Skip to content

Commit 44c569c

Browse files
committed
fix links
1 parent 200251c commit 44c569c

File tree

9 files changed

+3
-3
lines changed

9 files changed

+3
-3
lines changed

articles/private-link/inspect-traffic-with-azure-firewall.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Azure Firewall filters traffic using either:
4646
4747
## Scenario 1: Hub and spoke architecture - Dedicated virtual network for private endpoints
4848

49-
:::image type="content" source="./media/inspect-traffic-use-azure-firewall/hub-and-spoke.png" alt-text="Dedicated Virtual Network for Private Endpoints" border="true":::
49+
:::image type="content" source="./media/inspect-traffic-using-azure-firewall/hub-and-spoke.png" alt-text="Dedicated Virtual Network for Private Endpoints" border="true":::
5050

5151
This scenario is the most expandable architecture to connect privately to multiple Azure services using private endpoints. A route pointing to the network address space where the private endpoints are deployed is created. This configuration reduces administrative overhead and prevents running into the limit of 400 routes.
5252

@@ -56,7 +56,7 @@ For more information on charges related to connections with peered virtual netwo
5656

5757
## Scenario 2: Hub and spoke architecture - Shared virtual network for private endpoints and virtual machines
5858

59-
:::image type="content" source="./media/inspect-traffic-use-azure-firewall/shared-spoke.png" alt-text="Private Endpoints and Virtual Machines in same Virtual Network" border="true":::
59+
:::image type="content" source="./media/inspect-traffic-using-azure-firewall/shared-spoke.png" alt-text="Private Endpoints and Virtual Machines in same Virtual Network" border="true":::
6060

6161
This scenario is implemented when:
6262

@@ -76,7 +76,7 @@ For more information on charges related to connections with peered virtual netwo
7676

7777
## Scenario 3: Single virtual network
7878

79-
:::image type="content" source="./media/inspect-traffic-use-azure-firewall/single-vnet.png" alt-text="Single virtual network" border="true":::
79+
:::image type="content" source="./media/inspect-traffic-using-azure-firewall/single-vnet.png" alt-text="Single virtual network" border="true":::
8080

8181
Use this pattern when a migration to a hub and spoke architecture isn't possible. The same considerations as in scenario 2 apply. In this scenario, virtual network peering charges don't apply.
8282

0 commit comments

Comments
 (0)