![]() Match: The rule will match traffic that matches the conditions you specify. The conditions column contains two options: ![]() The next step is to specify the conditions that the rule should meet. To enable the rule, click the Enable Rule button. Filtering: The rule will filter traffic from the specified source. The rule will log traffic from the specified source. Logging: The rule will log traffic from the specified source. The rule will block traffic from the specified source. The actions column contains three options:īlocking: The rule will block traffic from the specified source. The next step is to specify the actions that the rule should take. In the Source column, type the IP address or hostname of the computer you want to protect. In the Rule Name field, type a name for the rule. To create a new rule, click the Add Rule button. The Rule column lists the rule name, and the Source column lists the source of the rule. The first tab, Inbound Rules, contains two columns: Rule and Source. On the left, under “Azure SQL Database Firewall Rules,” you’ll see two tabs: Inbound and Outbound. To configure the firewall, open the Azure SQL Database Firewall in the Azure portal. ![]() The firewall is a powerful tool that can help protect your data against unauthorized access. If you’re familiar with Azure, you’re probably aware of the Azure SQL Database Firewall. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |