You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-sql/database/private-endpoint-overview.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,17 +57,18 @@ Once the network admin creates the Private Endpoint (PE), the SQL admin can mana
57
57
![Screenshot of Private IP][9]
58
58
59
59
> [!IMPORTANT]
60
-
> When adding a Private endpoint connection, public routing to your Azure SQL logical server is not blocked by default. The setting "Deny public network access" under the "Firewall and virtual networks" blade is left unchecked by default. To disable public network access ensure this is checked.
60
+
> When you add a private endpoint connection, public routing to your Azure SQL logical server isn't blocked by default. In the **Firewall and virtual networks** pane, the setting **Deny public network access** is not selected by default. To disable public network access, ensure that you select **Deny public network access**.
61
61
62
-
## Disable public access to Azure SQL logical server
63
-
For this scenario, assume you would like to disable all public access to your Azure SQL Logical server, and only allow connections from your virtual network.
62
+
## Disable public access to your Azure SQL logical server
64
63
65
-
1. Ensure your Private endpoint connection(s) are enabled and configured.
66
-
2. Disable public access
67
-
1. Navigate to the "Firewalls and virtual network" blade of your Azure SQL Logical Server
68
-
2. Click the box to check mark "Deny public network access"
69
-

64
+
For this scenario, assume you want to disable all public access to your Azure SQL logical server and allow connections only from your virtual network.
70
65
66
+
First, ensure that your private endpoint connections are enabled and configured. Then, to disable public access to your logical server:
67
+
68
+
1. Go to the **Firewalls and virtual network** pane of your Azure SQL logical server.
69
+
1. Select the **Deny public network access** checkbox.
70
+
71
+

71
72
72
73
## Test connectivity to SQL Database from an Azure VM in same virtual network
73
74
For this scenario, assume you've created an Azure Virtual Machine (VM) running a recent version of Windows in the same virtual network as the private endpoint.
0 commit comments