Skip to content

Commit a1f17b7

Browse files
rwestMSFTVanMSFTWilliamDAssafMSFTJillGrant615
authored
Azure SQL Database high value freshness pass (#36719)
* Azure SQL Database high value freshness pass Apply suggestions from code review Co-authored-by: Van To <40007119+VanMSFT@users.noreply.github.com> Co-authored-by: William Assaf MSFT <74387232+WilliamDAssafMSFT@users.noreply.github.com> * Apply suggestion from @JillGrant615 --------- Co-authored-by: Van To <40007119+VanMSFT@users.noreply.github.com> Co-authored-by: William Assaf MSFT <74387232+WilliamDAssafMSFT@users.noreply.github.com> Co-authored-by: Jill Grant <72043882+JillGrant615@users.noreply.github.com>
1 parent fe5b08a commit a1f17b7

2 files changed

Lines changed: 181 additions & 146 deletions

File tree

Lines changed: 51 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Connectivity architecture
2+
title: Connectivity Architecture
33
titleSuffix: Azure SQL Database and SQL database in Fabric
44
description: This article explains the connectivity architecture for database connections from within Azure or from outside of Azure for Azure SQL Database, SQL database in Fabric
55
author: VanMSFT
66
ms.author: vanto
7-
ms.reviewer: wiassaf, mathoma
8-
ms.date: 03/18/2025
7+
ms.reviewer: wiassaf, mathoma, randolphwest
8+
ms.date: 02/26/2026
99
ms.service: azure-sql-database
1010
ms.subservice: connect
1111
ms.topic: concept-article
@@ -15,62 +15,80 @@ ms.custom:
1515
- references_regions
1616
monikerRange: "=azuresql || =azuresql-db || =fabricsql"
1717
---
18+
1819
# Connectivity architecture
1920

2021
[!INCLUDE [appliesto-sqldb-fabricsqldb](../includes/appliesto-sqldb-fabricsqldb.md)]
2122

22-
This article explains architecture of various components that direct network traffic to a server in Azure SQL Database and SQL database in Microsoft Fabric. Learn more about different connection policies and how they impact clients connecting from within Azure and clients connecting from outside of Azure.
23+
This article explains the architecture of various components that direct network traffic to a server in Azure SQL Database and SQL database in Microsoft Fabric. It covers different connection policies and how they affect clients connecting from within Azure and clients connecting from outside of Azure.
2324

2425
- For connection strings to Azure SQL Database, see [Connect and query to Azure SQL Database](connect-query-content-reference-guide.md).
26+
2527
- For settings that control connectivity to the [logical server](logical-servers.md) for Azure SQL Database, see [connectivity settings](connectivity-settings.md).
26-
- This article does *not* apply to **Azure SQL Managed Instance**. Refer to [Connectivity architecture for Azure SQL Managed Instance](../managed-instance/connectivity-architecture-overview.md).
27-
- This article does *not* apply to dedicated SQL pools in Azure Synapse Analytics.
28-
- For settings that control connectivity to dedicated SQL pools in Azure Synapse Analytics, see [Azure Synapse Analytics connectivity settings](/azure/synapse-analytics/security/connectivity-settings).
29-
- For connection strings to Azure Synapse Analytics pools, see [Connect to Synapse SQL](/azure/synapse-analytics/sql/connect-overview).
3028

31-
## Connectivity architecture
29+
- This article does *not* apply to **Azure SQL Managed Instance**. For more information, see [Connectivity architecture for Azure SQL Managed Instance](../managed-instance/connectivity-architecture-overview.md).
30+
31+
- This article does *not* apply to dedicated SQL pools in Azure Synapse Analytics.
32+
33+
- For settings that control connectivity to dedicated SQL pools in Azure Synapse Analytics, see [Azure Synapse Analytics connectivity settings](/azure/synapse-analytics/security/connectivity-settings).
34+
35+
- For connection strings to Azure Synapse Analytics pools, see [Connect to Synapse SQL](/azure/synapse-analytics/sql/connect-overview).
36+
37+
## Connectivity architecture overview
3238

3339
The following diagram provides a high-level overview of the connectivity architecture.
3440

3541
:::image type="content" source="media/connectivity-architecture/connectivity-overview.svg" alt-text="Diagram that shows a high-level overview of the connectivity architecture.":::
3642

