Skip to content

Commit 5a8d85b

Browse files
authored
Merge pull request #23251 from MicrosoftDocs/VanMSFT-patch-1
Update network-access-controls-overview.md
2 parents 34f4587 + cbcf564 commit 5a8d85b

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

azure-sql/database/network-access-controls-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.topic: conceptual
1313
author: rohitnayakmsft
1414
ms.author: rohitna
1515
ms.reviewer: wiassaf, vanto, mathoma
16-
ms.date: 03/09/2020
16+
ms.date: 07/18/2022
1717
---
1818

1919
# Azure SQL Database and Azure Synapse Analytics network access controls
@@ -79,7 +79,7 @@ PS C:\> $sql.Properties.AddressPrefixes
7979
> [!TIP]
8080
> Get-AzNetworkServiceTag returns the global range for SQL Service Tag despite specifying the Location parameter. Be sure to filter it to the region that hosts the Hub database used by your sync group
8181
82-
Note that the output of the PowerShell script is in Classless Inter-Domain Routing (CIDR) notation. This needs to be converted to a format of Start and End IP address using [Get-IPrangeStartEnd.ps1](https://gallery.technet.microsoft.com/scriptcenter/Start-and-End-IP-addresses-bcccc3a9) like this:
82+
Note that the output of the PowerShell script is in Classless Inter-Domain Routing (CIDR) notation. This needs to be converted to a format of Start and End IP address using [Get-IPrangeStartEnd.ps1](https://www.sqltechnet.com/2020/12/powershell-set-azure-sql-firewall-for.html) like this:
8383

8484
```powershell
8585
PS C:\> Get-IPrangeStartEnd -ip 52.229.17.93 -cidr 26

0 commit comments

Comments
 (0)