Skip to content

Commit f9e43a5

Browse files
Update articles/storage/common/storage-network-security.md
Co-authored-by: Norm Estabrook <[email protected]>
1 parent 4395383 commit f9e43a5

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/storage/common/storage-network-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ After you apply network rules, they're enforced for all requests. SAS tokens tha
9090

9191
[Network Security Perimeter](../../private-link/network-security-perimeter-concepts.md) (preview) allows organizations to define a logical network isolation boundary for PaaS resources (for example, Azure Blob Storage and SQL Database) that are deployed outside their virtual networks. The feature restricts public network access to PaaS resources outside the perimeter. However, you can exempt access by using explicit access rules for public inbound and outbound traffic. By design, access to a storage account from within a Network Security Perimeter takes the highest precedence over other network access restrictions.
9292

93-
Currently, Network Security Perimeter is in public preview for Azure Blobs, Azure Files (REST), Azure Tables, and Azure Queues. See [Transition to a Network Security Perimeter](../../private-link/network-security-perimeter-transition.md).
93+
Currently, network security perimeter is in public preview for Azure Blobs, Azure Files (REST), Azure Tables, and Azure Queues. See [Transition to a network security perimeter](../../private-link/network-security-perimeter-transition.md).
9494

9595
The list of services that have been onboarded to NSP can be found [here](../../private-link/network-security-perimeter-concepts#onboarded-private-link-resources).
9696

0 commit comments

Comments
 (0)