37-
The following steps describe how a connection is established:
43+
The following steps describe how to establish a connection:
44+
45+
1. Clients connect to the gateway that has a public IP address and listens on port 1433.
3846

39-
- Clients connect to the gateway that has a public IP address and listens on port 1433.
40-
- Depending on the effective connection policy, the gateway redirects or proxies the traffic to the correct database cluster.
41-
- Inside the database cluster, traffic is forwarded to the appropriate database.
47+
1. Depending on the effective connection policy, the gateway redirects or proxies the traffic to the correct database cluster.
48+
49+
1. Inside the database cluster, the gateway forwards traffic to the appropriate database.
4250

4351
## Connection policy
4452

45-
Logical SQL servers support the following three options for the server's connection policy setting.
53+
Logical SQL servers support the following three options for the server's connection policy setting:
54+
55+
- **Redirect (recommended)**: Clients establish connections directly to the node hosting the database, which reduces latency and improves throughput. To use this mode for connections, clients need to:
56+
57+
- Allow outbound communication from the client to all Azure SQL IP addresses in the region on ports in the range of 11000 to 11999. Use the Service Tags for SQL to make this easier to manage. If you're using Private Link, see [Use Redirect connection policy with private endpoints](private-endpoint-overview.md#use-redirect-connection-policy-with-private-endpoints) for the port ranges to allow.
58+
59+
- Allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
60+
61+
- When you use the Redirect connection policy, see the [Azure IP Ranges and Service Tags - Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519) for a list of your region's IP addresses to allow.
62+
63+
- **Proxy**: In this mode, all connections go through the Azure SQL Database gateways, which increases latency and reduces throughput. To use this mode for connections, clients need to allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
64+
65+
- When you use the Proxy connection policy, see the [Gateway IP addresses](#gateway-ip-addresses) list later in this article for your region's IP addresses to allow.
66+
67+
- **Default**: This connection policy is in effect on all servers after creation unless you explicitly alter the connection policy to either `Proxy` or `Redirect`. The default policy is:
68+
69+
- `Redirect` for all client connections originating inside of Azure (for example, from an Azure Virtual Machine).
70+
71+
- `Proxy` for all client connections originating outside (for example, connections from your local workstation).
72+
73+
- Currently, the connection policy for [SQL database in Microsoft Fabric](/fabric/database/sql/limitations#connection-policy) is **default** and can't be changed.
4674

47-
- **Redirect (recommended):** Clients establish connections directly to the node hosting the database, leading to reduced latency and improved throughput. For connections to use this mode, clients need to:
48-
- Allow outbound communication from the client to all Azure SQL IP addresses in the region on ports in the range of 11000 to 11999. Use the Service Tags for SQL to make this easier to manage. If you are using Private Link, see [Use Redirect connection policy with private endpoints](private-endpoint-overview.md#use-redirect-connection-policy-with-private-endpoints) for the port ranges to allow.
49-
- Allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
50-
- When using the Redirect connection policy, refer to the [Azure IP Ranges and Service Tags – Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519) for a list of your region's IP addresses to allow.
51-
- **Proxy:** In this mode, all connections are proxied via the Azure SQL Database gateways, leading to increased latency and reduced throughput. For connections to use this mode, clients need to allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
52-
- When using the Proxy connection policy, refer to the [Gateway IP addresses](#gateway-ip-addresses) list later in this article for your region's IP addresses to allow.
53-
- **Default:** This is the connection policy in effect on all servers after creation unless you explicitly alter the connection policy to either `Proxy` or `Redirect`. The default policy is:
54-
- `Redirect` for all client connections originating inside of Azure (for example, from an Azure Virtual Machine).
55-
- `Proxy` for all client connections originating outside (for example, connections from your local workstation).
56-
- Currently, the connection policy for [SQL database in Microsoft Fabric](/fabric/database/sql/limitations#connection-policy) is **default** and cannot be changed.
75+
For the lowest latency and highest throughput, we highly recommend the `Redirect` connection policy instead of the `Proxy` connection policy. However, you need to meet the extra requirements for allowing network traffic for outbound communication:
5776

58-
We highly recommend the `Redirect` connection policy over the `Proxy` connection policy for the lowest latency and highest throughput. However, you need to meet the extra requirements for allowing network traffic for outbound communication:
77+
- If the client is an Azure Virtual Machine, you can accomplish this requirement by using Network Security Groups (NSG) with [service tags](/azure/virtual-network/network-security-groups-overview#service-tags).
5978

