Skip to content

Commit 5f4122d

Browse files
authored
Merge pull request #6764 from way0utwest/patch-34
Specify data type matching
2 parents 75c7378 + 0541c13 commit 5f4122d

1 file changed

Lines changed: 4 additions & 2 deletions

File tree

docs/relational-databases/system-stored-procedures/sp-set-firewall-rule-azure-sql-database.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ sp_set_firewall_rule [@name =] 'name',
4141

4242
|Name|Datatype|Description|
4343
|----------|--------------|-----------------|
44-
|[@name =] 'name'|**NVARCHAR(128)**|The name used to describe and distinguish the server-level firewall setting.|
44+
|[@name =] 'name'|**NVARCHAR(128)**|The name used to describe and distinguish the server-level firewall setting. The value passed in must match this parameter's data type (NVARCHAR).|
4545
|[@start_ip_address =] 'start_ip_address'|**VARCHAR(50)**|The lowest IP address in the range of the server-level firewall setting. IP addresses equal to or greater than this can attempt to connect to the [!INCLUDE[ssSDS](../../includes/sssds-md.md)] server. The lowest possible IP address is `0.0.0.0`.|
4646
|[@end_ip_address =] 'end_ip_address'|**VARCHAR(50)**|The highest IP address in the range of the server-level firewall setting. IP addresses equal to or less than this can attempt to connect to the [!INCLUDE[ssSDS](../../includes/sssds-md.md)] server. The highest possible IP address is `255.255.255.255`.<br /><br /> Note: Azure connection attempts are allowed when both this field and the *start_ip_address* field equals `0.0.0.0`.|
4747

@@ -51,6 +51,8 @@ sp_set_firewall_rule [@name =] 'name',
5151
When you add a server-level firewall setting where the beginning and ending IP addresses are equal to `0.0.0.0`, you enable access to your [!INCLUDE[ssSDS](../../includes/sssds-md.md)] server from Azure. Provide a value to the *name* parameter that will help you remember what the server-level firewall setting is for.
5252

5353
In [!INCLUDE[ssSDS](../../includes/sssds-md.md)], login data required to authenticate a connection and server-level firewall rules are temporarily cached in each database. This cache is periodically refreshed. To force a refresh of the authentication cache and make sure that a database has the latest version of the logins table, execute [DBCC FLUSHAUTHCACHE &#40;Transact-SQL&#41;](../../t-sql/database-console-commands/dbcc-flushauthcache-transact-sql.md).
54+
55+
This is an extended stored procedure, so the data type of the value passed in for each parameter must match the parameter definition.
5456

5557
## Permissions
5658
Only the server-level principal login created by the provisioning process or an Azure Active Directory principal assigned as admin can create or modify server level firewall rules. The user must be connected to the master database to execute sp_set_firewall_rule.
@@ -78,4 +80,4 @@ exec sp_set_firewall_rule N'Example setting 1', '0.0.0.2', '0.0.0.4';
7880
## See Also
7981
[Azure SQL Database Firewall](/azure/azure-sql/database/firewall-configure)
8082
[How to: Configure Firewall Settings (Azure SQL Database)](/azure/azure-sql/database/firewall-configure)
81-
[sys.firewall_rules &#40;Azure SQL Database&#41;](../../relational-databases/system-catalog-views/sys-firewall-rules-azure-sql-database.md)
83+
[sys.firewall_rules &#40;Azure SQL Database&#41;](../../relational-databases/system-catalog-views/sys-firewall-rules-azure-sql-database.md)

0 commit comments

Comments
 (0)