diff --git a/docs/en-US/networking-in-a-pod.xml b/docs/en-US/networking-in-a-pod.xml
index 08cf36f0edd..39287154278 100644
--- a/docs/en-US/networking-in-a-pod.xml
+++ b/docs/en-US/networking-in-a-pod.xml
@@ -8,9 +8,9 @@
Figure 2 illustrates network setup within a single pod. The hosts are connected to a pod-level switch. At a minimum, the hosts should have one physical uplink to each switch. Bonded NICs are supported as well. The pod-level switch is a pair of redundant gigabit switches with 10 G uplinks.
-
+
- ReleaseIPButton.png: button to release an IP
+ networking-in-a-pod.png: Network setup in a pod
Servers are connected as follows:
diff --git a/docs/en-US/networking-in-a-zone.xml b/docs/en-US/networking-in-a-zone.xml
index 75dba08443a..e5450bc614c 100644
--- a/docs/en-US/networking-in-a-zone.xml
+++ b/docs/en-US/networking-in-a-zone.xml
@@ -8,9 +8,9 @@
Figure 3 illustrates the network setup within a single zone.
-
+
- ReleaseIPButton.png: Depicts network setup in a single zone
+ networking-in-a-zone.png: Network setup in a single zone
A firewall for management traffic operates in the NAT mode. The network typically is assigned IP addresses in the 192.168.0.0/16 Class B private address space. Each pod is assigned IP addresses in the 192.168.*.0/24 Class C private address space.
Each zone has its own set of public IP addresses. Public IP addresses from different zones do not overlap.
diff --git a/docs/en-US/vm-lifecycle.xml b/docs/en-US/vm-lifecycle.xml
index b9b86e7e73a..83e1845a89d 100644
--- a/docs/en-US/vm-lifecycle.xml
+++ b/docs/en-US/vm-lifecycle.xml
@@ -3,9 +3,9 @@
Virtual machines can be in the following states:
-
+
- basic_deployment.png: Basic two-machine CloudStack deployment
+ basic-deployment.png: Basic two-machine CloudStack deployment
Once a virtual machine is destroyed, it cannot be recovered. All the resources used by the virtual machine will be reclaimed by the system. This includes the virtual machine’s IP address.
A stop will attempt to gracefully shut down the operating system, which typically involves terminating all the running applications. If the operation system cannot be stopped, it will be forcefully terminated. This has the same effect as pulling the power cord to a physical machine.