60-
- If the client is an Azure Virtual Machine, you can accomplish this using Network Security Groups (NSG) with [service tags](/azure/virtual-network/network-security-groups-overview#service-tags).
61-
- If the client is connecting from a workstation on-premises, you might need to work with your network admin to allow network traffic through your corporate firewall.
79+
- If the client connects from a workstation on-premises, you might need to work with your network admin to allow network traffic through your corporate firewall.
6280

6381
To change the connection policy, see [Change the connection policy](connectivity-settings.md#change-the-connection-policy).
6482

6583
## Connectivity from within Azure
6684

67-
If you're connecting from within Azure your connections have a connection policy of `Redirect` by default. A policy of `Redirect` means that after the TCP session is established, the client session is then redirected to the right database cluster with a change to the destination virtual IP from that of the Azure SQL Database gateway to that of the cluster. Thereafter, all subsequent packets flow directly to the cluster, bypassing the gateway. The following diagram illustrates this traffic flow.
85+
If you connect from within Azure, your connections use a connection policy of `Redirect` by default. A `Redirect` policy means that after the TCP session is established, the client session redirects to the right database cluster. The destination virtual IP changes from the Azure SQL Database gateway to the cluster. All subsequent packets flow directly to the cluster, bypassing the gateway. The following diagram illustrates this traffic flow.
6886

6987
:::image type="content" source="media/connectivity-architecture/connectivity-azure.svg" alt-text="Diagram of the architecture overview of Azure SQL connectivity via redirection within Azure.":::
7088

7189
## Connectivity from outside of Azure
7290

73-
If you're connecting from outside Azure, your connections have a connection policy of `Proxy` by default. A policy of `Proxy` means that the TCP session is established via the Azure SQL Database gateway and all subsequent packets flow via the gateway. The following diagram illustrates this traffic flow.
91+
If you connect from outside Azure, your connections use a connection policy of `Proxy` by default. A policy of `Proxy` means that the TCP session is established via the Azure SQL Database gateway and all subsequent packets flow via the gateway. The following diagram illustrates this traffic flow.
7492

7593
:::image type="content" source="media/connectivity-architecture/connectivity-outside-azure.svg" alt-text="Diagram that shows how the TCP session is established via the Azure SQL Database gateway and all subsequent packets flow via the gateway.":::
7694

@@ -81,14 +99,14 @@ If you're connecting from outside Azure, your connections have a connection poli
8199

82100
This section lists the IP address ranges assigned to the regional gateways of SQL Database.
83101

84-
When the proxy [connection policy](#connection-policy) is in effect, database clients must be able to reach all given IP addresses in all ranges for the region of the logical server. With the redirect connection type, clients must be able to reach a wider set of IP addresses; refer to the `Sql.\<region\>` service tags in [Azure IP Ranges and Service Tags - Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519) for a complete list.
102+
When the proxy [connection policy](#connection-policy) is in effect, database clients must be able to reach all given IP addresses in all ranges for the region of the logical server. With the redirect connection type, clients must be able to reach a wider set of IP addresses. To accomplish this, use the `Sql.<region>` service tags in Azure. For more information, see [Azure IP Ranges and Service Tags - Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519).
85103

86104
Clients connecting to private endpoints don't need connectivity to any of these ranges because a private endpoint has direct connectivity to the gateways.
87105

88106
[!INCLUDE [gateway-ip-addresses](includes/gateway-ip-addresses.md)]
89107

90108
## Related content
91109

92-
- For information about Azure SQL Database connection behavior for clients that use ADO.NET 4.5 or a later version, see [Ports beyond 1433 for ADO.NET 4.5](adonet-v12-develop-direct-route-ports.md).
93-
- For general application development overview information, see [SQL Database Application Development Overview](develop-overview.md).
94-
- Refer to [Azure IP Ranges and Service Tags – Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519).
110+
- [Ports beyond 1433 for ADO.NET 4.5](adonet-v12-develop-direct-route-ports.md)
111+
- [Application development overview - Azure SQL Database & Azure SQL Managed Instance](develop-overview.md)
112+
- [Azure IP Ranges and Service Tags – Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519)

0 commit comments

Comments
 (0)