Skip to content

Commit e36683a

Browse files
authored
Merge pull request #52190 from andresnava/patch-10
Match UI
2 parents 2462055 + a86e708 commit e36683a

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/sql-database/sql-database-networkaccess-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ ms.date: 03/09/2020
2424
2525
When you create a new Azure SQL Server from the [Azure portal](sql-database-single-database-get-started.md), the result is a public endpoint in the format, *yourservername.database.windows.net*.
2626

27-
You can use the following network access controls to selectively allow access to the SQl Database via the public endpoint:
27+
You can use the following network access controls to selectively allow access to the SQL Database via the public endpoint:
2828
- Allow Azure Services: When set to ON, other resources within the Azure boundary, for example an Azure Virtual Machine, can access SQL Database
2929

3030
- IP firewall rules: Use this feature to explicitly allow connections from a specific IP address, for example from on-premises machines
@@ -51,13 +51,13 @@ You can also change this setting via the firewall pane after the Azure SQL Serve
5151

5252
When set to **ON** Azure SQL Server allows communications from all resources inside the Azure boundary, that may or may not be part of your subscription.
5353

54-
In many cases, the **ON** setting is more permissive than what most customers want.They may want to set this setting to **OFF** and replace it with more restrictive IP firewall rules or Virtual Network firewall rules. Doing so affects the following features that run on VMs in Azure that not part of your VNet and hence connect to Sql Database via an Azure IP address.
54+
In many cases, the **ON** setting is more permissive than what most customers want. They may want to set this setting to **OFF** and replace it with more restrictive IP firewall rules or Virtual Network firewall rules. Doing so affects the following features that run on VMs in Azure that not part of your VNet and hence connect to Sql Database via an Azure IP address.
5555

5656
### Import Export Service
57-
Import Export Service does not work **Allow Azure services to access server** set to OFF. However you can work around the problem [by manually running sqlpackage.exe from an Azure VM or performing the export](https://docs.microsoft.com/azure/sql-database/import-export-from-vm) directly in your code by using the DACFx API.
57+
Import Export Service does not work when **Allow access to Azure services** is set to **OFF**. However you can work around the problem [by manually running sqlpackage.exe from an Azure VM or performing the export](https://docs.microsoft.com/azure/sql-database/import-export-from-vm) directly in your code by using the DACFx API.
5858

5959
### Data Sync
60-
To use the Data sync feature with **Allow Azure services to access server** set to OFF, you need to create individual firewall rule entries to [add IP addresses](sql-database-server-level-firewall-rule.md) from the **Sql service tag** for the region hosting the **Hub** database.
60+
To use the Data sync feature with **Allow access to Azure services** set to **OFF**, you need to create individual firewall rule entries to [add IP addresses](sql-database-server-level-firewall-rule.md) from the **Sql service tag** for the region hosting the **Hub** database.
6161
Add these server level firewall rules to the logical servers hosting both **Hub** and **Member** databases ( which may be in different regions)
6262

6363
Use the following PowerShell script to generate the IP addresses corresponding to Sql service tag for West US region

0 commit comments

Comments
 (0)