title | description | author | ms.author | ms.reviewer | ms.date | ms.service | ms.topic | f1_keywords | helpviewer_keywords | dev_langs | monikerRange | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
sys.database_firewall_rules (Azure SQL Database) |
Returns information about the database-level firewall settings associated with your Azure SQL Database. |
VanMSFT |
vanto |
randolphwest |
09/09/2022 |
azure-sql-database |
reference |
|
|
|
=azuresqldb-current |
[!INCLUDEAzure SQL Database Azure SQL Managed Instance]
Returns information about the database-level firewall settings associated with your [!INCLUDE ssazure-sqldb]. Database-level firewall settings are useful when using contained database users. For more information, see Contained Database Users - Making Your Database Portable.
The sys.database_firewall_rules
view contains the following columns:
Column name | Data type | Description |
---|---|---|
id |
int | The identifier of the database-level firewall setting. |
name |
nvarchar(128) | The name you chose to describe and distinguish the database-level firewall setting. |
start_ip_address |
varchar(45) | The lowest IP address in the range of the database-level firewall setting. IP addresses equal to or greater than this can attempt to connect to the [!INCLUDEssSDS] instance. The lowest possible IP address is 0.0.0.0 . |
end_ip_address |
varchar(45) | The highest IP address in the range of the firewall setting. IP addresses equal to or less than this can attempt to connect to the [!INCLUDEssSDS] instance. The highest possible IP address is 255.255.255.255 .Note: Azure connection attempts are allowed when both this field and the start_ip_address field equals 0.0.0.0 . |
create_date |
datetime | UTC date and time when the database-level firewall setting was created. |
modify_date |
datetime | UTC date and time when the database-level firewall setting was last modified. |
To return information about the server-level firewall settings associated with your [!INCLUDE ssazure-sqldb], use sys.firewall_rules (Azure SQL Database).
This view is available in the master
database and in each user database. Read-only access to this view is available to all users with permission to connect to the database.
- sp_set_database_firewall_rule (Azure SQL Database)
- sp_delete_database_firewall_rule (Azure SQL Database)
- sp_set_firewall_rule (Azure SQL Database)
- sp_delete_firewall_rule (Azure SQL Database)
- sys.firewall_rules (Azure SQL Database)
- Configure a Windows Firewall for Database Engine Access
- Configure a Firewall for FILESTREAM Access
- Configure a Firewall for Report Server Access