You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-networkaccess-overview.md
+16-5Lines changed: 16 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ The Azure SQL Database Query Editor is deployed on VMs in Azure. These VMs are n
59
59
60
60
Azure SQL Database has the Data Sync feature that connects to your databases using Azure IPs.
61
61
62
-
To use the Data sync feature with **Allow Azure services to access server** set to OFF, you need to create individual firewall rule entries to [add IP addresses](sql-database-server-level-firewall-rule.md) from the Sql **service tag** for the region hosting the **Hub** database.
62
+
To use the Data sync feature with **Allow Azure services to access server** set to OFF, you need to create individual firewall rule entries to [add IP addresses](sql-database-server-level-firewall-rule.md) from the **Sql service tag** for the region hosting the **Hub** database.
63
63
Add these server level firewall rules to the logical servers hosting both **Hub** and **Member** databases ( which may be in different regions)
64
64
65
65
Use the following PowerShell script to generate the IP addresses corresponding to Sql service tag for West US region
> Get-AzNetworkServiceTag returns the global range for SQL Service Tag despite specifying the Location parameter. Be sure to filter it to the region that hosts the Hub database used by your sync group
82
-
83
-
Note that the output of the PowerShell script is in Classless Inter Domain Routing(CIDR) notation.
84
-
Use [Get-IPrangeStartEnd.ps1](https://gallery.technet.microsoft.com/scriptcenter/Start-and-End-IP-addresses-bcccc3a9) to convert from CIDR notation to Start and End IP addresses- which you can then enter as firewall rules.
81
+
> Get-AzNetworkServiceTag returns the global range for Sql Service Tag despite specifying the Location parameter. Be sure to filter it to the region that hosts the Hub database used by your sync group
85
82
83
+
Note that the output of the PowerShell script is in Classless Inter Domain Routing (CIDR) notation and this needs to be converted to a format of Start and End IP address using [Get-IPrangeStartEnd.ps1](https://gallery.technet.microsoft.com/scriptcenter/Start-and-End-IP-addresses-bcccc3a9) like this
You can now add these as distinct firewall rules and then set **Allow Azure services to access server** to OFF.
102
+
103
+
93
104
## IP firewall rules
94
105
Ip based firewall is a feature of Azure SQL Server that prevents all access to your database server until you explicitly [add IP addresses](sql-database-server-level-firewall-rule.md) of the client machines.
0 commit comments