bdb57089ddb8104d2956e036765342acc0f3ab16
  howto/IPsecWithPublicKeys.md
			| ... | ... | @@ -17,7 +17,7 @@  | 
        
| 17 | 17 |  *  Dynamic peers can all have distinct public keys and still use IKE main mode  | 
        
| 18 | 18 | |
| 19 | 19 |  ### So why isn't everyone using public keys already?  | 
        
| 20 | -*  The various IKE implementations don't all use the same format to represent public keys _(but we can [**easily** convert](#Conversion-tool) between them)_  | 
        |
| 20 | +*  The various IKE implementations don't all use the same format to represent public keys _(but we can **easily** [convert](#Conversion-tool) between them)_  | 
        |
| 21 | 21 |  *  Documentation on [how to](#How-To-examples), and why you should, configure public keys instead of PSKs is lacking _(which is why this page exists)_  | 
        
| 22 | 22 |  *  Some implementations don't expose the ability to use public keys directly, only allowing a choice between PSKs and X.509 certificates  | 
        
| 23 | 23 |