Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Applies to:
Azure SQL Database
Azure Synapse Analytics (dedicated SQL pools only)
Network Security Perimeter (preview) secures both inbound and outbound network traffic between Azure SQL Database and other Platform as a Service (PaaS) resources (for example, Azure Storage and Azure Key Vault). Any attempts made to communicate with Azure resources that aren't inside the perimeter is blocked.
Important
- This article applies to both Azure SQL Database and dedicated SQL pool (formerly SQL DW) in Azure Synapse Analytics. These settings apply to all SQL Database and dedicated SQL pool (formerly SQL DW) databases associated with the server. For simplicity, the term 'database' refers to both databases in Azure SQL Database and Azure Synapse Analytics. Likewise, any references to 'server' is referring to the logical SQL server that hosts Azure SQL Database and dedicated SQL pool (formerly SQL DW) in Azure Synapse Analytics. This article does not apply to Azure SQL Managed Instance or dedicated SQL pools in Azure Synapse Analytics workspaces.
Getting Started
In the Azure portal, search for Network Security Perimeter in the resource list and then select Create.
Provide a Name and Region and choose the subscription.
Under the Resources section, select the Add button and navigate to the SQL Database you want to associate with the perimeter.
Add an Inbound access rule. The source type can be either an IP address, a subscription, or other network security perimeters.
Add an Outbound access rule to allow resources inside the perimeter to connect to resources outside the perimeter
If you already have an existing Azure SQL Database and are looking to add security perimeter, use the following steps:
In the Azure portal, search for the existing Network Security Perimeter.
Select Associated Resources from the Settings menu.
Select the Add button and select Associate resources with an existing profile.
Select your Profile from the dropdown and select Add.
Search for your SQL Database resource, Select the required resource, and select Associate.
Using SQL Database with a Network Security Perimeter
By default, Network Security Perimeter uses Learning Mode, which can be used to log all traffic to and from SQL Database. The network traffic can be logged to a Log Analytics Workspace or Azure Storage account using Diagnostic logging for Azure Network Security Perimeter. Finally, Network Security Perimeter can be switched to Enforced mode. In Enforced mode, any access denied shows the following error:
Error 42118
Login failed because the network security perimeter denied inbound access.