diff --git a/source/tutorial/deploy-geographically-distributed-replica-set.txt b/source/tutorial/deploy-geographically-distributed-replica-set.txt index b51f5433aa0..7b84fcf3b29 100644 --- a/source/tutorial/deploy-geographically-distributed-replica-set.txt +++ b/source/tutorial/deploy-geographically-distributed-replica-set.txt @@ -90,7 +90,7 @@ features: - Establish a virtual private network between the systems in Site A and Site B to encrypt all traffic between the sites and remains - private. Ensure that your network topology routs all traffic between + private. Ensure that your network topology routes all traffic between members within a single site over the local area network. - Configure authentication using :setting:`auth` and @@ -276,7 +276,7 @@ features: secondary-only member in Site C, and an arbiter in site A. In most cases the first architecture is preferable because it is the - lest complex. + least complex. - Ensure that network traffic can pass between all members in the network securely and efficiently. Consider the following: @@ -284,7 +284,7 @@ features: - Establish a virtual private network between the systems in Site A and Site B (and Site C if it exists) to encrypt all traffic between the sites and remains private. Ensure that your network - topology routs all traffic between members within a single site + topology routes all traffic between members within a single site over the local area network. - Configure authentication using :setting:`auth` and