Skip to content

Commit 15d962b

Browse files
committed
updated link.
1 parent 8c1a74a commit 15d962b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/firewall/sql-fqdn-filtering.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ If you use non-default ports for SQL IaaS traffic, you can configure those ports
8787
1. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
8888

8989
> [!NOTE]
90-
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-an-network-rule).
90+
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
9191
9292
1. Add the application rule with the appropriate protocol, port, and SQL FQDN and then select **Save**.
9393
![application rule with SQL FQDN](media/sql-fqdn-filtering/application-rule-sql.png)

0 commit comments

Comments
 (0)