<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Talking to SQL server from DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/talking-to-sql-server-from-dmz/m-p/648097#M1025069</link>
    <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to get a web server that we have on our DMZ to communicate with my SQL server but I wanted to know if anyone knew why I needed to use gt 1024 in my access statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I orginialy tried to use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ extended permit tcp host 192.168.1.100 eq 1433 host 10.10.10.23 eq 1433&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but had to change it to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list fromDMZ extended permit tcp host 192.168.1.100 gt 1024 host 10.10.10.23 eq 1433&lt;/P&gt;&lt;P&gt;in order for it to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just trying to figure out why?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any info would be helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 09:37:40 GMT</pubDate>
    <dc:creator>boschrexroth</dc:creator>
    <dc:date>2019-03-11T09:37:40Z</dc:date>
    <item>
      <title>Talking to SQL server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/talking-to-sql-server-from-dmz/m-p/648097#M1025069</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to get a web server that we have on our DMZ to communicate with my SQL server but I wanted to know if anyone knew why I needed to use gt 1024 in my access statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I orginialy tried to use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ extended permit tcp host 192.168.1.100 eq 1433 host 10.10.10.23 eq 1433&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but had to change it to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list fromDMZ extended permit tcp host 192.168.1.100 gt 1024 host 10.10.10.23 eq 1433&lt;/P&gt;&lt;P&gt;in order for it to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just trying to figure out why?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any info would be helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:37:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/talking-to-sql-server-from-dmz/m-p/648097#M1025069</guid>
      <dc:creator>boschrexroth</dc:creator>
      <dc:date>2019-03-11T09:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: Talking to SQL server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/talking-to-sql-server-from-dmz/m-p/648098#M1025073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's an excerpt from the link below that should answer your query concerning the ports used by SQL client/server...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the client establishes a TCP/IP connection, a three-way handshake is done. The client opens a source port and sends traffic to a destination port, which by default is 1433. The client source port in use is random, but is greater than 1024. By default, when an application requests a socket from the system for an outbound call, a port between the values of 1024 and 5000 is supplied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://support.microsoft.com/kb/287932" target="_blank"&gt;http://support.microsoft.com/kb/287932&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see, the client always uses a source port in the range of 1024 to 5000 if you want to be more granular in the traffic allowed from host 192.168.1.100 you can configure the access-list as follows;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list fromDMZ extended permit tcp host 192.168.1.100 range 1024 5000 host 10.10.10.23 eq 1433  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Feb 2007 21:01:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/talking-to-sql-server-from-dmz/m-p/648098#M1025073</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2007-02-23T21:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: Talking to SQL server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/talking-to-sql-server-from-dmz/m-p/648099#M1025077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the reason-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"host 192.168.1.100 eq 1433" This portion in your first access-list defines the source IP, and source port from where connection will initiate. Now .. as the way TCP works, if a host initiates a connection, it the source port used to initiate the connection is always greated than 1024, because all ports lower than that are  ports registered for specific services. This is the reason your connection never worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the next ACL, following portion defines the source IP and source port-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"host 192.168.1.100 gt 1024", this is exactly as per the norms, hence the connection works !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ideally, your ACL should be like this-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list fromDMZ extended permit tcp host 192.168.1.100 host 10.10.10.23 eq 1433&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont need to worry about the source port. All we need to take care about is the destination port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this explains.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Feb 2007 21:04:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/talking-to-sql-server-from-dmz/m-p/648099#M1025077</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-02-23T21:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: Talking to SQL server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/talking-to-sql-server-from-dmz/m-p/648100#M1025082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the reason is needs the ports above 1024 is that SQL used dynamically allocated ports above 1024 for communication between a SQL Server and client. I belive you can change this to use predetermined prots and there are some KB articiles on the MS site that detail this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;G&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Jul 2007 08:39:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/talking-to-sql-server-from-dmz/m-p/648100#M1025082</guid>
      <dc:creator>gary.sherry</dc:creator>
      <dc:date>2007-07-21T08:39:08Z</dc:date>
    </item>
    <item>
      <title>Re: Talking to SQL server from DMZ</title>
      <link>https://community.cisco.com/t5/network-security/talking-to-sql-server-from-dmz/m-p/648101#M1025093</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When a client which in your case is the web server talks to a server, the SQL server, the destination port is the service port on the server ie 1433 in this case which is SQL. However the client port is very rarely the same port number as this is not the way tcp/udp works. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The client generates a dynamic port number above 1024 to use for the communication. This is pretty much how all client/server communication takes place. So another example &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;client 192.168.5.2&lt;/P&gt;&lt;P&gt;server 172.16.10.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;server is running telnet service ie TCP/port 23. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On your client you typew "telnet 172.16.10.1". Your client genrates a random port number eg 5541 and sends a TCP SYN packet to the server, so &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source       192.168.5.2  port 5541&lt;/P&gt;&lt;P&gt;destination  172.16.10.1  port 23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When servre responds it sends packet back &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source       172.16.10.1 port 23&lt;/P&gt;&lt;P&gt;destintion   192.168.5.2 port 5541&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Jul 2007 11:27:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/talking-to-sql-server-from-dmz/m-p/648101#M1025093</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-07-21T11:27:47Z</dc:date>
    </item>
  </channel>
</rss>

