This section includes the following examples:
Example 1: IPAM in a Security Fabric setup
Example 2: IPAM with automatically managed interfaces
Example 3: IPAM with auto-resolve conflicts