Henry Sieff wrote:

> it depends on whether or not you have set your Client Network
> Configuration to use TCP/IP or Named Pipes by default. You can do this
> by setting it to use TCP/IP, and then port 1433 (or whatever you want,
> if you change it on the server side).
> 
> I would think very carefully about the architecture decisions which
> require this. Its a risky decision to allow this through a firewall;
> its a topic of much discussion and most resolutions require compromise
> and heartache (the yin and yang of network design, actually.)

I agree. We allow connections to SQL servers only from inside the 
network (which includes things on both sides of the VPN) so that we can 
maintain things without using terminal services to get all the way 
there, transfer files, and so on. It's terminally annoying that you 
cannot simply DTS a large amount of data into some sort of archive and 
then DTS it back; I bet someone could make some good money writing a new 
data converter for SQL that would let you do that. If you do this, I 
expect a cookie.

I highly suggest you not allow SQL access from the outside world. Even 
allowing it only from a given IP could be a risk, though that's less 
likely. Especially DO NOT allow connections to SQL from the outside if 
you are using SQL security rather than only mixed-mode; Passwords for 
SQL server security are (at least in SQL 7 and below) sent in clear 
text. I suspect they are in SQL 2000 as well. In addition, there is no 
protection for repeated login failures, so someone can brute force their 
way into your SA account across the 'net.


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to