Skip to content

Commit 6e6dc5f

Browse files
Merge pull request #35576 from WilliamDAssafMSFT/20251014-connection-policy-fabric-sql-db
20251014 connection policy clarification to Default
2 parents e0c8a5a + f9f38ce commit 6e6dc5f

1 file changed

Lines changed: 1 addition & 4 deletions

File tree

azure-sql/database/connectivity-architecture.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -48,15 +48,12 @@ Logical SQL servers support the following three options for the server's connect
4848
- Allow outbound communication from the client to all Azure SQL IP addresses in the region on ports in the range of 11000 to 11999. Use the Service Tags for SQL to make this easier to manage. If you are using Private Link, see [Use Redirect connection policy with private endpoints](private-endpoint-overview.md#use-redirect-connection-policy-with-private-endpoints) for the port ranges to allow.
4949
- Allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
5050
- When using the Redirect connection policy, refer to the [Azure IP Ranges and Service Tags – Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519) for a list of your region's IP addresses to allow.
51-
52-
> [!NOTE]
53-
> Currently, the connection policy for [SQL database in Microsoft Fabric](/fabric/database/sql/limitations#connection-policy) is **redirect** and cannot be changed.
54-
5551
- **Proxy:** In this mode, all connections are proxied via the Azure SQL Database gateways, leading to increased latency and reduced throughput. For connections to use this mode, clients need to allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
5652
- When using the Proxy connection policy, refer to the [Gateway IP addresses](#gateway-ip-addresses) list later in this article for your region's IP addresses to allow.
5753
- **Default:** This is the connection policy in effect on all servers after creation unless you explicitly alter the connection policy to either `Proxy` or `Redirect`. The default policy is:
5854
- `Redirect` for all client connections originating inside of Azure (for example, from an Azure Virtual Machine).
5955
- `Proxy` for all client connections originating outside (for example, connections from your local workstation).
56+
- Currently, the connection policy for [SQL database in Microsoft Fabric](/fabric/database/sql/limitations#connection-policy) is **default** and cannot be changed.
6057

6158
We highly recommend the `Redirect` connection policy over the `Proxy` connection policy for the lowest latency and highest throughput. However, you need to meet the extra requirements for allowing network traffic for outbound communication:
6259

0 commit comments

Comments
 (0)