Skip to content

Latest commit

 

History

History
60 lines (52 loc) · 4.44 KB

File metadata and controls

60 lines (52 loc) · 4.44 KB

title: "sys.database_firewall_rules (Azure SQL Database) | Microsoft Docs" ms.custom: "" ms.date: "03/14/2017" ms.prod: "" ms.prod_service: "sql-database" ms.reviewer: "" ms.service: "sql-database" ms.component: "system-catalog-views" ms.suite: "sql" ms.technology: system-objects ms.tgt_pltfrm: "" ms.topic: "language-reference" f1_keywords:

  • "sys.database_firewall_rules_TSQL"
  • "database_firewall_rules_TSQL"
  • "sys.database_firewall_rules"
  • "database_firewall_rules" dev_langs:
  • "TSQL" helpviewer_keywords:
  • "database_firewall_rules"
  • "sys.database_firewall_rules" ms.assetid: 2e821593-3b9f-43d6-a99b-1ceffe177faf author: VanMSFT ms.author: vanto manager: craigg monikerRange: "= azuresqldb-current || = sqlallproducts-allversions"

sys.database_firewall_rules (Azure SQL Database)

[!INCLUDEtsql-appliesto-xxxxxx-asdb-xxxx-xxx-md]

Returns information about the database-level firewall settings associated with your [!INCLUDEmsCoName] [!INCLUDEssSDSfull]. Database-level firewall settings are particularly useful when using contained database users. For more information, see Contained Database Users - Making Your Database Portable.

The sys.database_firewall_rules view contains the following columns:

Column name Data type Description
id INTEGER The identifier of the database-level firewall setting.
name NVARCHAR(128) The name you chose to describe and distinguish the database-level firewall setting.
start_ip_address VARCHAR(50) The lowest IP address in the range of the database-level firewall setting. IP addresses equal to or greater than this can attempt to connect to the [!INCLUDEssSDS] instance. The lowest possible IP address is 0.0.0.0.
end_ip_address VARCHAR(50) The highest IP address in the range of the firewall setting. IP addresses equal to or less than this can attempt to connect to the [!INCLUDEssSDS] instance. The highest possible IP address is 255.255.255.255.

Note: Windows Azure connection attempts are allowed when both this field and the start_ip_address field equals 0.0.0.0.
create_date DATETIME UTC date and time when the database-level firewall setting was created.
modify_date DATETIME UTC date and time when the database-level firewall setting was last modified.

Remarks

To remove a database firewall rule, use sp_delete_database_firewall_rule (Azure SQL Database). To set a firewall rule for all of [!INCLUDEssSDS], see sp_set_firewall_rule (Azure SQL Database). To return information about existing database firewall rules, query sys.database_firewall_rules (Azure SQL Database).

Permissions

This view is available in the master database and in each user database. Read-only access to this view is available to all users with permission to connect to the database.

See Also

sp_set_firewall_rule (Azure SQL Database)
sys.database_firewall_rules (Azure SQL Database)
sp_delete_database_firewall_rule (Azure SQL Database)
Configure a Windows Firewall for Database Engine Access
Configure a Firewall for FILESTREAM Access
Configure a Firewall for Report Server Access