Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Applies to:
Azure SQL Database
SQL database in Fabric
This article explains the architecture of various components that direct network traffic to a server in Azure SQL Database and SQL database in Microsoft Fabric. It covers different connection policies and how they affect clients connecting from within Azure and clients connecting from outside of Azure.
For connection strings to Azure SQL Database, see Connect and query to Azure SQL Database.
For settings that control connectivity to the logical server for Azure SQL Database, see connectivity settings.
This article does not apply to Azure SQL Managed Instance. For more information, see Connectivity architecture for Azure SQL Managed Instance.
This article does not apply to dedicated SQL pools in Azure Synapse Analytics.
For settings that control connectivity to dedicated SQL pools in Azure Synapse Analytics, see Azure Synapse Analytics connectivity settings.
For connection strings to Azure Synapse Analytics pools, see Connect to Synapse SQL.
Connectivity architecture overview
The following diagram provides a high-level overview of the connectivity architecture.
The following steps describe how to establish a connection:
Clients connect to the gateway that has a public IP address and listens on port 1433.
Depending on the effective connection policy, the gateway redirects or proxies the traffic to the correct database cluster.
Inside the database cluster, the gateway forwards traffic to the appropriate database.
Connection policy
Logical SQL servers support the following three options for the server's connection policy setting:
Redirect (recommended): Clients establish connections directly to the node hosting the database, which reduces latency and improves throughput. To use this mode for connections, clients need to:
Allow outbound communication from the client to all Azure SQL IP addresses in the region on ports in the range of 11000 to 11999. Use the Service Tags for SQL to make this easier to manage. If you're using Private Link, see Use Redirect connection policy with private endpoints for the port ranges to allow.
Allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
When you use the Redirect connection policy, see the Azure IP Ranges and Service Tags - Public Cloud for a list of your region's IP addresses to allow.
Proxy: In this mode, all connections go through the Azure SQL Database gateways, which increases latency and reduces throughput. To use this mode for connections, clients need to allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
- When you use the Proxy connection policy, see the Gateway IP addresses list later in this article for your region's IP addresses to allow.
Default: This connection policy is in effect on all servers after creation unless you explicitly alter the connection policy to either
ProxyorRedirect. The default policy is:Redirectfor all client connections originating inside of Azure (for example, from an Azure Virtual Machine).Proxyfor all client connections originating outside (for example, connections from your local workstation).Currently, the connection policy for SQL database in Microsoft Fabric is default and can't be changed.
For the lowest latency and highest throughput, we highly recommend the Redirect connection policy instead of the Proxy connection policy. However, you need to meet the extra requirements for allowing network traffic for outbound communication:
If the client is an Azure Virtual Machine, you can accomplish this requirement by using Network Security Groups (NSG) with service tags.
If the client connects from a workstation on-premises, you might need to work with your network admin to allow network traffic through your corporate firewall.
To change the connection policy, see Change the connection policy.
Connectivity from within Azure
If you connect from within Azure, your connections use a connection policy of Redirect by default. A Redirect policy means that after the TCP session is established, the client session redirects to the right database cluster. The destination virtual IP changes from the Azure SQL Database gateway to the cluster. All subsequent packets flow directly to the cluster, bypassing the gateway. The following diagram illustrates this traffic flow.
Connectivity from outside of Azure
If you connect from outside Azure, your connections use a connection policy of Proxy by default. A policy of Proxy means that the TCP session is established via the Azure SQL Database gateway and all subsequent packets flow via the gateway. The following diagram illustrates this traffic flow.
Important
Open TCP ports 1434 and 14000-14999 to enable Connecting with DAC.
Gateway IP addresses
This section lists the IP address ranges assigned to the regional gateways of SQL Database.
When the proxy connection policy is in effect, database clients must be able to reach all given IP addresses in all ranges for the region of the logical server. With the redirect connection type, clients must be able to reach a wider set of IP addresses. To accomplish this, use the Sql.<region> service tags in Azure. For more information, see Azure IP Ranges and Service Tags - Public Cloud.
