Skip to content

Commit bd56b73

Browse files
Merge pull request #34521 from MicrosoftDocs/VanMSFT-patch-1
add note about private endpoint
2 parents 7d79ca2 + 2d59900 commit bd56b73

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

azure-sql/database/private-endpoint-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Overview of private endpoint feature.
55
author: VanMSFT
66
ms.author: vanto
77
ms.reviewer: wiassaf, vanto, mathoma, randolphwest
8-
ms.date: 07/03/2024
8+
ms.date: 06/24/2025
99
ms.service: azure-sql-database
1010
ms.subservice: security
1111
ms.topic: overview
@@ -188,16 +188,16 @@ We recommend that customers use the private link with the **Redirect connection
188188

189189
- Allow **outbound** communication from the VNET hosting the client to port range 1433 to 65535.
190190

191-
- Use the **latest version of drivers that have redirect support built in.** Redirect support is included in ODBC, OLEDB, NET SqlClient Data Provider, Core .NET SqlClient Data Provider, and JDBC (version 9.4 or above) drivers. Connections originating from all other drivers are proxied.
191+
- Use the **latest version of drivers that have redirect support built in.** Redirect support is included in ODBC, OLE DB, .NET SqlClient Data Provider, Core .NET SqlClient Data Provider, and JDBC (version 9.4 or above) drivers. Connections originating from all other drivers are proxied.
192192

193-
After meeting the prerequisite, clients need to explicitly [choose **Redirect** connection policy](connectivity-architecture.md#connection-policy).
193+
After meeting the prerequisite, clients need to explicitly [choose **Redirect** connection policy](connectivity-architecture.md#connection-policy). If the connection policy has been set to **Redirect** before the private endpoint was set up, you might have to toggle the connection policy after setting up the private endpoint.
194194

195195
If it isn't feasible to modify the firewall settings to allow outbound access on the 1433-65535 port range, an alternative solution is to change the connection policy to **Proxy**.
196196

197197
Existing private endpoints using **Default** connection policy will be using the Proxy connection policy with port 1433. The reason for doing this is to avoid any disruption to client traffic from reaching SQL Database due to requisite port ranges for redirection not being open.
198198

199199
> [!NOTE]
200-
> For dedicated SQL pools, the connection policy when using private endpoints is always **Proxy**. Changing the setting will not affect to dedicated SQL pools when using private endpoints.
200+
> For dedicated SQL pools, the connection policy when using private endpoints is always **Proxy**. Changing the setting won't affect dedicated SQL pools when using private endpoints.
201201
202202
## On-premises connectivity over private peering
203203

0 commit comments

Comments
 (0)