Skip to content

Commit 07c567c

Browse files
authored
Removed additional comma and corrected spelling mistake
1 parent 45ef0f5 commit 07c567c

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

azure-stack/operator/app-service-release-notes-2025r1.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -257,7 +257,7 @@ Review the [known issues for update](#known-issues-update) and take any action p
257257

258258
- Worker instances are unable to reach file server when App Service is deployed in an existing virtual network. The file server is only available on the private network, as called out in the Azure App Service on Azure Stack deployment documentation.
259259

260-
If the App Service Resource Provider was deployed into an existing virtual network, and an use internal IP address to connect to your file server. You must add an outbound security rule, enabling SMB (Server Message Block) traffic between the worker subnet, and the file server. Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
260+
If the App Service Resource Provider was deployed into an existing virtual network and and use internal IP address to connect to your file server. You must add an outbound security rule, enabling SMB (Server Message Block) traffic between the worker subnet, and the file server. Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
261261
- Source: Any
262262
- Source port range: *
263263
- Destination: IP Addresses
@@ -268,7 +268,7 @@ Review the [known issues for update](#known-issues-update) and take any action p
268268
- Priority: 700
269269
- Name: Outbound_Allow_SMB445
270270

271-
- To remove latency when worker instances are communicating with the file server, we also advise adding the following rule to the Worker NSG (Network Security Group). This rule, allows outbound LDAP (Lightweight Directory Access Protocol) and Kerberos traffic to your Active Directory Controllers when securing the file server using Active Directory. For example, if you used the Quickstart template to deploy a HA File Server and SQL Server.
271+
- To remove latency when worker instances are communicating with the file server, we also advise adding the following rule to the Worker NSG (Network Security Group). This rule allows outbound LDAP (Lightweight Directory Access Protocol) and Kerberos traffic to your Active Directory Controllers when securing the file server using Active Directory. For example, if you used the Quickstart template to deploy a HA File Server and SQL Server.
272272

273273
Go to the WorkersNsg in the Admin Portal and add an outbound security rule with the following properties:
274274
- Source: Any

0 commit comments

Comments
 (0)