diff --git a/website/source/docs/guides/acl.html.md b/website/source/docs/guides/acl.html.md
index 4ddf2ab837..6e1c56c61a 100644
--- a/website/source/docs/guides/acl.html.md
+++ b/website/source/docs/guides/acl.html.md
@@ -83,15 +83,15 @@ On the server where the `bootstrap` command was issued we should see the followi
2018/12/11 15:30:23 [DEBUG] http: Request PUT /v1/acl/bootstrap (2.347965ms) from=127.0.0.1:40566
```
-Since ACLs have been enabled, we will need it use it to complete any additional operations.
-For example, even checking the memeber list will require a token.
+Since ACLs have been enabled, we will need to use it to complete any additional operations.
+For example, even checking the member list will require a token.
```sh
$ consul members -token "4411f091-a4c9-48e6-0884-1fcb092da1c8"
-Node Address Status Type Build Protocol DC Segment
-fox 172.20.20.10:8301 alive server 1.4.0 2 kc
-bear 172.20.20.11:8301 alive server 1.4.0 2 kc
-wolf 172.20.20.12:8301 alive server 1.4.0 2 kc
+Node Address Status Type Build Protocol DC Segment
+fox 172.20.20.10:8301 alive server 1.4.0 2 kc
+bear 172.20.20.11:8301 alive server 1.4.0 2 kc
+wolf 172.20.20.12:8301 alive server 1.4.0 2 kc
```
Note using the token on the command line with the `-token` flag is not
@@ -109,7 +109,7 @@ Note, the bootstrap token can only be created once, bootstrapping will be disabl
## Step 3: Create an Agent Token Policy
-Before we can create a token, we will need to create its associated policy. A policy is a set of rules that can used to specify granular permissions. To learn more about rules, read the ACL rule specification [documentation](/docs/agent/acl-rules.html).
+Before we can create a token, we will need to create its associated policy. A policy is a set of rules that can be used to specify granular permissions. To learn more about rules, read the ACL rule specification [documentation](/docs/agent/acl-rules.html).
```bash
# agent-policy.hcl contains the following:
@@ -262,10 +262,10 @@ it has write privileges to an empty `node` prefix, meaning it has access to all
```bash
$ CONSUL_HTTP_TOKEN=4411f091-a4c9-48e6-0884-1fcb092da1c8 consul members
-Node Address Status Type Build Protocol DC
-fox 172.20.20.10:8301 alive server 1.4.0 2 kc
-bear 172.20.20.11:8301 alive server 1.4.0 2 kc
-wolf 172.20.20.12:8301 alive server 1.4.0 2 kc
+Node Address Status Type Build Protocol DC Segment
+fox 172.20.20.10:8301 alive server 1.4.0 2 kc
+bear 172.20.20.11:8301 alive server 1.4.0 2 kc
+wolf 172.20.20.12:8301 alive server 1.4.0 2 kc
```
It is common in many environments to allow listing of all nodes, even without a
@@ -305,10 +305,10 @@ The anonymous token is implicitly used if no token is supplied, so now we can ru
```bash
$ consul members
-Node Address Status Type Build Protocol DC
-fox 172.20.20.10:8301 alive server 1.4.0 2 kc
-bear 172.20.20.11:8301 alive server 1.4.0 2 kc
-wolf 172.20.20.12:8301 alive server 1.4.0 2 kc
+Node Address Status Type Build Protocol DC Segment
+fox 172.20.20.10:8301 alive server 1.4.0 2 kc
+bear 172.20.20.11:8301 alive server 1.4.0 2 kc
+wolf 172.20.20.12:8301 alive server 1.4.0 2 kc
```
The anonymous token is also used for DNS lookups since there is no way to pass a