| title | Securing Replication Over the Internet | Microsoft Docs | ||
|---|---|---|---|
| ms.custom | |||
| ms.date | 03/14/2017 | ||
| ms.prod | sql | ||
| ms.prod_service | database-engine | ||
| ms.reviewer | |||
| ms.technology | replication | ||
| ms.topic | conceptual | ||
| helpviewer_keywords |
|
||
| ms.assetid | 25b7af05-2721-4b24-9083-fb671e8bf4e0 | ||
| author | MashaMSFT | ||
| ms.author | mathoma | ||
| monikerRange | =azuresqldb-mi-current||>=sql-server-2016||=sqlallproducts-allversions |
[!INCLUDEappliesto-ss-asdbmi-xxxx-xxx-md] Replication over the Internet can provide flexibility, particularly for mobile Subscribers, but you must configure Internet replication appropriately to ensure adequate security. [!INCLUDEmsCoName] recommends using one of two techniques for securely sharing information over the Internet:
-
Virtual private network (VPN)
-
The Web synchronization option for merge replication
Virtual private networks provide a simple and secure layered approach to replicating [!INCLUDEssNoVersion] data over the Internet. The VPN connection over the Internet logically operates as a Wide Area Network (WAN) link between the sites.
This is achieved by allowing the user to tunnel through the Internet or another public network using a protocol such as [!INCLUDEmsCoName] Point-to-Point Tunneling Protocol (PPTP) available with the [!INCLUDEmsCoName] Windows NT version 4.0 or [!INCLUDEmsCoName] Windows 2000 operating system, or Layer Two Tunneling Protocol (L2TP) available with the Windows 2000 operating system. This process provides security and features similar to those available in a private network.
For more information about setting up a VPN, see the [!INCLUDEmsCoName] Windows documentation.
The web synchronization option for merge replication provides the ability to replicate data using the HTTPS protocol, which can be a convenient approach to replicating data through a firewall. For more information, see Configure Web Synchronization and Security Architecture for Web Synchronization.
Replication Security Best Practices
View and modify replication security settings