You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -41,9 +41,9 @@ Servers in SQL Database and Azure Synapse support the following three options fo
41
41
-**Redirect (recommended):** Clients establish connections directly to the node hosting the database, leading to reduced latency and improved throughput. For connections to use this mode, clients need to:
42
42
- Allow outbound communication from the client to all Azure SQL IP addresses in the region on ports in the range of 11000 to 11999. Use the Service Tags for SQL to make this easier to manage.
43
43
- Allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
44
-
44
+
- When using the Redirect connection policy, refer to the [Azure IP Ranges and Service Tags – Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519) for a list of your region's IP addresses to allow.
45
45
-**Proxy:** In this mode, all connections are proxied via the Azure SQL Database gateways, leading to increased latency and reduced throughput. For connections to use this mode, clients need to allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
46
-
46
+
- When using the Proxy connection policy, refer to the [Gateway IP addresses](#gateway-ip-addresses) list later in this article for your region's IP addresses to allow.
47
47
-**Default:** This is the connection policy in effect on all servers after creation unless you explicitly alter the connection policy to either `Proxy` or `Redirect`. The default policy is`Redirect` for all client connections originating inside of Azure (for example, from an Azure Virtual Machine) and `Proxy`for all client connections originating outside (for example, connections from your local workstation).
48
48
49
49
We highly recommend the `Redirect` connection policy over the `Proxy` connection policy for the lowest latency and highest throughput. However, you will need to meet the additional requirements for allowing network traffic as outlined above. If the client is an Azure Virtual Machine, you can accomplish this using Network Security Groups (NSG) with [service tags](/azure/virtual-network/network-security-groups-overview#service-tags). If the client is connecting from a workstation on-premises then you may need to work with your network admin to allow network traffic through your corporate firewall.
Copy file name to clipboardExpand all lines: azure-sql/database/connectivity-settings.md
+68-23Lines changed: 68 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
10
10
author: rohitnayakmsft
11
11
ms.author: rohitna
12
12
ms.reviewer: wiassaf, mathoma, vanto
13
-
ms.date: 08/03/2021
13
+
ms.date: 07/14/2022
14
14
ms.custom:
15
15
- "devx-track-azurepowershell"
16
16
- "devx-track-azurecli"
@@ -23,21 +23,20 @@ ms.devlang:
23
23
24
24
This article introduces settings that control connectivity to the server for Azure SQL Database and [dedicated SQL pool (formerly SQL DW)](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is) in Azure Synapse Analytics. These settings apply to all SQL Database and dedicated SQL pool (formerly SQL DW) databases associated with the server.
25
25
26
-
> [!IMPORTANT]
27
-
> This article doesn't apply to Azure SQL Managed Instance. This article also does not apply to dedicated SQL pools in Azure Synapse Analytics workspaces. See [Azure Synapse Analytics IP firewall rules](/azure/synapse-analytics/security/synapse-workspace-ip-firewall) for guidance on how to configure IP firewall rules for Azure Synapse Analytics with workspaces.
28
26
29
-
The connectivity settings are accessible from the **Firewalls and virtual networks** screen as shown in the following screenshot:
27
+
You can change these settings from the networking tab of your [logical server](logical-servers.md):
30
28
31
-
:::image type="content" source="media/single-database-create-quickstart/manage-connectivity-settings.png" alt-text="Screenshot of the Firewalls and virtual networks settings in Azure portal for SQL server":::
29
+
:::image type="content" source="media/connectivity-settings/manage-connectivity-settings.png" alt-text="Screenshot of the Firewalls and virtual networks settings in Azure portal for SQL server.":::
30
+
31
+
> [!IMPORTANT]
32
+
> This article doesn't apply to Azure SQL Managed Instance. This article also does not apply to dedicated SQL pools in Azure Synapse Analytics workspaces. See [Azure Synapse Analytics IP firewall rules](/azure/synapse-analytics/security/synapse-workspace-ip-firewall) for guidance on how to configure IP firewall rules for Azure Synapse Analytics with workspaces.
