Skip to content

Commit e711283

Browse files
authored
fix spelling (MicrosoftDocs#3625)
1 parent 4137397 commit e711283

File tree

42 files changed

+56
-56
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

42 files changed

+56
-56
lines changed

azps-12.5.0/Az.Network/Add-AzLoadBalancerRuleConfig.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ $slb | Set-AzLoadBalancer
6060

6161
This enables Gateway Load Balancer to have multiple backend pools
6262
The first command will get the load balancer named MyLoadBalancer, and then stores it in the variable $slb.
63-
The second and thrid command will get the backend address pools to be added the rule
63+
The second and third command will get the backend address pools to be added the rule
6464
The forth command will add a new rule with configured backend pools
6565
the fifth command will update the load balancer in azure with the new Load Balancer Rule Config.
6666

azps-12.5.0/Az.Network/Add-AzRoutingPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ Accept wildcard characters: False
116116
```
117117
118118
### -RoutingIntent
119-
The routing intent resource to which this rouing policy has to be added.
119+
The routing intent resource to which this routing policy has to be added.
120120
121121
```yaml
122122
Type: Microsoft.Azure.Commands.Network.Models.PSRoutingIntent

azps-12.5.0/Az.Network/Az.Network.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -602,7 +602,7 @@ Gets the troubleshooting result from the previously run or currently running tro
602602
Gets an existing P2SVpnGateway under VirtualHub.
603603

604604
### [Get-AzP2sVpnGatewayConnectionHealth](Get-AzP2sVpnGatewayConnectionHealth.md)
605-
Gets the current aggregared point to site connections health information from P2SVpnGateway.
605+
Gets the current aggregated point to site connections health information from P2SVpnGateway.
606606

607607
### [Get-AzP2sVpnGatewayDetailedConnectionHealth](Get-AzP2sVpnGatewayDetailedConnectionHealth.md)
608608
Gets the detailed information of current point to site connections from P2SVpnGateway.
@@ -1049,10 +1049,10 @@ Creates a Firewall Application Rule.
10491049
Creates a collection of Firewall application rules.
10501050

10511051
### [New-AzFirewallHubIpAddress](New-AzFirewallHubIpAddress.md)
1052-
Ip addresses assoicated to the firewall on virtual hub
1052+
Ip addresses associated to the firewall on virtual hub
10531053

10541054
### [New-AzFirewallHubPublicIpAddress](New-AzFirewallHubPublicIpAddress.md)
1055-
Public Ip assoicated to the firewall on virtual hub
1055+
Public Ip associated to the firewall on virtual hub
10561056

10571057
### [New-AzFirewallNatRule](New-AzFirewallNatRule.md)
10581058
Creates a Firewall NAT Rule.
@@ -1079,7 +1079,7 @@ Creates a new Azure Firewall Policy
10791079
Create a new Azure Firewall Policy Application Rule
10801080

10811081
### [New-AzFirewallPolicyApplicationRuleCustomHttpHeader](New-AzFirewallPolicyApplicationRuleCustomHttpHeader.md)
1082-
Create a new Azure Firewall Policy Application Rule Custon HTTP Header
1082+
Create a new Azure Firewall Policy Application Rule Custom HTTP Header
10831083

10841084
### [New-AzFirewallPolicyDnsSetting](New-AzFirewallPolicyDnsSetting.md)
10851085
Creates a new DNS Setting for Azure Firewall Policy

azps-12.5.0/Az.Network/Deploy-AzNetworkManagerCommit.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,15 +32,15 @@ $configIds = @("/subscriptions/f0dc2b34-dfad-40e4-83e0-2309fed8d00b/resourceGrou
3232
Deploy-AzNetworkManagerCommit -ResourceGroupName "psResourceGroup" -Name "psNetworkManager" -TargetLocation $regions -ConfigurationId $configids -CommitType "Connectivity"
3333
```
3434

35-
This example is used to commit connecitivity confguration in East US and West US regions.
35+
This example is used to commit connectivity configuration in East US and West US regions.
3636

3737
### Example 2
3838
```powershell
3939
$regions = @( "westus")
4040
Deploy-AzNetworkManagerCommit -ResourceGroupName "psResourceGroup" -Name "psNetworkManager" -TargetLocation $regions -CommitType "Connectivity"
4141
```
4242

43-
This example is used to uncommit all connecitivity confgurations in West US region.
43+
This example is used to uncommit all connectivity configurations in West US region.
4444

4545
### Example 3
4646
```powershell

