Share via

IP firewall for an Azure Relay blocking Azure public IP

Robin Martin 20 Reputation points
2026-02-18T08:59:13.8933333+00:00

I'm configuring a new Azure Relay service, wcfrelay, for an onpremise data gateway. I want to use IP address white listing as described here. The goal is to allow powerbi to connect to onprem SQL servers.

https://learn.microsoft.com/en-us/azure/azure-relay/ip-firewall-virtual-networks#enable-ip-firewall-rules

I added public network CIDR to allow my onprem server. But now I'm seeing a public IP address from Azure being blocked. The data gateway status in powerplatform admin also shows as disconnected. The relay I setup diagnostics for the Relay and seeing Deny connection in the Log Analytics for 20.92.128.xx

I also have enabled Allow Microsoft Trusted services to Bypass the firewall. Could it be some other service that's not on the trusted list? Is there a way I can determine what service it is.

I'm concerned about the security implications of whitelisting an Azure IP address or broad ranges.

Is this expected behaviour?

Azure Service Bus
Azure Service Bus

An Azure service that provides cloud messaging as a service and hybrid integration.


Answer accepted by question author

  1. kagiyama yutaka 1,990 Reputation points
    2026-02-22T19:48:21.4566667+00:00

    The 20.x deny is just the relay hitting its alt mgmt‑path… it shifts pools when your tenant’s region/perms don’t line up with the data‑plane, so the fw treats it like outside traffic. u just allow the single hop from the diag logs. I think it’s stable fix when the backend drifts like this.


1 additional answer

Sort by: Most helpful
  1. Q&A Assist
    2026-02-18T08:59:23.77+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    When configuring IP firewall rules for Azure Relay, it's important to ensure that all necessary IP addresses are whitelisted to avoid blocking legitimate services. Since you have already added your on-premises server's public network CIDR and enabled the option to allow Microsoft Trusted services to bypass the firewall, the blocking of the Azure public IP (20.92.128.xx) could be due to a service that is not included in the trusted list.

    To determine which service is attempting to connect and being blocked, you can check the logs in Log Analytics for more detailed information about the connection attempts and the specific services involved. This will help identify if there are additional Azure services that need to be included in your firewall rules.

    Regarding security implications, whitelisting broad ranges or specific Azure IP addresses can pose risks, as it may inadvertently allow unwanted access. It's advisable to limit the ranges as much as possible and regularly review the logs to monitor for any unauthorized access attempts.

    This behavior of blocking connections from Azure IPs is expected if those IPs are not explicitly allowed in your firewall rules, even with the trusted services option enabled.


    References:

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.