Description
In most cases, the most effective ways to control access and to secure the connection between members of a replica set depend on network-level access control.In fact ,after I enableed authentication,using the keyFile, i found the the servers was much slower?