|
1 | 1 | ---
|
2 |
| -title: Back up SQL Server databases in Azure VMs |
| 2 | +title: Back up SQL Server databases in Azure VMs |
3 | 3 | description: In this article, learn how to back up SQL Server databases on Azure virtual machines with Azure Backup.
|
4 | 4 | ms.reviewer: vijayts
|
5 | 5 | ms.topic: conceptual
|
@@ -37,28 +37,38 @@ For all operations, a SQL Server VM requires connectivity to Azure public IP add
|
37 | 37 |
|
38 | 38 | Establish connectivity by using one of the following options:
|
39 | 39 |
|
40 |
| -* **Allow the Azure datacenter IP ranges**. This option allows [IP ranges](https://www.microsoft.com/download/details.aspx?id=41653) in the download. To access a network security group (NSG), use the Set-AzureNetworkSecurityRule cmdlet. If you're safe recipients list only region-specific IPs, you'll also need to update the safe recipients list the Azure Active Directory (Azure AD) service tag to enable authentication. |
| 40 | +#### **Allow the Azure datacenter IP ranges**. |
| 41 | +This option allows [IP ranges](https://www.microsoft.com/download/details.aspx?id=41653) in the download. To access a network security group (NSG), use the Set-AzureNetworkSecurityRule cmdlet. If you're safe recipients list only region-specific IPs, you'll also need to update the safe recipients list the Azure Active Directory (Azure AD) service tag to enable authentication. |
41 | 42 |
|
42 |
| -* **Allow access using NSG tags**. If you use NSG to restrict connectivity, then you should use AzureBackup service tag to allows outbound access to Azure Backup. In addition, you should also allow connectivity for authentication and data transfer by using [rules](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) for Azure AD and Azure Storage. This can be done from portal or PowerShell. |
| 43 | +#### **Allow access using NSG tags**. |
| 44 | +If you use NSG to restrict connectivity, then you should use AzureBackup service tag to allows outbound access to Azure Backup. In addition, you should also allow connectivity for authentication and data transfer by using [rules](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) for Azure AD and Azure Storage. This can be done from portal or PowerShell. |
43 | 45 |
|
44 |
| - To create a rule using the portal: |
| 46 | +To create a rule using the portal: |
45 | 47 |
|
46 | 48 | * In **All Services**, go to **Network security groups** and select the network security group.
|
47 | 49 | * Select **Outbound security rules** under **Settings**.
|
48 | 50 | * Select **Add**. Enter all the required details for creating a new rule as described in [security rule settings](https://docs.microsoft.com/azure/virtual-network/manage-network-security-group#security-rule-settings). Ensure the option **Destination** is set to **Service Tag** and **Destination service tag** is set to **AzureBackup**.
|
49 | 51 | * Click **Add**, to save the newly created outbound security rule.
|
50 | 52 |
|
51 |
| - To create a rule using Powershell: |
| 53 | +To create a rule using Powershell:<br> |
| 54 | + - Add Azure account credentials and update the national clouds<br/> |
| 55 | + ``Add-AzureRmAccount``<br/> |
| 56 | + - Select the NSG subscription<br/> |
| 57 | + ```Select-AzureRmSubscription "<Subscription Id>"``` |
52 | 58 |
|
53 |
| - * Add Azure account credentials and update the national clouds<br/> |
54 |
| - ``Add-AzureRmAccount`` |
55 |
| - * Select the NSG subscription<br/> |
56 |
| - ``Select-AzureRmSubscription "<Subscription Id>"`` |
57 |
| - * Select the NSG<br/> |
| 59 | + - Select the NSG<br/> |
58 | 60 | ```$nsg = Get-AzureRmNetworkSecurityGroup -Name "<NSG name>" -ResourceGroupName "<NSG resource group name>"```
|
59 |
| - * Add allow outbound rule for Azure Backup service tag<br/> |
60 |
| - ```Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureBackupAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureBackup" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"``` |
61 |
| - * Save the NSG<br/> |
| 61 | + |
| 62 | + - Add allow outbound rule for Azure Backup service tag<br/> |
| 63 | + ```Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureBackupAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureBackup" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"``` |
| 64 | + |
| 65 | + - Add allow outbound rule for Storage service tag<br/> |
| 66 | + ```Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "StorageAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "Storage" -DestinationPortRange 443 -Description "Allow outbound traffic to Azure Backup service"``` |
| 67 | + |
| 68 | + - Add allow outbound rule for AzureActiveDirectory service tag<br/> |
| 69 | + ```Add-AzureRmNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name "AzureActiveDirectoryAllowOutbound" -Access Allow -Protocol * -Direction Outbound -Priority <priority> -SourceAddressPrefix * -SourcePortRange * -DestinationAddressPrefix "AzureActiveDirectory" -DestinationPortRange 443 -Description "Allow outbound traffic to AzureActiveDirectory service"``` |
| 70 | + |
| 71 | + - Save the NSG<br/> |
62 | 72 | ```Set-AzureRmNetworkSecurityGroup -NetworkSecurityGroup $nsg```
|
63 | 73 |
|
64 | 74 | * **Allow access by using Azure Firewall tags**. If you're using Azure Firewall, create an application rule by using the AzureBackup [FQDN tag](https://docs.microsoft.com/azure/firewall/fqdn-tags). This allows outbound access to Azure Backup.
|
|
0 commit comments