32
33
33
-
> [!NOTE]
34
-
> These settings take effect immediately after they're applied. Your customers might experience connection loss if they don't meet the requirements for each setting.
35
34
36
35
## Deny public network access
37
36
38
-
The default for this setting is **No** so that customers can connect by using either public endpoints (with IP-based server- level firewall rules or with virtual-network firewall rules) or private endpoints (by using Azure Private Link), as outlined in the [network access overview](network-access-controls-overview.md).
37
+
The default for the **Connectivity method**setting is **No access** so that customers can connect by using either public endpoints (with IP-based server- level firewall rules or with virtual-network firewall rules) or private endpoints (by using Azure Private Link), as outlined in the [network access overview](network-access-controls-overview.md).
39
38
40
-
When **Deny public network access** is set to **Yes**, only connections via private endpoints are allowed. All connections via public endpoints will be denied with an error message similar to:
39
+
When **Connectivity method** is set to **No access**, only connections via private endpoints are allowed. All connections via public endpoints will be denied with an error message similar to:
41
40
42
41
```output
43
42
Error 47073
@@ -46,16 +45,37 @@ The public network interface on this server is not accessible.
46
45
To connect to this server, use the Private Endpoint from inside your virtual network.
47
46
```
48
47
49
-
When **Deny public network access** is set to **Yes**, any attempts to add, remove or edit any firewall rules will be denied with an error message similar to:
48
+
When **Connectivity method** is set to **No access**, any attempts to add, remove or edit any firewall rules will be denied with an error message similar to:
50
49
51
50
```output
52
51
Error 42101
53
52
Unable to create or modify firewall rules when public network interface for the server is disabled.
54
53
To manage server or database level firewall rules, please enable the public network interface.
55
54
```
56
-
Ensure that **Deny public network access** is set to **No** to be able to add, remove or edit any firewall rules for Azure Sql
57
55
58
-
## Change public network access via PowerShell
56
+
Ensure that **Connectivity method** is set to **Public endpoint** or **Private endpoint** to be able to add, remove or edit any firewall rules for Azure SQL Database and Azure Synapse Analytics.
57
+
58
+
## Change public network access
59
+
60
+
It's possible to change the public network access via the Azure portal, Azure PowerShell, and the Azure CLI.
61
+
62
+
### [Portal](#tab/azure-portal)
63
+
64
+
To enable public network access for the logical server hosting your databases, go to the **Networking page** in the [Azure portal](https://portal.azure.com), choose the **Public access** tab, and then set the **Public network access** to **Select networks**.
65
+
66
+
67
+
From this page, you can add a virtual network rule, as well as configure firewall rules for your public endpoint.
68
+
69
+
Choose the **Private access** tab to configure a [private endpoint](private-endpoint-overview.md).
70
+
71
+
72
+
> [!NOTE]
73
+
> These settings take effect immediately after they're applied. Your customers might experience connection loss if they don't meet the requirements for each setting.
74
+
75
+
### [PowerShell](#tab/azure-powershell)
76
+
77
+
It's possible to change public network access by using Azure PowerShell.
78
+
59
79
60
80
> [!IMPORTANT]
61
81
> Azure SQL Database still supports the PowerShell Azure Resource Manager module, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
It's possible to change the public network settings by using the Azure CLI.
76
98
77
99
> [!IMPORTANT]
78
100
> All scripts in this section require the [Azure CLI](/cli/azure/install-azure-cli).
