Skip to content

Commit dd9c8fb

Browse files
author
David Curwin
committed
FQDNs for connectivity
1 parent 8e3e81b commit dd9c8fb

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

articles/backup/backup-sql-server-database-azure-vms.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,16 @@ Establish connectivity by using one of the following options:
4545

4646
This option allows the [IP ranges](https://www.microsoft.com/download/details.aspx?id=41653) in the downloaded file. To access a network security group (NSG), use the Set-AzureNetworkSecurityRule cmdlet. If your safe recipients list only includes region-specific IPs, you'll also need to update the safe recipients list the Azure Active Directory (Azure AD) service tag to enable authentication.
4747

48+
Alternatively, you can also allow access to the following FQDNs for establishing required connectivity:
49+
50+
* `*.<datacentercode>.backup.windowsazure.com`<br>
51+
(See the data center codes [here](https://download.microsoft.com/download/1/2/6/126a410b-0e06-45ed-b2df-84f353034fa1/AzureRegionCodesList.docx))
52+
53+
* `login.windows.net`
54+
* `*.blob.core.windows.net`
55+
* `*.queue.core.windows.net`
56+
57+
4858
#### Allow access using NSG tags
4959

5060
If you use NSG to restrict connectivity, then you should use AzureBackup service tag to allows outbound access to Azure Backup. In addition, you should also allow connectivity for authentication and data transfer by using [rules](https://docs.microsoft.com/azure/virtual-network/security-overview#service-tags) for Azure AD and Azure Storage. This can be done from the Azure portal or via PowerShell.

0 commit comments

Comments
 (0)