diff --git a/srv-deps/azv-plugin-slb b/srv-deps/azv-plugin-slb
index c5d5479ecab186782c9236ff8651d6debf91905a..7c10d914ee8a23b46d85f3fd0949b85d6e23a1b4 100755
--- a/srv-deps/azv-plugin-slb
+++ b/srv-deps/azv-plugin-slb
@@ -52,7 +52,7 @@ function plugin_after_vm_creat () {
 
     if [[ $enable_outbound_rule_fix = 1 ]]; then
         # This is an unreliable trick to use NIC directly. It's from good-case ARM template dump. 
-        debugexec az network lb address-pool update -g $resgrp --lb-name $LB_NAME -n $BE_PL --vnet $vnetname --backend-addresses "[{name:${resgrp}_${vmname}VMNicipconfig${vmname}}]" || exit
+        debugexec az network lb address-pool update -g $resgrp --lb-name $LB_NAME -n $BE_PL --vnet $vnetname --backend-addresses [0].name="${resgrp}_${vmname}VMNicipconfig${vmname}" || exit
     else
         echo -e "$COLOR_RED_BLD Warning: enable_outbound_rule_fix not enabled. outbound_ports_per_vm limit won't make effect $COLOR_CLR" 1>&2
         # When a backend pool is configured by IP address, the backend instances are not secure by default and still use default outbound access.