Chapter 2

Securing the Network

Abstract

This chapter talks about the network design and firewall configuration which will provide the readers a database with the most secure configuration.

Keywords

firewall
IP address
network
VPN
remote access

Information in this chapter

Securing the network
Public IP addresses versus private IP addresses
vLANs
Accessing SQL server from home
Physical security
Social engineering
Finding the instances
Testing the network security
 
This chapter talks about the network design and firewall configuration, which will provide the readers a database with the most secure configuration.

Securing the Network

You may think that talking about the network is a strange way to start off a SQL Server ...

Get Securing SQL Server, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.