You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Customer intent: "As a network administrator, I want to configure SQL FQDN application rules in Azure Firewall, so that I can control access to specific SQL server instances from my virtual networks."
12
11
---
13
12
14
13
# Configure Azure Firewall application rules with SQL FQDNs
15
14
16
-
You can now configure Azure Firewall application rules with SQL FQDNs. This allows you to limit access from your virtual networks to only the specified SQL server instances.
15
+
You can configure Azure Firewall application rules with SQL FQDNs. This configuration limits access from your virtual networks to only the specified SQL server instances.
17
16
18
-
With SQL FQDNs, you can filter traffic:
17
+
By using SQL FQDNs, you can filter traffic:
19
18
20
-
- From your VNets to an Azure SQL Database or Azure Synapse Analytics. For example: Only allow access to *sql-server1.database.windows.NET*.
21
-
- From on-premises to Azure SQL Managed Instances or SQL IaaS running in your VNets.
22
-
- From spoke-to-spoke to Azure SQL Managed Instances or SQL IaaS running in your VNets.
19
+
- From your virtual networks to an Azure SQL Database or Azure Synapse Analytics. For example: Only allow access to *sql-server1.database.windows.NET*.
20
+
- From on-premises to Azure SQL Managed Instances or SQL IaaS running in your virtual networks.
21
+
- From spoke-to-spoke to Azure SQL Managed Instances or SQL IaaS running in your virtual networks.
23
22
24
-
SQL FQDN filtering is supported in [proxy-mode](/azure/azure-sql/database/connectivity-architecture#connection-policy) only (port 1433). If you use SQL in the default redirect mode, you can filter access using the SQL service tag as part of [network rules](features-by-sku.md#key-basic-features).
23
+
SQL FQDN filtering is supported in [proxy-mode](/azure/azure-sql/database/connectivity-architecture#connection-policy) only (port 1433). If you use SQL in the default redirect mode, you can filter access by using the SQL service tag as part of [network rules](features-by-sku.md#key-basic-features).
25
24
If you use non-default ports for SQL IaaS traffic, you can configure those ports in the firewall application rules.
26
25
27
-
## Configure using Azure CLI
26
+
## Configure by using Azure CLI
28
27
29
28
1. Deploy an [Azure Firewall using Azure CLI](deploy-cli.md).
30
-
1. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
29
+
1. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, set the SQL connectivity mode to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
31
30
32
31
> [!NOTE]
33
-
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
32
+
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access by using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
34
33
35
-
1. Create a new rule collection with an application rule using SQL FQDN to allow access to a SQL server:
34
+
1. Create a new rule collection with an application rule that uses SQL FQDN to allow access to a SQL server:
36
35
37
36
```azurecli
38
37
az extension add -n azure-firewall
39
-
40
-
az network firewall application-rule create \
38
+
39
+
az network firewall application-rule create \
41
40
--resource-group Test-FW-RG \
42
-
--firewall-name Test-FW01 \
41
+
--firewall-name Test-FW01 \
43
42
--collection-name sqlRuleCollection \
44
43
--priority 1000 \
45
44
--action Allow \
@@ -49,50 +48,51 @@ If you use non-default ports for SQL IaaS traffic, you can configure those ports
49
48
--target-fqdns sql-serv1.database.windows.net
50
49
```
51
50
52
-
## Configure using Azure PowerShell
51
+
## Configure by using Azure PowerShell
53
52
54
53
1. Deploy an [Azure Firewall using Azure PowerShell](deploy-ps.md).
55
-
1. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
54
+
1. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, set the SQL connectivity mode to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
56
55
57
56
> [!NOTE]
58
-
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
57
+
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access by using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
59
58
60
-
1. Create a new rule collection with an application rule using SQL FQDN to allow access to a SQL server:
59
+
1. Create a new rule collection with an application rule that uses SQL FQDN to allow access to a SQL server:
1. Deploy an [Azure Firewall using Azure CLI](deploy-cli.md).
89
-
1. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, ensure the SQL connectivity mode is set to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
86
+
## Configure by using the Azure portal
87
+
88
+
1. Deploy an [Azure Firewall using the Azure portal](tutorial-firewall-deploy-portal.md).
89
+
1. If you filter traffic to Azure SQL Database, Azure Synapse Analytics, or SQL Managed Instance, set the SQL connectivity mode to **Proxy**. To learn how to switch SQL connectivity mode, see [Azure SQL Connectivity Settings](/azure/azure-sql/database/connectivity-settings#change-the-connection-policy-via-the-azure-cli).
90
90
91
91
> [!NOTE]
92
-
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
92
+
> SQL *proxy* mode can result in more latency compared to *redirect*. If you want to continue using redirect mode, which is the default for clients connecting within Azure, you can filter access by using the SQL [service tag](service-tags.md) in firewall [network rules](tutorial-firewall-deploy-portal.md#configure-a-network-rule).
93
93
94
-
1. Add the application rule with the appropriate protocol, port, and SQL FQDN and then select **Save**.
95
-
1. Access SQL from a virtual machine in a VNet that filters the traffic through the firewall.
94
+
1. Add the application rule with the appropriate protocol, port, and SQL FQDN, and then select **Save**.
95
+
1. Access SQL from a virtual machine in a virtual network that filters the traffic through the firewall.
96
96
1. Validate that [Azure Firewall logs](./firewall-workbook.md) show the traffic is allowed.
0 commit comments