Welcome to Microsoft Q&A forum.
In addition to the above answers, I suppose you are trying to connect to your Azure SQL Database through SSMS.
As the error signifies pre-login handshake with error code: 10054.
It could be due to one of the following reasons.
1). For Hand-shake failure, this maybe due to transient network/connection error.
Steps to resolve the same are:
- Make sure that TCP/IP is enabled as a client protocol on the application server. For more information, see Configure client protocols. On application servers where you don't have SQL tools installed, verify that TCP/IP is enabled by running cliconfg.exe (SQL Server Client Network utility).
- Check the application's connection string to make sure it's configured correctly. For example, make sure that the connection string specifies the correct port (1433) and fully qualified server name. See Get connection information.
- Try increasing the connection timeout value. We recommend using a connection timeout of at least 30 seconds.
- Test the connectivity between the application server and the Azure SQL Database by using SQL Server Management Studio (SSMS), a UDL file, ping, or telnet. For more information, see Troubleshooting connectivity issues and Diagnostics for connectivity issues.
Note
As a troubleshooting step, you can also test connectivity on a different client computer.
- As a best practice, make sure that the retry logic is in place. For more information about retry logic, see Troubleshoot transient faults and connection errors to SQL Database.
2). For Error 10054, connection forcibly closed by host, this might be due to credential issue or when No matching TLS protocols exist between the client and the server. The issue occurs because the server and the client can't find a matching protocol (such as TLS 1.0 or TLS 1.1). A matching protocol is needed to complete the TLS handshake required to proceed with the connection.
Solution could be:
- Upgrade your SQL Server or your client providers to a version that supports TLS 1.2. For more information, see TLS 1.2 support for Microsoft SQL Server.
- Ask your system administrators to temporarily enable TLS 1.0 or TLS 1.1 on both the client and the server computers by performing one of the following actions:
- Use the IIS Crypto tool (Ciphers suites section) to validate and make changes to the current TLS settings.
- Start Registry Editor, and locate the Schannel-specific registry keys:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL
. For more information, see TLS 1.2 Upgrade Workflow and SSL Errors after Upgrading to TLS 1.2.
- Start Registry Editor, and locate the Schannel-specific registry keys:
- Use the IIS Crypto tool (Ciphers suites section) to validate and make changes to the current TLS settings.
There could be other SCENARIOS too which are mentioned here in the documentation which could help: https://learn.microsoft.com/en-us/troubleshoot/sql/database-engine/connect/tls-exist-connection-closed
Please refer above 5 scenarios and solutions, kindly try and let us know if this helped.
If not, do let us know so that we can for look for other options to unblock you.
Awaiting your reply.
Thank you.