Skip to content

Commit 66646cb

Browse files
committed
Fix bookmark-not-found warning - remove invalid anchor from features-by-sku.md link
1 parent 49bad20 commit 66646cb

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

articles/private-link/inspect-traffic-with-azure-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Azure Firewall filters traffic using either:
3838

3939
* [FQDN in network rules](../firewall/fqdn-filtering-network-rules.md) for TCP and UDP protocols
4040

41-
* [FQDN in application rules](../firewall/features-by-sku.md#application-fqdn-filtering-rules) for HTTP, HTTPS, and MSSQL.
41+
* [FQDN in application rules](../firewall/features-by-sku.md) for HTTP, HTTPS, and MSSQL.
4242

4343
> [!IMPORTANT]
4444
> The use of application rules over network rules is recommended when inspecting traffic destined to private endpoints in order to maintain flow symmetry. Application rules are preferred over network rules to inspect traffic destined to private endpoints because Azure Firewall always SNATs traffic with application rules. If network rules are used, or an NVA is used instead of Azure Firewall, SNAT must be configured for traffic destined to private endpoints in order to maintain flow symmetry.

0 commit comments

Comments
 (0)