Clients connecting to private endpoints don't need connectivity to any of these ranges because a private endpoint has direct connectivity to the gateways.
| Region name | Gateway IP address ranges |
|---|---|
| East Asia | 13.75.32.192/29, 13.75.33.192/29, 20.195.72.32/27, 20.205.77.176/29, 20.205.77.200/29, 20.205.83.224/29 |
| Southeast Asia | 13.67.16.192/29, 20.195.65.32/27, 23.98.80.192/29, 40.78.232.192/29 |
| Australia Central | 20.36.105.32/29, 20.53.48.96/27 |
| Australia Central 2 | 20.36.113.32/29, 20.53.56.32/27 |
| Australia East | 13.70.112.32/29, 20.53.46.128/27, 40.79.160.32/29, 40.79.168.32/29 |
| Australia Southeast | 4.199.88.48/29, 13.77.49.32/29, 104.46.179.160/27 |
| Austria East | 68.210.154.160/29, 68.210.175.32/27, 68.210.192.48/29, 68.210.208.48/29 |
| Belgium Central | 9.160.56.96/27, 9.160.82.136/29, 9.160.88.48/29, 9.160.112.48/29 |
| Brazil South | 191.233.200.32/29, 191.234.142.160/27, 191.234.144.32/29, 191.234.152.32/27, 191.234.153.32/27, 191.234.157.136/29 |
| Brazil Southeast | 191.233.15.160/27, 191.233.48.32/29 |
| Canada Central | 13.71.168.32/29, 20.38.144.32/29, 20.48.196.32/27, 52.246.152.32/29 |
| Canada East | 40.69.105.32/29, 52.139.106.192/27 |
| Chile Central | 68.211.15.128/27, 68.211.154.160/29, 68.211.168.24/29, 68.211.184.24/29 |
| China East | 52.130.13.96/27, 52.130.112.136/29 |
| China East 2 | 52.130.7.0/27, 52.130.120.88/29 |
| China East 3 | 52.131.155.192/29, 163.228.53.32/27 |
| China North | 40.72.77.128/27, 52.130.128.88/29 |
| China North 2 | 52.130.21.160/27, 52.130.40.64/29 |
| China North 3 | 52.131.27.192/29, 159.27.21.32/27, 159.27.195.192/29, 159.27.203.192/29 |
| North Europe | 13.69.233.136/29, 13.74.105.192/29, 52.138.229.72/29, 52.146.133.128/27 |
| West Europe | 13.69.112.168/29, 20.61.99.192/27, 52.236.184.32/29, 104.40.169.32/29 |
| France Central | 20.43.47.192/27, 40.79.128.32/29, 40.79.136.32/29, 40.79.144.32/29 |
| France South | 40.79.176.40/29, 40.79.177.32/29, 52.136.185.0/27 |
| Germany West Central | 51.116.149.32/27, 51.116.152.32/29, 51.116.240.32/29, 51.116.248.32/29 |
| Germany North | 51.116.54.96/27, 51.116.57.32/29 |
| Central India | 20.192.43.160/27, 20.192.96.32/29, 40.80.48.32/29, 104.211.86.32/29 |
| South India | 40.78.192.32/29, 40.78.193.32/29, 52.172.113.96/27 |
| West India | 52.136.53.160/27, 104.211.144.32/29, 104.211.145.32/29 |
| Indonesia Central | 70.153.167.64/27, 70.153.177.64/29, 70.153.200.24/29, 70.153.216.24/29 |
| Israel Central | 20.217.53.0/27, 20.217.59.248/29, 20.217.75.192/29, 20.217.91.192/29 |
| Israel Northwest | 51.4.136.96/27, 51.4.136.96/27, 51.4.162.136/29, 51.4.162.136/29 |
| Italy North | 4.232.101.160/27, 4.232.107.184/29, 4.232.123.192/29, 4.232.195.192/29 |
| Japan East | 13.78.104.32/29, 20.191.165.160/27, 40.79.184.32/29, 40.79.192.32/29 |
| Japan West | 4.190.144.24/29, 20.18.179.192/29, 20.189.225.160/27, 40.74.96.32/29 |
| Jio India Central | 20.192.48.32/27, 20.192.233.32/29 |
| Jio India West | 20.192.167.224/27, 20.193.200.32/29 |
| Korea Central | 20.44.24.32/29, 20.194.64.32/29, 20.194.73.64/27, 52.231.16.32/29 |
