File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -90,7 +90,7 @@ features:
90
90
91
91
- Establish a virtual private network between the systems in Site A
92
92
and Site B to encrypt all traffic between the sites and remains
93
- private. Ensure that your network topology routs all traffic between
93
+ private. Ensure that your network topology routes all traffic between
94
94
members within a single site over the local area network.
95
95
96
96
- Configure authentication using :setting:`auth` and
@@ -276,15 +276,15 @@ features:
276
276
secondary-only member in Site C, and an arbiter in site A.
277
277
278
278
In most cases the first architecture is preferable because it is the
279
- lest complex.
279
+ least complex.
280
280
281
281
- Ensure that network traffic can pass between all members in the
282
282
network securely and efficiently. Consider the following:
283
283
284
284
- Establish a virtual private network between the systems in Site A
285
285
and Site B (and Site C if it exists) to encrypt all traffic
286
286
between the sites and remains private. Ensure that your network
287
- topology routs all traffic between members within a single site
287
+ topology routes all traffic between members within a single site
288
288
over the local area network.
289
289
290
290
- Configure authentication using :setting:`auth` and
You can’t perform that action at this time.
0 commit comments