Skip to content

Commit 574b1a4

Browse files
Update articles/storage/common/storage-network-security.md
Co-authored-by: Ken Downie <[email protected]>
1 parent 0fb6b46 commit 574b1a4

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/storage/common/storage-network-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ After you apply network rules, they're enforced for all requests. SAS tokens tha
9292

9393
Currently, network security perimeter is in public preview for Azure Blobs, Azure Files (REST), Azure Tables, and Azure Queues. See [Transition to a network security perimeter](../../private-link/network-security-perimeter-transition.md).
9494

95-
The list of services that have been onboarded to network security perimeter can be found [here](../../private-link/network-security-perimeter-concepts#onboarded-private-link-resources).
95+
The list of services that have been onboarded to network security perimeter can be found [here](../../private-link/network-security-perimeter-concepts.md#onboarded-private-link-resources).
9696

9797
For services that are not on this list as they have not yet been onboarded to Network Security Perimeter, if you would like to allow access you can use a subscription-based rule on the Network Security Perimeter. All resources within that subscription will then be given access to that Network Security Perimeter. For more information on adding subscription-based access rule, refer [here](/rest/api/networkmanager/nsp-access-rules/create-or-update).
9898

0 commit comments

Comments
 (0)