Skip to content

Commit 13556ae

Browse files
authored
Specify data type matching
Since this procedure requires data types of values to match the definition, added notes. Specifically, the rule must be nvarchar. A varchar relying on implicit conversion will not work.
1 parent f3f691a commit 13556ae

1 file changed

Lines changed: 4 additions & 2 deletions

File tree

docs/relational-databases/system-stored-procedures/sp-set-firewall-rule-azure-sql-database.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ sp_set_firewall_rule [@name =] 'name',
4141

4242
|Name|Datatype|Description|
4343
|----------|--------------|-----------------|
44-
|[@name =] 'name'|**NVARCHAR(128)**|The name used to describe and distinguish the server-level firewall setting.|
44+
|[@name =] 'name'|**NVARCHAR(128)**|The name used to describe and distinguish the server-level firewall setting. The value passed in must match this parameter's data type (NVARCHAR)|
4545
|[@start_ip_address =] 'start_ip_address'|**VARCHAR(50)**|The lowest IP address in the range of the server-level firewall setting. IP addresses equal to or greater than this can attempt to connect to the [!INCLUDE[ssSDS](../../includes/sssds-md.md)] server. The lowest possible IP address is `0.0.0.0`.|
4646
|[@end_ip_address =] 'end_ip_address'|**VARCHAR(50)**|The highest IP address in the range of the server-level firewall setting. IP addresses equal to or less than this can attempt to connect to the [!INCLUDE[ssSDS](../../includes/sssds-md.md)] server. The highest possible IP address is `255.255.255.255`.<br /><br /> Note: Azure connection attempts are allowed when both this field and the *start_ip_address* field equals `0.0.0.0`.|
4747

@@ -51,6 +51,8 @@ sp_set_firewall_rule [@name =] 'name',
5151
When you add a server-level firewall setting where the beginning and ending IP addresses are equal to `0.0.0.0`, you enable access to your [!INCLUDE[ssSDS](../../includes/sssds-md.md)] server from Azure. Provide a value to the *name* parameter that will help you remember what the server-level firewall setting is for.
5252

5353
In [!INCLUDE[ssSDS](../../includes/sssds-md.md)], login data required to authenticate a connection and server-level firewall rules are temporarily cached in each database. This cache is periodically refreshed. To force a refresh of the authentication cache and make sure that a database has the latest version of the logins table, execute [DBCC FLUSHAUTHCACHE &#40;Transact-SQL&#41;](../../t-sql/database-console-commands/dbcc-flushauthcache-transact-sql.md).
54+
55+
This is an extended stored procedure, so the data type of the value passed in for each parameter must match the parameter definition.
5456

5557
## Permissions
5658
Only the server-level principal login created by the provisioning process or an Azure Active Directory principal assigned as admin can create or modify server level firewall rules. The user must be connected to the master database to execute sp_set_firewall_rule.
@@ -78,4 +80,4 @@ exec sp_set_firewall_rule N'Example setting 1', '0.0.0.2', '0.0.0.4';
7880
## See Also
7981
[Azure SQL Database Firewall](/azure/azure-sql/database/firewall-configure)
8082
[How to: Configure Firewall Settings (Azure SQL Database)](/azure/azure-sql/database/firewall-configure)
81-
[sys.firewall_rules &#40;Azure SQL Database&#41;](../../relational-databases/system-catalog-views/sys-firewall-rules-azure-sql-database.md)
83+
[sys.firewall_rules &#40;Azure SQL Database&#41;](../../relational-databases/system-catalog-views/sys-firewall-rules-azure-sql-database.md)

0 commit comments

Comments
 (0)