79
101
80
-
### Azure CLI in a Bash shell
81
-
82
102
The following CLI script shows how to change the **Public Network Access** setting in a Bash shell:
83
103
84
104
```azurecli-interactive
@@ -90,9 +110,11 @@ az sql server show -n sql-server-name -g sql-server-group --query "publicNetwork
90
110
az sql server update -n sql-server-name -g sql-server-group --set publicNetworkAccess="Disabled"
91
111
```
92
112
113
+
---
114
+
93
115
## Minimal TLS version
94
116
95
-
The minimal [Transport Layer Security (TLS)](https://support.microsoft.com/help/3135244/tls-1-2-support-for-microsoft-sql-server) version setting allows customers to choose which version of TLS their SQL database uses.
117
+
The minimal [Transport Layer Security (TLS)](https://support.microsoft.com/help/3135244/tls-1-2-support-for-microsoft-sql-server) version setting allows customers to choose which version of TLS their SQL database uses. It's possible to change the minimum TLS version by using the Azure portal, Azure PowerShell, and the Azure CLI.
96
118
97
119
Currently, we support TLS 1.0, 1.1, and 1.2. Setting a minimal TLS version ensures that newer TLS versions are supported. For example, choosing a TLS version 1.1 means only connections with TLS 1.1 and 1.2 are accepted, and connections with TLS 1.0 are rejected. After you test to confirm that your applications support it, we recommend setting the minimal TLS version to 1.2. This version includes fixes for vulnerabilities in previous versions and is the highest version of TLS that's supported in Azure SQL Database.
98
120
@@ -110,11 +132,15 @@ Error 47072
110
132
Login failed with invalid TLS version
111
133
```
112
134
113
-
##Set the minimal TLS version in Azure portal
135
+
### [Portal](#tab/azure-portal)
114
136
115
-
In the [Azure portal](https://portal.azure.com), go to your **SQL server** resource. Under the **Security** settings, select **Firewalls and virtual networks**. Select the **Minimum TLS Version** desired for all SQL Databases associated with the server, and select **Save**.
137
+
In the [Azure portal](https://portal.azure.com), go to your **SQL server** resource. Under the **Security** settings, select **Networking** and then choose the **Connectivity** tab. Select the **Minimum TLS Version** desired for all databases associated with the server, and select **Save**.
116
138
117
-
## Set the minimal TLS version via PowerShell
139
+
:::image type="content" source="media/connectivity-settings/minimal-tls-version.png" alt-text="Screenshot of the Connectivity tab of the Networking settings for your logical server, minimal TLS version drop-down selected." lightbox="media/connectivity-settings/minimal-tls-version.png":::
140
+
141
+
### [PowerShell](#tab/azure-powershell)
142
+
143
+
It's possible to change the minimum TLS version by using Azure PowerShell.
118
144
119
145
> [!IMPORTANT]
120
146
> Azure SQL Database still supports the PowerShell Azure Resource Manager module, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
It's possible to change the minimum TLS settings by using the Azure CLI.
135
163
136
164
> [!IMPORTANT]
137
165
> All scripts in this section require the [Azure CLI](/cli/azure/install-azure-cli).
138
166
139
-
### Azure CLI in a Bash shell
140
167
141
168
The following CLI script shows how to change the **Minimal TLS Version** setting in a Bash shell:
142
169
@@ -148,11 +175,25 @@ az sql server show -n sql-server-name -g sql-server-group --query "minimalTlsVer
148
175
az sql server update -n sql-server-name -g sql-server-group --set minimalTlsVersion="1.2"
149
176
```
150
177
178
+
---
179
+
151
180
## Change the connection policy
152
181
153
182
[Connection policy](connectivity-architecture.md#connection-policy) determines how customers connect to Azure SQL Database.
154
183
155
-
## Change the connection policy via PowerShell
184
+
It's possible to change the connection policy by using the Azure portal, Azure PowerShell, and the Azure CLI.
185
+
186
+
### [Portal](#tab/azure-portal)
187
+
188
+
It's possible to change your connection policy for your logical server by using the Azure portal.
189
+
190
+
In the [Azure portal](https://portal.azure.com), go to your **SQL server** resource. Under the **Security** settings, select **Networking** and then choose the **Connectivity** tab. Choose the desired connection policy, and select **Save**.
