Skip to content

Latest commit

 

History

History
42 lines (33 loc) · 2.78 KB

File metadata and controls

42 lines (33 loc) · 2.78 KB
title Securing Replication Over the Internet | Microsoft Docs
ms.custom
ms.date 03/14/2017
ms.prod sql-server-2016
ms.reviewer
ms.suite
ms.technology
replication
ms.tgt_pltfrm
ms.topic article
helpviewer_keywords
security [SQL Server replication], Internet
Internet [SQL Server replication], security
ms.assetid 25b7af05-2721-4b24-9083-fb671e8bf4e0
caps.latest.revision 28
author BYHAM
ms.author rickbyh
manager jhubbard

Securing Replication Over the Internet

Replication over the Internet can provide flexibility, particularly for mobile Subscribers, but you must configure Internet replication appropriately to ensure adequate security. [!INCLUDEmsCoName] recommends using one of two techniques for securely sharing information over the Internet:

  • Virtual private network (VPN)

  • The Web synchronization option for merge replication

Virtual Private Network

Virtual private networks provide a simple and secure layered approach to replicating [!INCLUDEssNoVersion] data over the Internet. The VPN connection over the Internet logically operates as a Wide Area Network (WAN) link between the sites.

This is achieved by allowing the user to tunnel through the Internet or another public network using a protocol such as [!INCLUDEmsCoName] Point-to-Point Tunneling Protocol (PPTP) available with the [!INCLUDEmsCoName] Windows NT version 4.0 or [!INCLUDEmsCoName] Windows 2000 operating system, or Layer Two Tunneling Protocol (L2TP) available with the Windows 2000 operating system. This process provides security and features similar to those available in a private network.

For more information about setting up a VPN, see the [!INCLUDEmsCoName] Windows documentation.

Web Synchronization Through IIS

The web synchronization option for merge replication provides the ability to replicate data using the HTTPS protocol, which can be a convenient approach to replicating data through a firewall. For more information, see Configure Web Synchronization and Security Architecture for Web Synchronization.

See Also

Replication Security Best Practices
Security and Protection (Replication)