You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -141,53 +141,120 @@ For business continuity and disaster recovery (BCDR) reasons you may have specif
141
141
> - https:\//tm-kailani.one.microsoft.com (discovery URL of the primary region)
142
142
143
143
### Allow list for Azure File Sync IP addresses
144
-
If your on-premises firewall requires adding specific IP addresses to an allow list to connect to Azure File Sync, you can add the following IP address ranges based on the regions that you are connecting to.
145
-
146
-
| Region | IP address ranges |
147
-
|--------|-------------------|
148
-
| Central US | 52.176.149.179/32, 20.37.157.80/29 |
149
-
| East US 2 | 40.123.47.110/32, 20.41.5.144/29 |
150
-
| East US | 104.41.148.238/32, 20.42.4.248/29 |
151
-
| North Central US | 65.52.62.167/32, 40.80.188.24/29 |
152
-
| South Central US | 104.210.219.252/32, 13.73.248.112/29 |
153
-
| West US 2 | 52.183.27.204/32, 20.42.131.224/29 |
154
-
| West Central US | 52.161.25.233/32, 52.150.139.104/29 |
155
-
| West US | 40.112.150.67/32, 40.82.253.192/29 |
156
-
| Canada Central | 52.228.42.41/32, 52.228.81.248/29 |
157
-
| Canada East | 52.235.36.119/32, 40.89.17.232/29 |
158
-
| Brazil South | 191.237.253.115/32, 191.235.225.216/29 |
159
-
| North Europe | 40.113.94.67/32, 20.38.85.152/29 |
160
-
| West Europe | 104.40.191.8/32, 20.50.1.0/29 |
161
-
| France Central | 52.143.166.54/32, 20.43.42.8/29 |
162
-
| France South | 52.136.131.99/32, 51.105.88.248/29 |
163
-
| UK South | 51.140.67.72/32, 51.104.25.224/29 |
164
-
| UK West | 51.140.202.34/32, 51.137.161.240/29 |
165
-
| Switzerland North | 51.107.48.224/29 |
166
-
| Switzerland West | 51.107.144.216/29 |
167
-
| Norway West | 51.120.224.216/29 |
168
-
| Norway East | 51.120.40.224/29 |
169
-
| East Asia | 23.102.225.54/32, 20.189.108.56/29 |
170
-
| Southeast Asia | 13.76.81.46/32, 20.43.131.40/29 |
171
-
| Australia Central | 20.37.224.216/29 |
172
-
| Australia Central 2 | 20.36.120.216/29 |
173
-
| Australia East | 13.75.153.240/32, 20.37.195.96/29 |
174
-
| Australia Southeast | 13.70.176.196/32, 20.42.227.128/29 |
175
-
| South India | 104.211.231.18/32, 20.41.193.160/29 |
176
-
| West India | 52.136.48.216/29 |
177
-
| Japan East | 104.41.161.113/32, 20.43.66.0/29 |
178
-
| Japan West | 23.100.106.151/32, 40.80.57.192/29 |
179
-
| Korea Central | 52.231.67.75/32, 20.41.65.184/29 |
180
-
| Korea South | 52.231.159.38/32, 40.80.169.176/29 |
181
-
| US DoD East | 20.140.72.152/29 |
182
-
| US Gov Arizona | 20.140.64.152/29 |
183
-
| US Gov Arizona | 52.244.75.224/32, 52.244.79.140/32 |
184
-
| US Gov Iowa | 52.244.79.140/32, 52.244.75.224/32 |
185
-
| US Gov Texas | 52.238.166.107/32, 52.238.79.29/32 |
186
-
| US Gov Virginia | 13.72.17.152/32, 52.227.153.92/32 |
187
-
| South Africa North | 102.133.175.72/32 |
188
-
| South Africa West | 102.133.75.173/32, 102.133.56.128/29, 20.140.48.216/29 |
189
-
| UAE Central | 20.45.71.151/32, 20.37.64.216/29, 20.140.48.216/29 |
190
-
| UAE North | 40.123.216.130/32, 20.38.136.224/29, 20.140.56.136/29 |
144
+
Azure File Sync supports the use of [service tags](../../virtual-network/service-tags-overview.md), which represent a group of IP address prefixes for a given Azure service. You can use service tags to create firewall rules that enable communication with the Azure File Sync service. The service tag for Azure File Sync is `StorageSyncService`.
145
+
146
+
If you are using Azure File Sync within Azure, you can use name of service tag directly in your network security group to allow traffic. To learn more about how to do this, see [Network security groups](../../virtual-network/security-overview.md).
147
+
148
+
If you are using Azure File Sync on-premises, you can use the service tag API to get specific IP address ranges for your firewall's allow list. There are two methods for getting this information:
149
+
150
+
- The current list of IP address ranges for all Azure services supporting service tags are published weekly on the Microsoft Download Center in the form of a JSON document. Each Azure cloud has its own JSON document with the IP address ranges relevant for that cloud:
- The service tag discovery API (preview) allows programmatic retrieval of the current list of service tags. In preview, the service tag discovery API may return information that's less current than information returned from the JSON documents published on the Microsoft Download Center. You can use the API surface based on your automation preference:
Because the service tag discovery API is not updated as frequently as the JSON documents published to the Microsoft Download Center, we recommend using the JSON document to update your on-premises firewall's allow list. This can be done as follows:
161
+
162
+
```PowerShell
163
+
# The specific region to get the IP address ranges for. Replace westus2 with the desired region code
164
+
# from Get-AzLocation.
165
+
$region = "westus2"
166
+
167
+
# The service tag for Azure File Sync. Do not change unless you're adapting this
168
+
# script for another service.
169
+
$serviceTag = "StorageSyncService"
170
+
171
+
# Download date is the string matching the JSON document on the Download Center.
# If the file cannot be found, that means there hasn't been an update in
250
+
# more than a week. Please verify the download URIs are still accurate
251
+
# by checking https://docs.microsoft.com/azure/virtual-network/service-tags-overview
252
+
Write-Verbose -Message "JSON service tag file not found."
253
+
return
254
+
}
255
+
```
256
+
257
+
You can then use the IP address ranges in `$ipAddressRanges` to update your firewall. Check your firewall/network appliance's website for information on how to update your firewall.
191
258
192
259
## Test network connectivity to service endpoints
193
260
Once a server is registered with the Azure File Sync service, the Test-StorageSyncNetworkConnectivity cmdlet and ServerRegistration.exe can be used to test communications with all endpoints (URLs) specific to this server. This cmdlet can help troubleshoot when incomplete communication prevents the server from fully working with Azure File Sync and it can be used to fine tune proxy and firewall configurations.
0 commit comments