Public Access Allowed to Azure SQL PaaS When Disabled in SQL Firewall

Sheik Mohamed Yasar 145 Reputation points
2025-03-05T07:12:44.8733333+00:00

A SQL PaaS instance in Azure has public access disabled, but Azure VNet access is allowed. Telnet from any external network is successful, yet logging into SQL fails. Shouldn't telnet also be blocked if public access is disabled? Why is telnet permitted from external networks?

Azure SQL Database
0 comments No comments
{count} votes

Accepted answer
  1. TP 108.6K Reputation points
    2025-03-05T07:24:03.8866667+00:00

    Hi,

    What you are seeing is normal and expected.

    Azure SQL Database is a multi-tenant Platform-as-a-Service (PaaS) and as a result you are not connecting to a public IP address for a dedicated instance of SQL Server. Instead it is shared by many different customers, some of which allow access via public Internet.

    When you telnet from external network you are making an initial, unauthenticated TCP connection to shared Gateway. At this point in the connection process the service doesn't have enough information to decide if the connection should be allowed or not based on SQL firewall settings.

    When you attempt a full SQL connection using an appropriate client, the connection fails (as you noted in your question) as soon as the service has enough information to know that it should be blocked due to SQL firewall settings.

    Please see article below for details on Azure SQL Database connectivity architecture.

    Azure SQL Database and Azure Synapse Analytics connectivity architecture

    https://learn.microsoft.com/en-us/azure/azure-sql/database/connectivity-architecture?view=azuresql#connectivity-architecture

    Please click Accept Answer and upvote if the above was helpful.

    Thanks.

    -TP

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.