Skip to content

Commit 4842068

Browse files
committed
fix links
1 parent d450757 commit 4842068

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/app-service/environment/ase-multi-tenant-comparison.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ An App Service Environment is an Azure App Service feature that provides a fully
2121
|Dedicated host group|[Available](creation.md#deployment-considerations) |No |
2222
|Remote file storage|Fully dedicated to the App Service Environment |Remote file storage for the application is dedicated, but the storage is hosted on a shared file server |
2323
|Internal Load Balancer (ILB) configuration|Yes, using ILB App Service Environment variation |Yes, via private endpoint |
24-
|Planned maintenance|[Manual upgrade preference is available](maintenance.md). Maintenance is non-disruptive to your apps. |Maintenance is handled by the platform and is non-disruptive to your apps |
24+
|Planned maintenance|[Manual upgrade preference is available](how-to-upgrade-preference.md). Maintenance is non-disruptive to your apps. |Maintenance is handled by the platform and is non-disruptive to your apps |
2525

2626
## Scaling
2727

@@ -52,9 +52,9 @@ Both App Service Environment v3 and the public multi-tenant offering run on [Vir
5252
|---------|---------|---------|
5353
|Virtual network integration|Yes, App Service Environment v3 is deployed into a subnet in your virtual network by default |Supported, [must be explicitly enabled](../../app-service/networking-features.md#virtual-network-integration)|
5454
|Private endpoint support|Yes, [must be explicitly enabled on the App Service Environment](networking.md#private-endpoint) |Yes, [must be explicitly enabled](../../app-service/networking-features.md#private-endpoint) |
55-
|IP access restrictions for inbound traffic|Yes, [must be explicitly enabled](networking.md#ip-access-restrictions) |Yes, [must be explicitly enabled](../../app-service/networking-features.md#ip-access-restrictions) |
55+
|IP access restrictions for inbound traffic|Yes, [must be explicitly enabled](../../app-service/networking-features.md#access-restrictions) |Yes, [must be explicitly enabled](../../app-service/networking-features.md#access-restrictions) |
5656
|Network security group (NSG) integration|Supports inbound and outbound traffic control |Can use NSG for inbound traffic control using the subnet that sourced the IP of a private endpoint (Note: requires private endpoints). Supports outbound network restrictions with NSG on the virtual network integration subnet. |
57-
|UDR integration|Supports outbound traffic routing, [must be explicitly enabled](networking.md#user-defined-routing) |Supports outbound traffic routing, [must be explicitly enabled](../../app-service/networking-features.md#user-defined-routing) |
57+
|UDR integration|Supports outbound traffic routing, [must be explicitly enabled](networking.md#network-routing) |Supports outbound traffic routing, [must be explicitly enabled](../../app-service/networking-features.md#network-secure-outbound-traffic-azure-firewall) |
5858
|Route outbound traffic over virtual network|Yes, all apps are in the same subnet and all outbound traffic is routed through the virtual network by default |Supported |
5959
|[Block inbound traffic to App Service functionality hosted on non-HTTP ports](../../app-service/networking-features.md#app-service-ports)|Supported, NSG can be used to block inbound traffic to non-HTTP ports |Not supported. In some cases (FTP and remote debugging), functionality can be explicitly disabled on a per-application basis. However, inbound network traffic cannot be blocked using NSGs since the listed ports are owned by the underlying App Service platform hosting infrastructure. |
6060

0 commit comments

Comments
 (0)