You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article explains architecture of various components that direct network traffic to a server in Azure SQL Database or Azure Synapse Analytics. It also explains different connection policies and how it impacts clients connecting from within Azure and clients connecting from outside of Azure.
20
21
21
-
This article does *not* apply to **Azure SQL Managed Instance**. Refer to [Connectivity architecture for a managed instance](../managed-instance/connectivity-architecture-overview.md).
22
+
- For settings that control connectivity to the [logical server](logical-servers.md) for Azure SQL Database and dedicated SQL pools in Azure Synapse Analytics, see [connectivity settings](connectivity-settings.md).
23
+
- This article does *not* apply to **Azure SQL Managed Instance**. Refer to [Connectivity architecture for Azure SQL Managed Instance](../managed-instance/connectivity-architecture-overview.md).
22
24
23
25
## Connectivity architecture
24
26
25
27
The following diagram provides a high-level overview of the connectivity architecture.
26
28
27
-

29
+
:::image type="content" source="./media/connectivity-architecture/connectivity-overview.svg" alt-text="Diagram that shows a high-level overview of the connectivity architecture.":::
28
30
29
31
The following steps describe how a connection is established to Azure SQL Database:
30
32
31
-
- Clients connect to the gateway, that has a public IP address and listens on port 1433.
33
+
- Clients connect to the gateway that has a public IP address and listens on port 1433.
32
34
- The gateway, depending on the effective connection policy, redirects or proxies the traffic to the right database cluster.
33
35
- Inside the database cluster, traffic is forwarded to the appropriate database.
34
36
@@ -46,32 +48,32 @@ Servers in SQL Database and Azure Synapse support the following three options fo
46
48
47
49
We highly recommend the `Redirect` connection policy over the `Proxy` connection policy for the lowest latency and highest throughput. However, you will need to meet the additional requirements for allowing network traffic as outlined above. If the client is an Azure Virtual Machine, you can accomplish this using Network Security Groups (NSG) with [service tags](/azure/virtual-network/network-security-groups-overview#service-tags). If the client is connecting from a workstation on-premises then you may need to work with your network admin to allow network traffic through your corporate firewall.
48
50
49
-
> [!IMPORTANT]
51
+
> [!IMPORTANT]
50
52
> Connections to private endpoint only support **Proxy** as the [connection policy](connectivity-architecture.md#connection-policy).
51
53
52
54
## Connectivity from within Azure
53
55
54
56
If you are connecting from within Azure your connections have a connection policy of `Redirect` by default. A policy of `Redirect` means that after the TCP session is established to Azure SQL Database, the client session is then redirected to the right database cluster with a change to the destination virtual IP from that of the Azure SQL Database gateway to that of the cluster. Thereafter, all subsequent packets flow directly to the cluster, bypassing the Azure SQL Database gateway. The following diagram illustrates this traffic flow.
:::image type="content" source="./media/connectivity-architecture/connectivity-azure.svg" alt-text="Diagram of the architecture overview of Azure SQL connectivity via redirection within Azure.":::
57
59
58
60
## Connectivity from outside of Azure
59
61
60
62
If you are connecting from outside Azure, your connections have a connection policy of `Proxy` by default. A policy of `Proxy` means that the TCP session is established via the Azure SQL Database gateway and all subsequent packets flow via the gateway. The following diagram illustrates this traffic flow.
61
63
62
-

64
+
:::image type="content" source="./media/connectivity-architecture/connectivity-outside-azure.svg" alt-text="Diagram that shows how the TCP session is established via the Azure SQL Database gateway and all subsequent packets flow via the gateway.":::
63
65
64
-
> [!IMPORTANT]
65
-
> Additionally open TCP ports 1434 and 14000-14999 to enable [Connecting with DAC](/sql/database-engine/configure-windows/diagnostic-connection-for-database-administrators#connecting-with-dac)
66
+
> [!IMPORTANT]
67
+
> Open TCP ports 1434 and 14000-14999 to enable [Connecting with DAC](/sql/database-engine/configure-windows/diagnostic-connection-for-database-administrators#connecting-with-dac).
66
68
67
69
## Gateway IP addresses
68
70
69
71
The table below lists the individual Gateway IP addresses and also Gateway IP address ranges per region.
70
72
71
73
Periodically, we will retire Gateways using old hardware and migrate the traffic to new Gateways as per the process outlined at [Azure SQL Database traffic migration to newer Gateways](gateway-migration.md). We strongly encourage customers to use the **Gateway IP address subnets** in order to not be impacted by this activity in a region.
72
74
73
-
> [!IMPORTANT]
74
-
> Logins for SQL Database or Azure Synapse can land on **any of the Gateways in a region**. For consistent connectivity to SQL Database or Azure Synapse, allow network traffic to and from **ALL** Gateway IP addresses and Gateway IP address subnets for the region.
75
+
> [!IMPORTANT]
76
+
> Logins for SQL Database or Azure Synapse can land on **any of the Gateways in a region**. For consistent connectivity to SQL Database or Azure Synapse, allow network traffic to and from **ALL** Gateway IP addresses and Gateway IP address subnets for the region.
75
77
76
78
| Region name | Gateway IP addresses | Gateway IP address subnets |
77
79
| --- | --- | --- |
@@ -84,7 +86,7 @@ Periodically, we will retire Gateways using old hardware and migrate the traffic
| Central US | 13.67.215.62, 52.182.137.15, 104.208.21.1, 13.89.169.20 | 104.208.21.192/29, 13.89.168.192/29, 52.182.136.192/29 |
86
88
| China East | 139.219.130.35 | 52.130.112.136/29 |
87
-
| China East 2 | 40.73.82.1 | 52.130.120.88/29 |
89
+
| China East 2 | 40.73.82.1 | 52.130.120.88/29 |
88
90
| China North | 139.219.15.17 | 52.130.128.88/29 |
89
91
| China North 2 | 40.73.50.0 | 52.130.40.64/29 |
90
92
| East Asia | 52.175.33.150, 13.75.32.4, 13.75.32.14, 20.205.77.200, 20.205.83.224 | 13.75.32.192/29, 13.75.33.192/29 |
@@ -125,3 +127,5 @@ Periodically, we will retire Gateways using old hardware and migrate the traffic
125
127
- For information on how to change the Azure SQL Database connection policy for a server, see [conn-policy](/cli/azure/sql/server/conn-policy).
126
128
- For information about Azure SQL Database connection behavior for clients that use ADO.NET 4.5 or a later version, see [Ports beyond 1433 for ADO.NET 4.5](adonet-v12-develop-direct-route-ports.md).
127
129
- For general application development overview information, see [SQL Database Application Development Overview](develop-overview.md).
130
+
- Refer to [Azure IP Ranges and Service Tags – Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519)
131
+
-[What is a logical SQL server in Azure SQL Database and Azure Synapse?](logical-servers.md)
0 commit comments