Skip to content

Commit e70afb6

Browse files
authored
Improved the correctness score
Improved the correctness score
1 parent ffbd6a3 commit e70afb6

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/hdinsight/hdinsight-restrict-outbound-traffic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Create an application rule collection that allows the cluster to send and receiv
4848

4949
:::image type="content" source="./media/hdinsight-restrict-outbound-traffic/hdinsight-restrict-outbound-traffic-add-app-rule-collection.png" alt-text="Title: Add application rule collection.":::
5050

51-
1. On the **Add application rule collection** screen, provide the following information:
51+
1. On the **`Add application rule collection`** screen, provide the following information:
5252

5353
**Top section**
5454

@@ -110,7 +110,7 @@ Create the network rules to correctly configure your HDInsight cluster.
110110

111111
Create a route table with the following entries:
112112

113-
* All IP addresses from [Health and management services](../hdinsight/hdinsight-management-ip-addresses.md#health-and-management-services-all-regions) with a next hop type of **Internet**. It should include 4 IPs of the generic regions as well as 2 IPs for your specific region. This rule is only needed if the ResourceProviderConnection is set to *Inbound*. If the ResourceProviderConnection is set to *Outbound* then these IPs are'nt needed in the UDR.
113+
* All IP addresses from [Health and management services](../hdinsight/hdinsight-management-ip-addresses.md#health-and-management-services-all-regions) with a next hop type of **Internet**. It should include 4 IPs of the generic regions as well as 2 IPs for your specific region. This rule is only needed if the ResourceProviderConnection is set to *Inbound*. If the ResourceProviderConnection is set to *Outbound* then these IPs aren't needed in the UDR.
114114

115115
* One Virtual Appliance route for IP address 0.0.0.0/0 with the next hop being your Azure Firewall private IP address.
116116

0 commit comments

Comments
 (0)