191
+
192
+
:::image type="content" source="media/connectivity-settings/change-connection-policy.png" alt-text="Screenshot of the Connectivity tab of the Networking page, Connection policy selected.":::
193
+
194
+
### [PowerShell](#tab/azure-powershell)
195
+
196
+
It's possible to change the connection policy for your logical server by using Azure PowerShell.
156
197
157
198
> [!IMPORTANT]
158
199
> Azure SQL Database still supports the PowerShell Azure Resource Manager module, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
Copy file name to clipboardExpand all lines: azure-sql/database/disaster-recovery-guidance.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,10 +108,10 @@ For more information about database alert rules, see [Receive Alert Notification
108
108
109
109
### Enable auditing
110
110
111
-
If auditing is required to access your database, you need to enable Auditing after the database recovery. For more information, see [Database auditing](/azure/azure-sql/database/auditing-overview).
111
+
If auditing is required to access your database, you need to enable Auditing after the database recovery. For more information, see [Database auditing](./auditing-overview.md).
112
112
113
113
## Next steps
114
114
115
115
- To learn about Azure SQL Database automated backups, see [SQL Database automated backups](automated-backups-overview.md)
116
116
- To learn about business continuity design and recovery scenarios, see [Continuity scenarios](business-continuity-high-availability-disaster-recover-hadr-overview.md)
117
-
- To learn about using automated backups for recovery, see [restore a database from the service-initiated backups](recovery-using-backups.md)
117
+
- To learn about using automated backups for recovery, see [restore a database from the service-initiated backups](recovery-using-backups.md)
Copy file name to clipboardExpand all lines: azure-sql/database/doc-changes-updates-release-notes-whats-new.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -123,10 +123,10 @@ Learn about significant changes to the Azure SQL Database documentation.
123
123
|**Azure AD-only authentication**| It's now possible to restrict authentication to your Azure SQL Database to Azure Active Directory users only. This feature is currently in preview. To learn more, see [Azure AD-only authentication](authentication-azure-ad-only-authentication.md). |
124
124
|**Query store hints**| It's now possible to use query hints to optimize your query execution via the OPTION clause. This feature is currently in preview. To learn more, see [Query store hints](/sql/relational-databases/performance/query-store-hints?view=azuresqldb-current&preserve-view=true). |
125
125
|**Change data capture**| Using change data capture (CDC) with Azure SQL Database is now in preview. To learn more, see [Change data capture](/sql/relational-databases/track-changes/about-change-data-capture-sql-server). |
126
-
|**SQL Database ledger**| SQL Database ledger is in preview, and introduces the ability to cryptographically attest to other parties, such as auditors or other business parties, that your data hasn't been tampered with. To learn more, see [Ledger](ledger-overview.md). |
126
+
|**SQL Database ledger**| SQL Database ledger is in preview, and introduces the ability to cryptographically attest to other parties, such as auditors or other business parties, that your data hasn't been tampered with. To learn more, see [Ledger](/sql/relational-databases/security/ledger/ledger-overview). |
127
127
|**Maintenance window**| The maintenance window feature allows you to configure a maintenance schedule for your Azure SQL Database, currently in preview. To learn more, see [maintenance window](maintenance-window.md).|
128
128
|**SQL insights**| SQL insights is a comprehensive solution for monitoring any product in the Azure SQL family. SQL insights uses dynamic management views to expose the data you need to monitor health, diagnose problems, and tune performance. To learn more, see [SQL insights](/azure/azure-monitor/insights/sql-insights-overview). |
129
129
130
130
## Contribute to content
131
131
132
-
To contribute to the Azure SQL documentation, see the [Docs contributor guide](/contribute/).
132
+
To contribute to the Azure SQL documentation, see the [Docs contributor guide](/contribute/).
0 commit comments