azps-12.5.0/Az.Network/Get-AzApplicationGatewayWafDynamicManifest.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Get-AzApplicationGatewayWafDynamicManifest -Location <String> [-DefaultProfile <
2020
```
2121

2222
## DESCRIPTION
23-
The **Get-AzApplicationGatewayWafDynamicManifest** cmdlet gets athe web application firewall manifest and all the supported rule sets .
23+
The **Get-AzApplicationGatewayWafDynamicManifest** cmdlet gets the web application firewall manifest and all the supported rule sets .
2424

2525
## EXAMPLES
2626

azps-12.5.0/Az.Network/Get-AzBastion.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Get-AzBastion -ResourceId <String> [-DefaultProfile <IAzureContextContainer>] [-
3838
```
3939

4040
## DESCRIPTION
41-
The **Get-Bastion** cmdlet gets one or more bastions in a resource group or subscritption.
41+
The **Get-Bastion** cmdlet gets one or more bastions in a resource group or subscription.
4242

4343
## EXAMPLES
4444

azps-12.5.0/Az.Network/Get-AzNetworkManagerRoutingRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ SystemData : {
6969
}
7070
```
7171

72-
Gets a routing rule in a rule rollection.
72+
Gets a routing rule in a rule collection.
7373

7474
### Example 2
7575
```powershell

azps-12.5.0/Az.Network/Get-AzNetworkManagerSecurityAdminRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ SystemData : {
7777
}
7878
```
7979

80-
Gets a security admin rule in a rule rollection.
80+
Gets a security admin rule in a rule collection.
8181

8282
### Example 2
8383
```powershell

azps-12.5.0/Az.Network/Get-AzNetworkManagerSecurityUserRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ SystemData : {
8383
}
8484
```
8585

86-
Gets a security user rule in a rule rollection.
86+
Gets a security user rule in a rule collection.
8787

8888
### Example 2
8989
```powershell

azps-12.5.0/Az.Network/Get-AzP2sVpnGatewayConnectionHealth.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/main/sr
1010
# Get-AzP2sVpnGatewayConnectionHealth
1111

1212
## SYNOPSIS
13-
Gets the current aggregared point to site connections health information from P2SVpnGateway.
13+
Gets the current aggregated point to site connections health information from P2SVpnGateway.
1414

1515
## SYNTAX
1616

azps-12.5.0/Az.Network/Get-AzRoutingPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Accept wildcard characters: False
8787
```
8888
8989
### -RoutingIntent
90-
The routing intent resource to which this rouing policy has to be added.
90+
The routing intent resource to which this routing policy has to be added.
9191
9292
```yaml
9393
Type: Microsoft.Azure.Commands.Network.Models.PSRoutingIntent

azps-12.5.0/Az.Network/Get-AzVirtualWanVpnServerConfiguration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Get-AzVirtualWanVpnServerConfiguration -ResourceId <String> [-DefaultProfile <IA
3333
```
3434

3535
## DESCRIPTION
36-
The **Get-AzVirtualWanVpnServerConfiguration** cmdlet will return the list of all VpnServerConfigurations that are associated with this VirtualWan. i.e. All the VpnServerConfigurations which are attached to any P2SVpnGateways under VirutalHubs of this VirtualWan.
36+
The **Get-AzVirtualWanVpnServerConfiguration** cmdlet will return the list of all VpnServerConfigurations that are associated with this VirtualWan. i.e. All the VpnServerConfigurations which are attached to any P2SVpnGateways under VirtualHubs of this VirtualWan.
3737

3838
## EXAMPLES
3939

azps-12.5.0/Az.Network/Get-AzVirtualWanVpnServerConfigurationVpnProfile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ Accept wildcard characters: False
181181
```
182182
183183
### -VpnServerConfigurationId
184-
The id of Vpn server configuraiton object this Virtual wan will be associated with.
184+
The id of Vpn server configuration object this Virtual wan will be associated with.
185185
186186
```yaml
187187
Type: System.String

azps-12.5.0/Az.Network/New-AzApplicationGatewayFirewallCondition.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The **New-AzApplicationGatewayFirewallCondition** creates a match condition for
3030
$condition = New-AzApplicationGatewayFirewallCondition -MatchVariable $variable -Operator Contains -NegationCondition false -Transform Lowercase, Trim -MatchValue abc, cde
3131
```
3232

