Skip to content

Commit ea1c47f

Browse files
committed
added deny public network access
1 parent 87a3d8f commit ea1c47f

File tree

2 files changed

+13
-0
lines changed

2 files changed

+13
-0
lines changed
98.4 KB
Loading

articles/azure-sql/database/private-endpoint-overview.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,19 @@ Once the network admin creates the Private Endpoint (PE), the SQL admin can mana
5656
which finally leads to the IP address for the private endpoint
5757
![Screenshot of Private IP][9]
5858

59+
> [!IMPORTANT]
60+
> When adding a Private endpoint connection, public routing to your Azure SQL logical server is not blocked by default. The setting "Deny public network access" under the "Firewall and virtual networks" blade is left unchecked by default. To disable public network access ensure this is checked.
61+
62+
## Disable public access to Azure SQL logical server
63+
For this scenario, assume you would like to disable all public access to your Azure SQL Logical server, and only allow connections from your virtual network.
64+
65+
1. Ensure your Private endpoint connection(s) are enabled and configured.
66+
2. Disable public access
67+
1. Navigate to the "Firewalls and virtual network" blade of your Azure SQL Logical Server
68+
2. Click the box to check mark "Deny public network access"
69+
![Screenshot of Deny public network access](./media/private-endpoint/pec-deny-public-access.png)
70+
71+
5972
## Test connectivity to SQL Database from an Azure VM in same virtual network
6073
For this scenario, assume you've created an Azure Virtual Machine (VM) running a recent version of Windows in the same virtual network as the private endpoint.
6174

0 commit comments

Comments
 (0)