[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

sqlserver 2005 replication un-trusted domains

Posted on 2007-07-23
5
Medium Priority
?
195 Views
Last Modified: 2011-09-20
I'm trying to implement replication using two pcs which are not on the same domain and the domains are not trusted.  currently pc A is given access to pc B on the firewall.

So I'm wondering how I go about setting this up.  I would like to have the publication save the files from pc A to pc B, but that doesn't seem to work.

Thanks
0
Comment
Question by:Fraser_Admin
  • 3
  • 2
5 Comments
 
LVL 3

Accepted Solution

by:
Askeeto earned 2000 total points
ID: 19550596
If you have SQL Server 2005 Enterprise Edition you can use "Web Replication" to replicate over port 443.

If you do not have access to Enterprise Edition you have to open port  1433 (for sql server) and 21 (for ftp) to drive the traffic. This is not safe if you have to go over a public network, so it is better to set up a manual system to move the replication files over the non trusted part of the network (via sftp or something.)
0
 

Author Comment

by:Fraser_Admin
ID: 19555144
No i only have workgroup edition.  is there some good sample document to give step by step how to set this up?
0
 
LVL 3

Expert Comment

by:Askeeto
ID: 19555668
0
 

Author Comment

by:Fraser_Admin
ID: 19568029
this document appears to be for 2000.  i'm using 2005.

i'm creating the publication and i would like to save the files to the other server.  so i setup ftp replication.  there are no errors when i setup that info, and on the tab for where to put the files, i put in folder and there are no problems there.  but when i invoke the agent it says that it can't copy the files.  no other error.  i put port 21??  no clue if that is what i'm suppose to be using or not.
0
 

Author Comment

by:Fraser_Admin
ID: 20040783
the problems i was having was due to permissions and ports not being opened.
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the first part of this tutorial we will cover the prerequisites for installing SQL Server vNext on Linux.
Recently we ran in to an issue while running some SQL jobs where we were trying to process the cubes.  We got an error saying failure stating 'NT SERVICE\SQLSERVERAGENT does not have access to Analysis Services. So this is a way to automate that wit…
Via a live example, show how to backup a database, simulate a failure backup the tail of the database transaction log and perform the restore.
Viewers will learn how to use the UPDATE and DELETE statements to change or remove existing data from their tables. Make a table: Update a specific column given a specific row using the UPDATE statement: Remove a set of values using the DELETE s…
Suggested Courses

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question