33-
The command creates a new match condition using the match variable defined in the $variable, the operator is Contains and negation condition is false, Transfroms including lowercase and trim, the match value is abc and cde. The new match condition is saved in $condition.
33+
The command creates a new match condition using the match variable defined in the $variable, the operator is Contains and negation condition is false, Transforms including lowercase and trim, the match value is abc and cde. The new match condition is saved in $condition.
3434

3535
## PARAMETERS
3636

azps-12.5.0/Az.Network/New-AzApplicationGatewayFirewallCustomRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ The **New-AzApplicationGatewayFirewallCustomRule** creates a custom rule for fir
2828

2929
### Example 1
3030
```powershell
31-
New-AzApplicationGatewayFirewallCustomRule -Name example-rule -Priority 1 -RuleType MatchRule -MatchCondition $condtion -Action Allow
31+
New-AzApplicationGatewayFirewallCustomRule -Name example-rule -Priority 1 -RuleType MatchRule -MatchCondition $condition -Action Allow
3232
```
3333

3434
```output

azps-12.5.0/Az.Network/New-AzApplicationGatewayFirewallPolicySetting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ Accept wildcard characters: False
123123
```
124124
125125
### -DisableRequestBodyCheck
126-
Diables the requestBodyCheck in policy settings of the firewall policy.
126+
Disables the requestBodyCheck in policy settings of the firewall policy.
127127
128128
```yaml
129129
Type: System.Management.Automation.SwitchParameter

azps-12.5.0/Az.Network/New-AzCustomIpPrefix.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The **New-AzCustomIpPrefix** cmdlet creates a CustomIpPrefix resource.
3232
$myCustomIpPrefix = New-AzCustomIpPrefix -Name $prefixName -ResourceGroupName $rgName -Cidr "40.40.40.0/24" -Location westus2 -Zone 1,2,3 -AuthorizationMessage $authorizationMessage -SignedMessage $signedMessage
3333
```
3434

35-
This command kicks off the provisioning process for a new zone-redundant IPv4 Custom IP Prefix resource with name $prefixName in resource group $rgName with a CIDR of 40.40.40.0/24 in West US 2 region. Note the AuthorizationMessage is a contactenated string (containing the subscription ID, CIDR, and Route Origin Authorization expiration date) and the SignedMessage is the same string signed by X509 certificate offline.
35+
This command kicks off the provisioning process for a new zone-redundant IPv4 Custom IP Prefix resource with name $prefixName in resource group $rgName with a CIDR of 40.40.40.0/24 in West US 2 region. Note the AuthorizationMessage is a concatenated string (containing the subscription ID, CIDR, and Route Origin Authorization expiration date) and the SignedMessage is the same string signed by X509 certificate offline.
3636

3737
### Example 2
3838
```powershell

azps-12.5.0/Az.Network/New-AzFirewallHubIpAddress.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/main/sr
1010
# New-AzFirewallHubIpAddress
1111

1212
## SYNOPSIS
13-
Ip addresses assoicated to the firewall on virtual hub
13+
Ip addresses associated to the firewall on virtual hub
1414

1515
## SYNTAX
1616

@@ -20,7 +20,7 @@ New-AzFirewallHubIpAddress [-PrivateIPAddress <String>] [-PublicIP <PSAzureFirew
2020
```
2121

