sp_set_firewall_rule (Azure SQL Database)
Applies to: Azure SQL Database Azure Synapse Analytics
Creates or updates the server-level firewall settings for your SQL Database server. This stored procedure is only available in the master
database to the server-level principal login or assigned Microsoft Entra ID (formerly Azure Active Directory) principal.
Syntax
sp_set_firewall_rule
[ @name = ] N'name'
, [ @start_ip_address = ] 'start_ip_address'
, [ @end_ip_address = ] 'end_ip_address'
[ ; ]
Arguments
[ @name = ] N'name'
The name used to describe and distinguish the server-level firewall setting. @name is nvarchar(128).
[ @start_ip_address = ] 'start_ip_address'
The lowest IP address in the range of the server-level firewall setting. @start_ip_address is varchar(50). IP addresses equal to or greater than this can attempt to connect to the SQL Database server. The lowest possible IP address is 0.0.0.0
.
[ @end_ip_address = ] 'end_ip_address'
The highest IP address in the range of the server-level firewall setting. @end_ip_address is varchar(50). IP addresses equal to or less than this can attempt to connect to the SQL Database server. The highest possible IP address is 255.255.255.255
.
Azure connection attempts are allowed when both this field and the @start_ip_address field equal 0.0.0.0
.
Remarks
The names of server-level firewall settings must be unique. If the name of the setting provided for the stored procedure already exists in the firewall settings table, the starting and ending IP addresses are updated. Otherwise, a new server-level firewall setting is created.
When you add a server-level firewall setting where the beginning and ending IP addresses are equal to 0.0.0.0
, you enable access to your SQL Database server from Azure. Provide a value to the name parameter that helps you remember what the server-level firewall setting is for.
In SQL Database, login data required to authenticate a connection and server-level firewall rules are temporarily cached in each database. This cache is periodically refreshed. To force a refresh of the authentication cache and make sure that a database has the latest version of the logins table, execute DBCC FLUSHAUTHCACHE.
This is an extended stored procedure, so the data type of the value passed in for each parameter must match the parameter definition.
Permissions
Only the server-level principal login created by the provisioning process or a Microsoft Entra ID principal assigned as admin can create or modify server level firewall rules. The user must be connected to the master
database to execute sp_set_firewall_rule
.
Examples
The following code creates a server-level firewall setting called Allow Azure
that enables access from Azure. Execute the following script in the virtual master
database.
-- Enable Azure connections.
EXEC sp_set_firewall_rule N'Allow Azure', '0.0.0.0', '0.0.0.0';
The following code creates a server-level firewall setting called Example setting 1
for only the IP address 0.0.0.2
. Then, the sp_set_firewall_rule
stored procedure is called again to update the end IP address to 0.0.0.4
, in that firewall setting. This creates a range, which allows IP addresses 0.0.0.2
, 0.0.0.3
, and 0.0.0.4
to access the server.
-- Create server-level firewall setting for only IP 0.0.0.2
EXEC sp_set_firewall_rule N'Example setting 1', '0.0.0.2', '0.0.0.2';
-- Update server-level firewall setting to create a range of allowed IP addresses
EXEC sp_set_firewall_rule N'Example setting 1', '0.0.0.2', '0.0.0.4';