New-AzFirewallPolicySqlSetting
Creates a new SQL Setting for Azure Firewall Policy
Syntax
New-AzFirewallPolicySqlSetting
[-AllowSqlRedirect]
[-DefaultProfile <IAzureContextContainer>]
[-WhatIf]
[-Confirm]
[<CommonParameters>]
Description
The New-AzFirewallPolicySqlSetting cmdlet creates a SQL Setting Object for Azure Firewall Policy
Examples
Example 1. Create a SQL setting that allows SQL server redirect mode traffic
New-AzFirewallPolicySqlSetting -AllowSqlRedirect
This example creates a SQL setting object with setting allow sql redirect.
Parameters
-AllowSqlRedirect
Allow SQL server redirect mode traffic. By default this type of traffic is not allowed.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Confirm
Prompts you for confirmation before running the cmdlet.
Type: | SwitchParameter |
Aliases: | cf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DefaultProfile
The credentials, account, tenant, and subscription used for communication with Azure.
Type: | IAzureContextContainer |
Aliases: | AzContext, AzureRmContext, AzureCredential |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-WhatIf
Shows what would happen if the cmdlet runs. The cmdlet is not run.
Type: | SwitchParameter |
Aliases: | wi |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
Inputs
None
Outputs
Collaborate with us on GitHub
The source for this content can be found on GitHub, where you can also create and review issues and pull requests. For more information, see our contributor guide.
Azure PowerShell