Unable to whitelist IPv6 range in Azure SQL Database — getting “IP address must be a valid IPv4 address” error

YERNAIDU SIRAPARAPU 125 Reputation points
2025-10-19T10:24:20.6266667+00:00

Hi everyone,

I’m trying to whitelist the following IPv6 range in my Azure SQL Database firewall settings:

8900:9aa0:1800::/30

However, when I try to add this range under Networking → Firewall and virtual networks, I get the following error:

“IP address must be a valid IPv4 address.”

It seems that the Azure SQL Database firewall currently only accepts IPv4 addresses.

My question is:

Is there any way to add or whitelist an IPv6 range in Azure SQL Database?

If not, does Azure currently support IPv6-based connections for SQL Database?

Are there any upcoming updates or known workarounds for IPv6-only environments?

Any clarification on IPv6 support for Azure SQL Database firewall rules would be really helpful.

Thanks!

Azure SQL Database
{count} votes

1 answer

Sort by: Most helpful
  1. Marcin Policht 63,720 Reputation points MVP Volunteer Moderator
    2025-10-19T11:13:41.36+00:00

    That's correct - at this time, Azure SQL Database firewall rules only support IPv4 addresses and ranges. You cannot add or whitelist IPv6 addresses or CIDR blocks like — the portal, ARM templates, CLI, and PowerShell will all reject them with the “must be a valid IPv4 address” error you saw. This is by design — the SQL Database firewall system and service endpoints are currently IPv4-only. Even if your client or network stack is IPv6-capable, the service endpoints (*.database.windows.net) resolve to IPv4 addresses only. That means all client-to-server communication happens over IPv4.

    If your environment is IPv6-only, here are your main options:

    1. Use a dual-stack or NAT64 gateway – enable outbound IPv4 translation for traffic destined to *.database.windows.net. This allows IPv6-only subnets to reach IPv4 services through NAT64 or DNS64.
      • This is the most common approach in hybrid IPv6 deployments.
    2. Use a private endpoint (recommended) – instead of relying on the public firewall, create a Private Endpoint for your SQL Database inside your dual-stack or IPv4-enabled VNet.
      • This allows internal name resolution and connectivity over IPv4 through Azure backbone networking, bypassing the need to whitelist public IPs.

    AFAIK, Microsoft has not announced any general availability or preview of IPv6 support for Azure SQL Database endpoints. Some Azure PaaS services (like Storage, App Service, and AKS) have rolled out IPv6 support, but SQL Database remains IPv4-only. There is no public roadmap or ETA, though IPv6 support is a commonly requested feature on the Azure Feedback Portal.


    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.