New-AzFirewallPolicySqlSetting
Creates a new SQL Setting for Azure Firewall Policy
Syntax
New-AzFirewallPolicySqlSetting
[-AllowSqlRedirect]
[-DefaultProfile <IAzureContextContainer>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Description
The New-AzFirewallPolicySqlSetting cmdlet creates a SQL Setting Object for Azure Firewall Policy
Examples
Example 1. Create a SQL setting that allows SQL server redirect mode traffic
New-AzFirewallPolicySqlSetting -AllowSqlRedirect
This example creates a SQL setting object with setting allow sql redirect.
Parameters
-AllowSqlRedirect
Allow SQL server redirect mode traffic. By default this type of traffic is not allowed.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Confirm
Prompts you for confirmation before running the cmdlet.
Type: | SwitchParameter |
Aliases: | cf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DefaultProfile
The credentials, account, tenant, and subscription used for communication with Azure.
Type: | IAzureContextContainer |
Aliases: | AzContext, AzureRmContext, AzureCredential |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-WhatIf
Shows what would happen if the cmdlet runs. The cmdlet is not run.
Type: | SwitchParameter |
Aliases: | wi |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Inputs
None