| Korea South | 52.147.112.160/27, 52.231.151.88/29, 52.231.151.96/27 |
| Malaysia South | 20.17.59.128/27, 20.17.67.248/29 |
| Malaysia West | 20.17.127.96/27, 20.17.127.96/27, 20.17.131.40/29, 20.17.131.40/29, 20.17.168.24/29, 20.17.168.24/29, 20.17.184.24/29, 20.17.184.24/29 |
| Mexico Central | 158.23.11.184/29, 158.23.112.160/27, 158.23.123.192/29, 158.23.195.192/29 |
| New Zealand North | 172.204.167.64/27, 172.204.177.0/29, 172.204.192.24/29, 172.204.208.24/29 |
| Norway East | 51.120.96.32/29, 51.120.104.32/29, 51.120.208.32/29, 51.120.232.192/27 |
| Norway West | 51.13.136.224/27, 51.120.217.32/29 |
| Poland Central | 20.215.13.0/27, 20.215.19.192/29, 20.215.27.192/29, 20.215.155.248/29 |
| Qatar Central | 20.21.43.248/29, 20.21.53.32/27, 20.21.67.192/29, 20.21.75.192/29 |
| South Africa North | 102.133.120.32/29, 102.133.152.32/29, 102.133.221.224/27, 102.133.248.32/29 |
| South Africa West | 102.37.80.96/27, 102.133.25.32/29 |
| Spain Central | 68.221.40.160/27, 68.221.99.184/29, 68.221.147.192/29, 68.221.154.88/29 |
| Sweden Central | 51.12.46.32/27, 51.12.96.32/29, 51.12.224.32/29, 51.12.232.32/29 |
| Sweden South | 51.12.198.32/27, 51.12.200.32/29, 51.12.201.32/29 |
| Switzerland North | 20.208.19.192/29, 51.103.203.192/29, 51.107.56.32/29, 51.107.242.32/27 |
| Switzerland West | 51.107.153.32/29, 51.107.250.64/27 |
| Taiwan North | 51.53.101.32/27, 51.53.107.248/29 |
| Taiwan Northwest | 51.53.182.32/27, 51.53.187.248/29 |
| UAE Central | 20.37.71.64/27, 20.37.72.96/29, 20.37.73.96/29, 74.243.18.24/29 |
| UAE North | 20.38.143.64/27, 20.38.152.24/29, 40.120.72.32/29, 65.52.248.32/29 |
| UK South | 51.105.64.32/29, 51.105.72.32/29, 51.140.144.32/29, 51.143.209.224/27 |
| UK West | 20.58.66.128/27, 51.140.208.96/29, 51.140.209.32/29 |
| Central US | 13.89.168.192/29, 20.40.228.128/27, 52.182.136.192/29, 104.208.21.192/29 |
| North Central US | 20.49.119.32/27, 20.125.171.192/29, 20.125.203.192/29, 52.162.105.192/29, 52.162.105.200/29 |
| South Central US | 20.45.121.32/29, 20.49.88.32/29, 20.49.89.32/29, 20.65.132.160/27, 40.124.64.136/29, 48.221.168.48/29 |
| South Central US 2 | 48.216.10.160/29, 48.216.34.32/27 |
| West Central US | 13.71.193.32/29, 20.69.0.32/27, 57.151.152.24/29, 172.215.203.64/29 |
| East US | 20.42.65.64/29, 20.42.73.0/29, 20.62.132.160/27, 52.168.116.64/29 |
| East US 2 | 20.62.58.128/27, 40.70.144.192/29, 52.167.104.192/29, 104.208.150.192/29, 172.210.216.24/29 |
| Central US EUAP | 20.46.11.32/27, 20.46.11.32/27, 40.78.200.128/29, 40.78.200.128/29, 40.78.201.128/29, 40.78.201.128/29 |
| East US 2 EUAP | 20.51.17.160/27, 40.74.144.32/29, 40.74.145.32/29, 40.75.32.40/29, 40.75.33.32/29, 52.138.88.32/29, 52.138.89.32/29, 68.220.82.88/29 |
| Southeast US | 57.151.223.64/27, 68.154.137.64/29 |
| Southeast US 3 | 74.7.56.224/27, 74.7.82.136/29 |
| West US | 13.86.217.224/29, 13.86.217.224/29, 20.66.3.64/27, 20.66.3.64/27, 20.168.163.192/29, 20.168.163.192/29 |
| West US 2 | 13.66.136.192/29, 20.51.9.128/27, 40.78.240.192/29, 40.78.248.192/29 |
| West US 3 | 4.236.112.48/29, 20.150.168.32/29, 20.150.176.32/29, 20.150.184.32/29, 20.150.241.128/27 |