The errorlog on my installation reports the following:
SQL server listening on MY.INTERNAL.IP.1: 22847.
SQL server listening on MY.PUBLIC.IP: 22847.
SQL server listening on MY.INTERNAL.IP.2: 22847.
SQL server listening on 127.0.0.1: 22847.
SQL server listening on TCP, Named Pipes.
SQL Server is ready for client connections
How can I configure SQL to not listen at all on the public IP?
Thanks.
-RickHi
You have to configure IPSec at NIC level to disallow connections on the
public IP. By default and design, SQL Server will always listen on all IP's
and SQL Server can not be configured not to listen on them.
Regards
--
Mike Epprecht, Microsoft SQL Server MVP
Zurich, Switzerland
IM: mike@.epprecht.net
MVP Program: http://www.microsoft.com/mvp
Blog: http://www.msmvps.com/epprecht/
"Rick" <Rick@.discussions.microsoft.com> wrote in message
news:67BA2827-A522-40DB-B288-0C63A9A1797B@.microsoft.com...
> The errorlog on my installation reports the following:
> SQL server listening on MY.INTERNAL.IP.1: 22847.
> SQL server listening on MY.PUBLIC.IP: 22847.
> SQL server listening on MY.INTERNAL.IP.2: 22847.
> SQL server listening on 127.0.0.1: 22847.
> SQL server listening on TCP, Named Pipes.
> SQL Server is ready for client connections
> How can I configure SQL to not listen at all on the public IP?
> Thanks.
> -Rick
>|||Wow, I have to admit I don't know the first thing about IPSec. Is this a
configuration I can do in the OS?
Am I barking up the right tree? Isn't it common to not want your SQL Server
to be listening to the wild wild internet?
Thanks,
-Rick
"Mike Epprecht (SQL MVP)" wrote:
> Hi
> You have to configure IPSec at NIC level to disallow connections on the
> public IP. By default and design, SQL Server will always listen on all IP'
s
> and SQL Server can not be configured not to listen on them.
> Regards
> --
> Mike Epprecht, Microsoft SQL Server MVP
> Zurich, Switzerland
> IM: mike@.epprecht.net
> MVP Program: http://www.microsoft.com/mvp
> Blog: http://www.msmvps.com/epprecht/
> "Rick" <Rick@.discussions.microsoft.com> wrote in message
> news:67BA2827-A522-40DB-B288-0C63A9A1797B@.microsoft.com...
>
>|||> Isn't it common to not want your SQL Server
> to be listening to the wild wild internet?
Definitely. That's what firewalls are for.
Hope this helps.
Dan Guzman
SQL Server MVP
"Rick" <Rick@.discussions.microsoft.com> wrote in message
news:404BBC8C-884B-4ED5-8C24-703E44D0F35C@.microsoft.com...[vbcol=seagreen]
> Wow, I have to admit I don't know the first thing about IPSec. Is this a
> configuration I can do in the OS?
> Am I barking up the right tree? Isn't it common to not want your SQL
> Server
> to be listening to the wild wild internet?
> Thanks,
> -Rick
> "Mike Epprecht (SQL MVP)" wrote:
>|||"Dan Guzman" wrote:
> Definitely. That's what firewalls are for.
Thanks Dan. The system is a typical (dual-homed) SBS2003. I thought that I
got a level of firewalling with SBS. I guess I was naive. So I'm not sure
of which way to go. Would you folks recommend:
1) New hardware firewall (any suggestions?)
2) TCP/IP (and UDP) filtering in Advanced TCP/IP Settings?
3) IPSec policies?
4) Move my SQL databases to an internal server?
5) Combination of above?|||> 1) New hardware firewall (any suggestions?)
> 2) TCP/IP (and UDP) filtering in Advanced TCP/IP Settings?
> 3) IPSec policies?
> 4) Move my SQL databases to an internal server?
> 5) Combination of above?
Every company I've worked for uses a hardware firewall and deploys SQL
Servers on an internal network. You can get the job done using
IPSec/Filtering on your SQL Servers but it's best not to let the traffic in
at all. I'm not a network guy so you probably don't want my recommendations
on hardware :-)
Hope this helps.
Dan Guzman
SQL Server MVP
"Rick" <Rick@.discussions.microsoft.com> wrote in message
news:60607EA5-883E-4882-9EC7-2F0B4CB5FEBC@.microsoft.com...
> "Dan Guzman" wrote:
> Thanks Dan. The system is a typical (dual-homed) SBS2003. I thought that
> I
> got a level of firewalling with SBS. I guess I was naive. So I'm not
> sure
> of which way to go. Would you folks recommend:
> 1) New hardware firewall (any suggestions?)
> 2) TCP/IP (and UDP) filtering in Advanced TCP/IP Settings?
> 3) IPSec policies?
> 4) Move my SQL databases to an internal server?
> 5) Combination of above?
>
Wednesday, March 21, 2012
listening on... interfaces
Labels:
database,
errorlog,
followingsql,
installation,
interfaces,
internal,
listening,
microsoft,
mysql,
oracle,
public,
reports,
server,
sql
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment