Skip to content

Commit 6fa2e75

Browse files
committed
link
1 parent b74f693 commit 6fa2e75

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/container-registry/container-registry-firewall-access-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ If your registry is [geo-replicated](container-registry-geo-replication.md), a c
2424
## Allow access to REST and data endpoints
2525

2626
* **REST endpoint** - Allow access to the fully qualified registry login server name, `<registry-name>.azurecr.io`, or an associated IP address range
27-
* **Storage (data) endpoint** - Enable access to a [dedicated data endpoint](#configure-dedicated-data-endpoints-preview) (preview) in each region where the registry is located or replicated, `<registry-name>.<region>.data.azurecr.io`. Alternatively, and less specifically, allow access to all Azure blob storage accounts using the wildcard `*.blob.core.windows.net`, or an associated IP address range.
27+
* **Storage (data) endpoint** - Enable access to a [dedicated data endpoint](#enable-dedicated-data-endpoints-preview) (preview) in each region where the registry is located or replicated, `<registry-name>.<region>.data.azurecr.io`. Alternatively, and less specifically, allow access to all Azure blob storage accounts using the wildcard `*.blob.core.windows.net`, or an associated IP address range.
2828

2929
## Enable dedicated data endpoints (preview)
3030

0 commit comments

Comments
 (0)