2222
## DESCRIPTION
23-
Ip addresses assoicated to the firewall on virtual hub. These can be public and private addresses
23+
Ip addresses associated to the firewall on virtual hub. These can be public and private addresses
2424

2525
## EXAMPLES
2626

azps-12.5.0/Az.Network/New-AzFirewallHubPublicIpAddress.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/main/sr
1010
# New-AzFirewallHubPublicIpAddress
1111

1212
## SYNOPSIS
13-
Public Ip assoicated to the firewall on virtual hub
13+
Public Ip associated to the firewall on virtual hub
1414

1515
## SYNTAX
1616

@@ -20,7 +20,7 @@ New-AzFirewallHubPublicIpAddress [-Count <Int32>] [-Address <PSAzureFirewallPubl
2020
```
2121

2222
## DESCRIPTION
23-
Public Ip assoicated to the firewall on virtual hub
23+
Public Ip associated to the firewall on virtual hub
2424

2525
## EXAMPLES
2626

azps-12.5.0/Az.Network/New-AzFirewallPolicyApplicationRuleCustomHttpHeader.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ original_content_git_url: https://github.com/Azure/azure-powershell/blob/main/sr
1010
# New-AzFirewallPolicyApplicationRuleCustomHttpHeader
1111

1212
## SYNOPSIS
13-
Create a new Azure Firewall Policy Application Rule Custon HTTP Header
13+
Create a new Azure Firewall Policy Application Rule Custom HTTP Header
1414

1515
## SYNTAX
1616

azps-12.5.0/Az.Network/New-AzLoadBalancerBackendAddressPool.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ New-AzLoadBalancerBackendAddressPool -LoadBalancer <PSLoadBalancer> -Name <Strin
3131
```
3232

3333
## DESCRIPTION
34-
Creates a backend address pool on a loadbalancer. Allows for specifiying a array of PSLoadBalancerBackendAddress.
34+
Creates a backend address pool on a loadbalancer. Allows for specifying a array of PSLoadBalancerBackendAddress.
3535

3636
## EXAMPLES
3737

azps-12.5.0/Az.Network/New-AzNetworkWatcherConnectionMonitorEndpointObject.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,7 @@ Accept wildcard characters: False
202202
203203
### -CoverageLevel
204204
Test coverage for the endpoint.
205-
Supported values are Default, Low, BelowAverage, Average, AboveAvergae, Full.
205+
Supported values are Default, Low, BelowAverage, Average, AboveAverage, Full.
206206
207207
```yaml
208208
Type: System.String
@@ -262,7 +262,7 @@ Accept wildcard characters: False
262262
```
263263
264264
### -IncludeItem
265-
List of items which need to be included into endpont scope.
265+
List of items which need to be included into endpoint scope.
266266
267267
```yaml
268268
Type: Microsoft.Azure.Commands.Network.Models.PSNetworkWatcherConnectionMonitorEndpointScopeItem[]

azps-12.5.0/Az.Network/New-AzPrivateDnsZoneConfig.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ $dnsZone = New-AzPrivateDnsZone -ResourceGroupName "rg" -Name "test.vault.azure.
3030
$config = New-AzPrivateDnsZoneConfig -Name "test-vault-azure-com" -PrivateDnsZoneId $dnsZone.ResourceId
3131
```
3232

33-
The above example creates DNS zone and then creates DNS zone configuration. `New-AzPrivateDnsZone` cmdlet is proveded by module Az.PrivateDns.
33+
The above example creates DNS zone and then creates DNS zone configuration. `New-AzPrivateDnsZone` cmdlet is provided by module Az.PrivateDns.
3434

3535
## PARAMETERS
3636

azps-12.5.0/Az.Network/New-AzRoutingIntent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ Accept wildcard characters: False
197197
```
198198
199199
### -RoutingPolicy
200-
The list of routing policies for this rouoting intent resource.
200+
The list of routing policies for this routing intent resource.
201201
202202
```yaml
203203
Type: Microsoft.Azure.Commands.Network.Models.PSRoutingPolicy[]

azps-12.5.0/Az.Network/New-AzVirtualApplianceInboundSecurityRulesProperty.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Source Address Prefix: *
3838
Destination Port Range List: "80-120" & "121-124"
3939
Applies on: publicip1
4040

