You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/deploy-availability-zone-powershell.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: how-to
8
-
ms.date: 11/19/2019
8
+
ms.date: 10/31/2022
9
9
ms.author: victorh
10
10
ms.custom: devx-track-azurepowershell
11
11
---
@@ -32,23 +32,24 @@ When the standard public IP address is created, no specific zone is specified. T
32
32
It's important to know, because you can't have a firewall in zone 1 and an IP address in zone 2. But you can have a firewall in zone 1 and IP address in all zones, or a firewall and an IP address in the same single zone for proximity purposes.
Copy file name to clipboardExpand all lines: articles/firewall/deploy-cli.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: In this article, you learn how to deploy and configure Azure Firewa
4
4
services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
-
ms.date: 08/29/2019
7
+
ms.date: 10/31/2022
8
8
ms.author: victorh
9
9
ms.topic: how-to
10
10
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -27,7 +27,7 @@ For this article, you create a simplified single VNet with three subnets for eas
27
27
***Workload-SN** - the workload server is in this subnet. This subnet's network traffic goes through the firewall.
28
28
***Jump-SN** - The "jump" server is in this subnet. The jump server has a public IP address that you can connect to using Remote Desktop. From there, you can then connect to (using another Remote Desktop) the workload server.
Copy file name to clipboardExpand all lines: articles/firewall/sql-fqdn-filtering.md
+20-19Lines changed: 20 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: how-to
8
-
ms.date: 06/18/2020
8
+
ms.date: 10/31/2022
9
9
ms.author: victorh
10
10
---
11
11
@@ -25,40 +25,40 @@ If you use non-default ports for SQL IaaS traffic, you can configure those ports
25
25
## Configure using Azure CLI
26
26
27
27
1. Deploy an [Azure Firewall using Azure CLI](deploy-cli.md).
28
-
2. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
28
+
1. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
29
29
30
30
> [!NOTE]
31
31
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
32
32
33
-
3. Create a new rule collection with an application rule using SQL FQDN to allow access to a SQL server:
33
+
1. Create a new rule collection with an application rule using SQL FQDN to allow access to a SQL server:
34
34
35
35
```azurecli
36
36
az extension add -n azure-firewall
37
37
38
38
az network firewall application-rule create \
39
-
-g FWRG \
40
-
--f azfirewall \
41
-
--c sqlRuleCollection \
42
-
--priority 1000 \
43
-
--action Allow \
44
-
--name sqlRule \
45
-
--protocols mssql=1433 \
46
-
--source-addresses 10.0.0.0/24 \
47
-
--target-fqdns sql-serv1.database.windows.net
39
+
--resource-group Test-FW-RG \
40
+
--firewall-name Test-FW01 \
41
+
--collection-name sqlRuleCollection \
42
+
--priority 1000 \
43
+
--action Allow \
44
+
--name sqlRule \
45
+
--protocols mssql=1433 \
46
+
--source-addresses 10.0.0.0/24 \
47
+
--target-fqdns sql-serv1.database.windows.net
48
48
```
49
49
50
50
## Configure using Azure PowerShell
51
51
52
52
1. Deploy an [Azure Firewall using Azure PowerShell](deploy-ps.md).
53
-
2. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
53
+
1. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
54
54
55
55
> [!NOTE]
56
56
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
57
57
58
-
3. Create a new rule collection with an application rule using SQL FQDN to allow access to a SQL server:
58
+
1. Create a new rule collection with an application rule using SQL FQDN to allow access to a SQL server:
@@ -84,14 +84,15 @@ If you use non-default ports for SQL IaaS traffic, you can configure those ports
84
84
85
85
## Configure using the Azure portal
86
86
1. Deploy an [Azure Firewall using Azure CLI](deploy-cli.md).
87
-
2. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
87
+
1. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
88
88
89
89
> [!NOTE]
90
90
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
91
-
3. Add the application rule with the appropriate protocol, port, and SQL FQDN and then select **Save**.
91
+
92
+
1. Add the application rule with the appropriate protocol, port, and SQL FQDN and then select **Save**.
92
93

93
-
4. Access SQL from a virtual machine in a VNet that filters the traffic through the firewall.
94
-
5. Validate that [Azure Firewall logs](./firewall-workbook.md) show the traffic is allowed.
94
+
1. Access SQL from a virtual machine in a VNet that filters the traffic through the firewall.
95
+
1. Validate that [Azure Firewall logs](./firewall-workbook.md) show the traffic is allowed.
0 commit comments