Skip to content

Latest commit

 

History

History
38 lines (29 loc) · 2.79 KB

securing-replication-over-the-internet.md

File metadata and controls

38 lines (29 loc) · 2.79 KB
title description author ms.author ms.date ms.service ms.subservice ms.topic ms.custom helpviewer_keywords monikerRange
Securing Replication Over the Internet
Securing Replication Over the Internet
MashaMSFT
mathoma
03/14/2017
sql
replication
how-to
updatefrequency5
security [SQL Server replication], Internet
Internet [SQL Server replication], security
=azuresqldb-mi-current||>=sql-server-2016

Securing Replication Over the Internet

[!INCLUDEsql-asdbmi] Replication over the Internet can provide flexibility, particularly for mobile Subscribers, but you must configure Internet replication appropriately to ensure adequate security. [!INCLUDEmsCoName] recommends using one of two techniques for securely sharing information over the Internet:

  • Virtual private network (VPN)

  • The Web synchronization option for merge replication

Virtual Private Network

Virtual private networks provide a simple and secure layered approach to replicating [!INCLUDEssNoVersion] data over the Internet. The VPN connection over the Internet logically operates as a Wide Area Network (WAN) link between the sites.

This is achieved by allowing the user to tunnel through the Internet or another public network using a protocol such as [!INCLUDEmsCoName] Point-to-Point Tunneling Protocol (PPTP) available with the [!INCLUDEmsCoName] Windows NT version 4.0 or [!INCLUDEmsCoName] Windows 2000 operating system, or Layer Two Tunneling Protocol (L2TP) available with the Windows 2000 operating system. This process provides security and features similar to those available in a private network.

For more information about setting up a VPN, see the [!INCLUDEmsCoName] Windows documentation.

Web Synchronization Through IIS

The web synchronization option for merge replication provides the ability to replicate data using the HTTPS protocol, which can be a convenient approach to replicating data through a firewall. For more information, see Configure Web Synchronization and Security Architecture for Web Synchronization.

See Also

Replication Security Best Practices
View and modify replication security settings