Skip to content

Commit a0b5610

Browse files
committed
updates
1 parent 21c0ae4 commit a0b5610

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

articles/private-link/network-security-perimeter-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ A network security perimeter-aware private link resource is a PaaS resource that
9797
| Event Hubs | Microsoft.EventHub/namespaces | - |
9898
| Key Vault | Microsoft.KeyVault/vaults | - |
9999
| SQL DB | Microsoft.Sql/servers | - |
100-
| Storage | Microsoft.Storage/storageAccounts | - |
100+
| [Storage](/azure/storage/common/storage-network-security) | Microsoft.Storage/storageAccounts | - |
101101
| Event Grid | Microsoft.EventGrid/topics</br>Microsoft.EventGrid/domains | - |
102102

103103
## Limitations of network security perimeter

articles/storage/common/storage-network-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ After you apply network rules, they're enforced for all requests. SAS tokens tha
8888

8989
### Network Security Perimeter (preview)
9090

91-
[Network Security Perimeter](../azure/private-link/network-security-perimeter-concepts.md) (preview) allows organizations to define a logical network isolation boundary for PaaS resources (for example, Azure Blob Storage and SQL Database) that are deployed outside their virtual networks. The feature restricts public network access to PaaS resources outside the perimeter. However, you can exempt access by using explicit access rules for public inbound and outbound traffic. By design, access to a storage account from within a Network Security Perimeter takes the highest precedence over other network access restrictions. Currently, Network Security Perimeter is in public preview for Azure Blobs, Azure Files (SMB only), Azure Tables, and Azure Queues.
91+
[Network Security Perimeter](../../private-link/network-security-perimeter-concepts.md) (preview) allows organizations to define a logical network isolation boundary for PaaS resources (for example, Azure Blob Storage and SQL Database) that are deployed outside their virtual networks. The feature restricts public network access to PaaS resources outside the perimeter. However, you can exempt access by using explicit access rules for public inbound and outbound traffic. By design, access to a storage account from within a Network Security Perimeter takes the highest precedence over other network access restrictions. Currently, Network Security Perimeter is in public preview for Azure Blobs, Azure Files (SMB only), Azure Tables, and Azure Queues.
9292

9393
#### Limitations
9494

0 commit comments

Comments
 (0)