41-
The rule with above property will configure a corresponding NSG rule and a Load Balancing rule on the SLB attached to the NVA, the LB rule will have the Frontned IP as publicip1
41+
The rule with above property will configure a corresponding NSG rule and a Load Balancing rule on the SLB attached to the NVA, the LB rule will have the Frontend IP as publicip1
4242

4343
## PARAMETERS
4444

azps-12.5.0/Az.Network/New-AzVirtualNetworkGateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -281,7 +281,7 @@ Accept wildcard characters: False
281281
```
282282
283283
### -ClientConnectionConfiguration
284-
P2S Client Connection Configuration that assiociate between address and policy group
284+
P2S Client Connection Configuration that associate between address and policy group
285285
286286
```yaml
287287
Type: Microsoft.Azure.Commands.Network.Models.PSClientConnectionConfiguration[]

azps-12.5.0/Az.Network/New-AzVirtualNetworkGatewayConnection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ New-AzVirtualNetworkGatewayConnection -ResourceGroupName "PS_testing" -name "Con
8181
```
8282

8383
The two command gets a local network gateway and virtual network gateway.
84-
The thrid command creates a AzGatewayCustomBgpIpConfigurationObject.
84+
The third command creates a AzGatewayCustomBgpIpConfigurationObject.
8585
The third command creates this new virtual Network gateway connection with GatewayCustomBgpIpAddress.
8686

8787
## PARAMETERS

azps-12.5.0/Az.Network/New-AzVirtualNetworkGatewayNatRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Set-AzVirtualNetworkGateway -VirtualNetworkGateway $gateway -NatRule $natRule
3434
```
3535

3636
The first command gets a virtual network gateway named gw1 that belongs to resource group myRg and stores it to the variable named $gateway
37-
The second command creates a new PSVirtualNetworkGatewayNatRuleirtual object.
37+
The second command creates a new PSVirtualNetworkGatewayNatRule virtual object.
3838
The third command updates the virtual network gateway gw1 with the with newly added natRule.
3939

4040
## PARAMETERS

azps-12.5.0/Az.Network/New-AzVpnClientConnectionConfiguration.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ New-AzVpnClientConnectionConfiguration -Name <String>
2121
```
2222

2323
## DESCRIPTION
24-
Conneciton Configuration associate between the address space of the P2S client and the according virtual network gateway policy groups
24+
Connection Configuration associate between the address space of the P2S client and the according virtual network gateway policy groups
2525

2626
## EXAMPLES
2727

@@ -31,8 +31,8 @@ $member1=New-AzVirtualNetworkGatewayPolicyGroupMember -Name "member1" -Attribute
3131
$member2=New-AzVirtualNetworkGatewayPolicyGroupMember -Name "member2" -AttributeType "CertificateGroupId" -AttributeValue "cd"
3232
$policyGroup1=New-AzVirtualNetworkGatewayPolicyGroup -Name "policyGroup1" -Priority 0 -DefaultPolicyGroup -PolicyMember $member1
3333
$policyGroup2=New-AzVirtualNetworkGatewayPolicyGroup -Name "policyGroup2" -Priority 10 -PolicyMember $member2
34-
$vngconnectionConfig=New-AzVpnClientConnectionConfiguration -Name "coonfig1" -VirtualNetworkGatewayPolicyGroup $policyGroup1 -VpnClientAddressPool "192.168.10.0/24"
35-
$vngconnectionConfig2=New-AzVpnClientConnectionConfiguration -Name "coonfig2" -VirtualNetworkGatewayPolicyGroup $policyGroup2 -VpnClientAddressPool "192.168.20.0/24"
34+
$vngconnectionConfig=New-AzVpnClientConnectionConfiguration -Name "config1" -VirtualNetworkGatewayPolicyGroup $policyGroup1 -VpnClientAddressPool "192.168.10.0/24"
35+
$vngconnectionConfig2=New-AzVpnClientConnectionConfiguration -Name "config2" -VirtualNetworkGatewayPolicyGroup $policyGroup2 -VpnClientAddressPool "192.168.20.0/24"
3636
```
3737

