Hello Guys,
I'm trying to disable the public endpoint on our SQL Server. And only allow traffic from resources hosted on Azure or users that are connected to the Azure VPN on their local machine.
I managed to create the virtual network, subnets, network gateway, and databases without any problem.
However, I seem not to be able to connect to my Azure SQL server over the private link IP.
Setup:
VNET:
10.88.0.0/16
subnets:
SQL:10.88.2.0/24
Gateway:10.88.32.0/24
Virtual Network gateway
P2S on the VNET above with an address pool of 10.90.32.0/24 using Azure AD. (Works fine)
Azure SQL Server
With public access denied
Also, a private link has been added to the SQL server. It has gotten a private IP of 10.88.2.4.
Unfortunately, I am not able to connect to that IP address from my machine where the VPN is running. (Error: Cannot open server "10.54.2.4" requested by the login. The login failed.) Although the same credentials can be used on the public DNS name if enabled and it works immediately.
Does anyone have any guidance on what I did wrong?