Skip to content

Commit 4be2e22

Browse files
committed
[Docs] Fix anchors with links or badges
1 parent 20267cb commit 4be2e22

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/configure-warp/warp-sessions.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ sidebar:
77

88
import { Render, Badge } from "~/components";
99

10-
Cloudflare Zero Trust enforces WARP client reauthentication on a per-application basis, unlike legacy VPNs which treat it as a global setting. You can configure WARP session timeouts for your [Access applications](#configure-warp-sessions-in-access-) or as part of your [Gateway policies](#configure-warp-sessions-in-gateway).
10+
Cloudflare Zero Trust enforces WARP client reauthentication on a per-application basis, unlike legacy VPNs which treat it as a global setting. You can configure WARP session timeouts for your [Access applications](#configure-warp-sessions-in-access) or as part of your [Gateway policies](#configure-warp-sessions-in-gateway).
1111

1212
<Render file="warp/warp-sessions-intro" />
1313

src/content/docs/learning-paths/secure-internet-traffic/connect-devices-networks/choose-on-ramp.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Cloudflare Browser Isolation runs a headless, Chromium-based browser for your us
3838

3939
## Network on-ramps
4040

41-
The primary ways to source multi-device or network traffic to Cloudflare Gateway are via Magic WAN using GRE or IPsec tunnels, the [WARP Connector](#warp-connector-) as a software-defined all-ports traffic proxy, or via upstream DNS for a whole network using [DNS filtering locations](#dns-filtering-locations).
41+
The primary ways to source multi-device or network traffic to Cloudflare Gateway are via Magic WAN using GRE or IPsec tunnels, the [WARP Connector](#warp-connector) as a software-defined all-ports traffic proxy, or via upstream DNS for a whole network using [DNS filtering locations](#dns-filtering-locations).
4242

4343
### Magic WAN
4444

src/content/docs/waf/analytics/security-analytics.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ The main chart displays the following data for the selected time frame, accordin
120120

121121
Security Analytics shows request logs for the selected time frame and applied filters, along with detailed information and security analyses of those requests.
122122

123-
By default, Security Analytics uses sampled logs for the logs table. If you are subscribed to [Log Explorer](/logs/log-explorer/), you may also have access to [raw logs](#raw-logs-).
123+
By default, Security Analytics uses sampled logs for the logs table. If you are subscribed to [Log Explorer](/logs/log-explorer/), you may also have access to [raw logs](#raw-logs).
124124

125125
#### Sampled logs
126126

0 commit comments

Comments
 (0)