Skip to content

Commit 7cc3992

Browse files
authored
Merge pull request #86850 from fgarofalo56/sqldb-pec
added deny public network access
2 parents f008c12 + 2782752 commit 7cc3992

File tree

2 files changed

+14
-0
lines changed

2 files changed

+14
-0
lines changed
98.4 KB
Loading

articles/azure-sql/database/private-endpoint-overview.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,20 @@ Once the network admin creates the Private Endpoint (PE), the SQL admin can mana
5656
which finally leads to the IP address for the private endpoint
5757
![Screenshot of Private IP][9]
5858

59+
> [!IMPORTANT]
60+
> When you add a private endpoint connection, public routing to your Azure SQL logical server isn't blocked by default. In the **Firewall and virtual networks** pane, the setting **Deny public network access** is not selected by default. To disable public network access, ensure that you select **Deny public network access**.
61+
62+
## Disable public access to your Azure SQL logical server
63+
64+
For this scenario, assume you want to disable all public access to your Azure SQL logical server and allow connections only from your virtual network.
65+
66+
First, ensure that your private endpoint connections are enabled and configured. Then, to disable public access to your logical server:
67+
68+
1. Go to the **Firewalls and virtual network** pane of your Azure SQL logical server.
69+
1. Select the **Deny public network access** checkbox.
70+
71+
![Screenshot that shows selecting the Deny public network access option.](./media/private-endpoint/pec-deny-public-access.png)
72+
5973
## Test connectivity to SQL Database from an Azure VM in same virtual network
6074
For this scenario, assume you've created an Azure Virtual Machine (VM) running a recent version of Windows in the same virtual network as the private endpoint.
6175

0 commit comments

Comments
 (0)