Skip to content

Commit d193a2d

Browse files
Merge pull request #227054 from BeatrizSilv/patch-10
Update private-link-inspection-secure-virtual-hub.md
2 parents 68565ae + 52fc403 commit d193a2d

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/firewall-manager/private-link-inspection-secure-virtual-hub.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ A secured virtual hub is managed by Microsoft and it cannot be linked to a [Priv
3232

3333
SQL FQDN filtering is supported in [proxy-mode](/azure/azure-sql/database/connectivity-architecture#connection-policy) only (port 1433). *Proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using FQDN in firewall network rules.
3434

35-
## Filter traffic network or application rules in Azure Firewall
35+
## Filter traffic using network or application rules in Azure Firewall
3636

3737
The following steps enable Azure Firewall to filter traffic using either network rules (FQDN or IP address-based) or application rules:
3838

@@ -164,6 +164,6 @@ In most cases, these problems are caused by one of the following issues:
164164

165165
- [Use Azure Firewall to inspect traffic destined to a private endpoint](../private-link/inspect-traffic-with-azure-firewall.md)
166166

167-
[private-endpoint-overview]: ../private-link/private-endpoint-overview.md
167+
[private-endpoint-overview]: ../private-link/private-endpoint-overview.md#limitations
168168
[firewall-snat-private-ranges]: ../firewall/snat-private-range.md
169169
[network-policies-overview]: ../private-link/disable-private-endpoint-network-policy.md

0 commit comments

Comments
 (0)