron
Security Groups
- Security groups and security group rules allows
+ Security groups and security group rules allow
administrators and tenants the ability to specify the type
of traffic and direction (ingress/egress) that is allowed
to pass through a port. A security group is a container
@@ -15,8 +15,8 @@
associated with a security group. If a security group is
not specified the port will be associated with a 'default'
security group. By default this group will drop all
- ingress traffic and allow all egress. Rules can be added
- to this group in order to change the behaviour.
+ ingress traffic and allow all egress traffic. Rules can be added
+ to this group in order to change this behaviour.
If one desires to use the OpenStack Compute security
group APIs and/or have OpenStack Compute orchestrate the
creation of new ports for instances on specific security
@@ -24,15 +24,15 @@
this, one must configure the following file
/etc/nova/nova.conf and set the config option
security_group_api=neutron on every node running
- nova-compute and nova-api. After this change is made
+ nova-compute and nova-api. After this change is made,
restart nova-api and nova-compute in order to pick up this
- change. After this change is made one will be able to use
+ change. After this change is made, the user will be able to use
both the OpenStack Compute and OpenStack Network security
group API at the same time.
Authentication and Authorization
OpenStack Networking uses the OpenStack Identity service
(project name keystone) as the default authentication
- service. When OpenStack Identity is enabled Users
+ service. When OpenStack Identity is enabled, users
submitting requests to the OpenStack Networking service
must provide an authentication token in X-Auth-Token
request header. The aforementioned token should have been
@@ -54,7 +54,7 @@
Operation-based:
policies specify access criteria for specific
operations, possibly with fine-grained control over
- specific attributes;
+ specific attributes.