Skip to content

Commit f5829f5

Browse files
authored
Merge pull request #310316 from mbender-ms/avnm-freshness-012026
Network Manager | Maintenance | Top 5 articles - January
2 parents f222c11 + aa0bc39 commit f5829f5

6 files changed

Lines changed: 144 additions & 138 deletions

articles/virtual-network-manager/concept-connectivity-configuration.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
---
22
title: Connectivity Configurations in Azure Virtual Network Manager
3-
description: Connectivity configurations in Azure Virtual Network Manager simplify network management. Learn how to optimize network performance and security today.
3+
description: Learn how Azure Virtual Network Manager simplifies connectivity configurations with mesh and hub-and-spoke topologies to optimize network performance and security.
44
author: mbender-ms
55
ms.author: mbender
6+
ms.reviewer: mbender
67
ms.service: azure-virtual-network-manager
78
ms.topic: concept-article
8-
ms.date: 11/18/2025
9+
ms.date: 01/09/2026
910
ms.custom:
1011
- ai-gen-docs-bap
1112
- ai-gen-description
@@ -159,7 +160,7 @@ To enforce peering, you must enable the peering enforcement option when creating
159160

160161
After creating and deploying this configuration:
161162

162-
- All peerings created by Azure Virtual Network Manager or pre-existing customer peerings inside the topology become enforced.
163+
- All peerings created by Azure Virtual Network Manager or preexisting customer peerings inside the topology become enforced.
163164
- If a peering belongs to more than one topology, any configuration marked as enforced enforces that peering.
164165

165166
### How to remove enforcement on peering
@@ -178,4 +179,4 @@ To remove enforcement:
178179
- [Learn how to deploy a hub-and-spoke topology with Azure Firewall](how-to-deploy-hub-spoke-topology-with-azure-firewall.md).
179180
- [Understand configuration deployments](concept-deployments.md) to effectively manage your network settings.
180181
- [Block unwanted network traffic](how-to-block-network-traffic-portal.md) using security admin configurations.
181-
- [Deploy Azure Virtual Network Manager using Terraform](create-virtual-network-manager-terraform.md) to quickly set up your environment.
182+
- [Deploy Azure Virtual Network Manager using Terraform](create-virtual-network-manager-terraform.md) to quickly set up your environment.

articles/virtual-network-manager/concept-ip-address-management.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: mbender-ms
66
ms.author: mbender
77
ms.service: azure-virtual-network-manager
88
ms.topic: how-to
9-
ms.date: 11/18/2025
9+
ms.date: 01/09/2026
1010
ms.custom:
1111
- references_regions
1212
- ai-gen-docs-bap
@@ -19,7 +19,7 @@ ms.custom:
1919

2020
[!INCLUDE [virtual-network-manager-ipam](../../includes/virtual-network-manager-ipam.md)]
2121

22-
In this article, you learn about the IP address management (IPAM) feature in Azure Virtual Network Manager and how it can help you manage IP addresses in your virtual networks. With Azure Virtual Network Manager's IP address management, you can create pools for IP address planning, automatically assign nonoverlapping classless inter-domain routing (CIDR) addresses to Azure resources, and prevent address space conflicts across on-premises and multicloud environments.
22+
In this article, you learn about the IP address management (IPAM) feature in Azure Virtual Network Manager and how it can help you manage IP addresses in your virtual networks. By using Azure Virtual Network Manager's IP address management, you can create pools for IP address planning, automatically assign nonoverlapping classless inter-domain routing (CIDR) addresses to Azure resources, and prevent address space conflicts across on-premises and multicloud environments.
2323

2424
## What is IP address management (IPAM)?
2525

@@ -53,11 +53,11 @@ The IPAM feature in Azure Virtual Network Manager works through the following ke
5353

5454
### Manage IP address pools
5555

56-
IPAM allows network administrators to plan and organize IP address usage by creating pools with address spaces and respective sizes.
56+
IPAM helps network administrators plan and organize IP address usage by creating pools with address spaces and respective sizes.
5757

5858
These pools act as containers for groups of CIDRs, enabling logical grouping for specific networking purposes. You can create a structured hierarchy of pools by dividing a larger pool into smaller, more manageable pools. This hierarchy provides more granular control and organization of your network's IP address space.
5959

60-
There are two types of pools in IPAM:
60+
IPAM includes two types of pools:
6161

6262
- **Root pool**: The first pool you create in your instance. This pool represents your entire IP address range.
6363

@@ -71,11 +71,11 @@ You can also allocate static CIDRs to a pool. This allocation is useful for occu
7171

7272
### Delegating permissions for IPAM
7373

74-
With IPAM, you can delegate permission to other users to utilize the IP address pools. This approach ensures controlled access and management while democratizing pool allocation.
74+
By using IPAM, you can delegate permission to other users to utilize the IP address pools. This approach ensures controlled access and management while democratizing pool allocation.
7575

7676
These permissions allow users to see the pools they have access to, which helps them choose the right pool for their needs.
7777

78-
Delegating permissions also grants others the ability to view usage statistics and lists of resources associated with the pool. Within your network manager, you can access complete usage statistics, including:
78+
When you delegate permissions, you grant others the ability to view usage statistics and lists of resources associated with the pool. Within your network manager, you can access complete usage statistics, including:
7979

8080
- The total number of IPs in the pool.
8181

@@ -96,7 +96,7 @@ The system ensures that the automatically allocated CIDRs don't overlap within t
9696

9797
You can now associate a single IPAM pool with virtual networks in multiple regions. This feature simplifies governance and ensures consistent CIDR allocation globally. Azure PowerShell and Azure CLI support this capability in the preview regions listed in the preceding note.
9898

99-
### Create a virtual network in Region A and associate with an IPAM pool located in Region B
99+
### Create a virtual network in Region A and associate it with an IPAM pool located in Region B
100100

101101
In the following example, you create a virtual network in *Region A* and associate it with an IPAM pool located in *Region B*.
102102

@@ -142,7 +142,7 @@ The **IPAM Pool User** role alone is sufficient for delegation when using IPAM.
142142

143143
Without this role, users with only the **IPAM Pool User** role don't see available pools and virtual networks.
144144

145-
Learn more about [Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/overview).
145+
For more information, see [Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/overview).
146146

147147
## Next steps
148148

0 commit comments

Comments
 (0)