473,554 Members | 3,061 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

firewall rules for SQL Server

If we are doing a 1-way replication from a SQL Server 2000 (Publisher)
through a firewall to a SQL Server 2005 (Subscriber), do any ports need
to be opened from the Subscriber back to the Publisher? That is, we
have 1433, 1434 opened outgoing from the Publisher to Subscriber but for
successful communications, do any ports have to be opened the other way?

Sorry, I'm new to this.

Thanks,
Mike H.
Jun 27 '08 #1
1 2857
Jim
On 2008-05-19, Mike Husler <Mi************ **@noaa.govwrot e:
If we are doing a 1-way replication from a SQL Server 2000 (Publisher)
through a firewall to a SQL Server 2005 (Subscriber), do any ports need
to be opened from the Subscriber back to the Publisher? That is, we
have 1433, 1434 opened outgoing from the Publisher to Subscriber but for
successful communications, do any ports have to be opened the other way?
When we do replication between sites we tend to only open port 1433. Well,
we tend to use a different port, but you get the picture.

Jim
--
http://www.ursaMinorBeta.co.uk http://twitter.com/GreyAreaUK

"Sometimes when I talk to a Windows person about using a Mac,
I feel like I'm explaining Van Halen to a horse." Merlin Mann
Jun 27 '08 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
1394
by: Ryan Smith | last post by:
Hi All I have an app and in that app i have a registration program that i wrote that will send the users registration data to the server and then receive a response code back from the server and unlock the software through a registry entry Here is my problem. It seems that many of my users are having trouble due to new firewall applications...
2
2779
by: Rajesh Kapur | last post by:
Hello, We use Informix and MySQL on linux/unix to drive our web application. SQL*Server is used only for backend enterprise applications within the firewall. I am trying to get the management to use SQL*Server outside the firewall. They tell me there are security issues with Microsoft products, including SQL*Server, that make it vulnerable...
6
2356
by: dstewart | last post by:
I have 2 Suse 9.1 boxes with similar configurations. I'm in the process of moving some PHP code from one server (192.168.0.100) to another (192.168.0.102). MySQL is running on each server, and the same PHP code can access its respective localhost databases and make queries with no problem. However, the code on the old server (.100) can...
2
17966
by: Mahesh Devjibhai Dhola | last post by:
Can you please help me in my problem? I have a socket prog. application like http://www.codeproject.com/dotnet/csharpwhiteboard.asp My application is chat application like above architecture. I want to bypass firewall aswell as proxy if any on two chat clients like yahoo or msn can chat beyond proxy/firewalls...
4
1632
by: Sandeep | last post by:
All, First let me explain My Application's deployment scenerio. My Application server is on win2003 + IIS6.0. I created a local user called XYZ on the server. My web application's pool run under this user's identity. The DB machine (SQL Server 2000)on which the DTS is present is having the same local account with the same credentials. In my...
1
1649
by: Schalley Ben | last post by:
Hi First of all, this is my first post on a newsgroup so don't shoot me if I ask this in the wrong place. Here is the situation. I'm developing an asp.net application with access to a SQL Server 2000 on the companies network. On my development machine I have Bitdefender Internet Security v10 installed. With the Bitdefender Firewall...
2
3986
by: PW | last post by:
I have a Netgear DG834G (v3) wireless router. I also host an ASP website from my home computer. I had a problem when I first got this router that was blocking requests from outside from seeing the website. I overcame that problem by adding a firewall rule and everything has been working fine for months. Then last night I had my computer...
1
2599
by: rada.lambretha | last post by:
Configuring Linux as a Firewall * Making installation choices * Introducing iptables * Using iptables commands * Simplifying things with firewall GUIs * Adding proxy functionality As Linux gains increasing acceptance in corporate datacenters and
1
5960
dlite922
by: dlite922 | last post by:
I'm a linux n00b, but i know enough to find my way around and not cause mayhem. With the help of online tutorials and someone else who knows just a little more than me, we've managed to install sendmail and dovecot? ssl-auth. But don't know if everything is installed right. I can telent localhost 25, but when doing the same from...
0
7506
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language...
0
7782
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. ...
0
7872
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
0
6123
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
1
5423
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes...
0
5142
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert...
0
3533
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
2006
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
1
1114
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.