Skip to content

Commit 2f7162c

Browse files
Merge pull request #41274 from Matticusau/patch-2
Removal of extra closing parentheses
2 parents 2343e84 + f9b7e0c commit 2f7162c

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/sql-database/sql-database-connectivity-architecture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This document explains the Azure SQL connectivity architecture for
44
services: sql-database
55
ms.service: sql-database
66
ms.subservice: development
7-
ms.custom:
7+
ms.custom: fasttrack-edit
88
ms.devlang:
99
ms.topic: conceptual
1010
author: rohitnayakmsft
@@ -32,7 +32,7 @@ The following steps describe how a connection is established to an Azure SQL dat
3232

3333
Azure SQL Database supports the following three options for the connection policy setting of a SQL Database server:
3434

35-
- **Redirect (recommended):** Clients establish connections directly to the node hosting the database. To enable connectivity, the clients must allow outbound firewall rules to all Azure IP addresses in the region using Network Security Groups (NSG) with [service tags](../virtual-network/security-overview.md#service-tags)) for ports 11000-11999, not just the Azure SQL Database gateway IP addresses on port 1433. Because packets go directly to the database, latency and throughput have improved performance.
35+
- **Redirect (recommended):** Clients establish connections directly to the node hosting the database. To enable connectivity, the clients must allow outbound firewall rules to all Azure IP addresses in the region using Network Security Groups (NSG) with [service tags](../virtual-network/security-overview.md#service-tags) for ports 11000-11999, not just the Azure SQL Database gateway IP addresses on port 1433. Because packets go directly to the database, latency and throughput have improved performance.
3636
- **Proxy:** In this mode, all connections are proxied via the Azure SQL Database gateways. To enable connectivity, the client must have outbound firewall rules that allow only the Azure SQL Database gateway IP addresses (usually two IP addresses per region). Choosing this mode can result in higher latency and lower throughput, depending on nature of the workload. We highly recommend the `Redirect` connection policy over the `Proxy` connection policy for the lowest latency and highest throughput.
3737
- **Default:** This is the connection policy in effect on all servers after creation unless you explicitly alter the connection policy to either `Proxy` or `Redirect`. The effective policy depends on whether connections originate from within Azure (`Redirect`) or outside of Azure (`Proxy`).
3838

0 commit comments

Comments
 (0)