Comments from Tero Kivinen 1. Introduction Needs more explanation 3.1 H&S deployment Scenario Something missing in description 3.3 Softwire Security Threat Scenarios Add more other protocol 3.4 Softwire Security Guidelines Editorial Need correction of IKE description 3.5 Guidelines for Usage of Security Protection Mechanism Need for IKEv2 description |