3838
Create Client Connection configuration
@@ -100,7 +100,7 @@ Accept wildcard characters: False
100100
```
101101
102102
### -VpnClientAddressPool
103-
The Associatted client address pool
103+
The Associated client address pool
104104
105105
```yaml
106106
Type: System.String[]

azps-12.5.0/Az.Network/New-AzVpnGatewayNatRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Etag : W/"4580a2e2-2fab-4cff-88eb-92013a76b5a8"
7272
Id : /subscriptions/{subscriptionId}/resourceGroups/testRg/providers/Microsoft.Network/vpnGateways/testvpngw/natRules/testNatRule
7373
```
7474

75-
The above will create a resource group, Virtual WAN, Virtual Network, Virtual Hub. Then, we will create VpnGateway under that Virtual Hub. Then, using this command: New-AzVpnGatewayNatRule, NAT rule can be createdand associated with created VpnGateway.
75+
The above will create a resource group, Virtual WAN, Virtual Network, Virtual Hub. Then, we will create VpnGateway under that Virtual Hub. Then, using this command: New-AzVpnGatewayNatRule, NAT rule can be created and associated with created VpnGateway.
7676

7777
## PARAMETERS
7878

azps-12.5.0/Az.Network/Remove-AzApplicationSecurityGroup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ The **Remove-AzApplicationSecurityGroup** cmdlet removes an application security
2626

2727
### Example 1
2828
```powershell
29-
Remove-AzApplicationSecurityGroup -Name "MyApplicationSecurityGrouo" -ResourceGroupName "MyResourceGroup"
29+
Remove-AzApplicationSecurityGroup -Name "MyApplicationSecurityGroup" -ResourceGroupName "MyResourceGroup"
3030
```
3131

3232
This command deletes an application security group named MyApplicationSecurityGroup in the resource group named MyResourceGroup.

azps-12.5.0/Az.Network/Remove-AzFirewallPolicyRuleCollectionGroup.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,14 +51,14 @@ The **Remove-AzFirewallPolicyRuleCollectionGroup** cmdlet removes a rule collect
5151
Remove-AzFirewallPolicyRuleCollectionGroup -Name testRcGroup -FirewallPolicyObject $fp
5252
```
5353

54-
This example removes the firewall policy rule colelction group named "testRcGroup" in the firewall policy object $fp
54+
This example removes the firewall policy rule collection group named "testRcGroup" in the firewall policy object $fp
5555

5656
### Example 2
5757
```powershell
5858
Remove-AzFirewallPolicyRuleCollectionGroup -Name testRcGroup -ResourceGroupName testRg -AzureFirewallPolicyName fpName
5959
```
6060

61-
This example removes the firewall policy rule colelction group named "testRcGroup" in the firewall named "fpName" frpm the resourcegroup names "testRg"
61+
This example removes the firewall policy rule collection group named "testRcGroup" in the firewall named "fpName" from the resourcegroup names "testRg"
6262

6363
## PARAMETERS
6464

@@ -211,7 +211,7 @@ Accept wildcard characters: False
211211
```
212212
213213
### -ResourceId
214-
The resource Id of the Rule collection groupy
214+
The resource Id of the Rule collection group
215215
216216
```yaml
217217
Type: System.String

azps-12.5.0/Az.Network/Remove-AzPrivateDnsZoneGroup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The **Remove-AzPrivateDnsZoneGroup** cmdlet removes a DNS zone group.
2929
Remove-AzPrivateDnsZoneGroup -ResourceGroupName "rg" -PrivateEndpointName "test-pr-endpoint" -name dnsgroup1
3030
```
3131

32-
Above example removes a DNS zone grup named dnsgroup1 from endpoint test-pr-endpoint.
32+
Above example removes a DNS zone group named dnsgroup1 from endpoint test-pr-endpoint.
3333

3434
## PARAMETERS
3535

0 commit comments

Comments
 (0)