MX-84 L7 Rule to allow inbound/outbound traffic to ODBC on a SQL Server

Solved
DannyR76
Here to help

MX-84 L7 Rule to allow inbound/outbound traffic to ODBC on a SQL Server

Can someone show me what a rule to allow outbound and inbound traffic from a specific IP for an ODBC connection from a remote SQL Server?

 

I can get the connection to work fine from home but not through the firewall at work on the corporate network. 

 

We were told port 1433 for this traffic but I'm not sure if that's correct or not. 

1 Accepted Solution
alemabrahao
Kind of a big deal
Kind of a big deal

I assume this communication is done via correct public IP?
 
Do you have blocking rules in your MX?
 
 
alemabrahao_0-1686680198118.png

 

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.

View solution in original post

13 Replies 13
alemabrahao
Kind of a big deal
Kind of a big deal

I assume this communication is done via correct public IP?
 
Do you have blocking rules in your MX?
 
 
alemabrahao_0-1686680198118.png

 

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.

The L7 rule is used just to deny.

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.

Yes, public IP. 

I have blocking rules but nothing to do with this address and nothing to do with port 1433 (this is what the vendor told us to use - but I'm wondering if you need more for ODBC)

The rule I shared is just an example, you must create a rule allowing it and putting your LAN as the source and the SQL server as the destination.
 
Very simple.
I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.

Yes, that's what I had. I just wanted to be sure I was doing it correctly. Thanks. I just am never sure about it.

PhilipDAth
Kind of a big deal
Kind of a big deal

If the remote device is connecting over the Internet, you will need to add a port forward to the MX firewall.  There is a "Remote IP" column you can use to specify what IP addresses are allowed to connect.

 

PhilipDAth_0-1686683103890.png

 

@PhilipDAth I thought you only had to do port forwarding if it was not the main interface IP address....

 

Clients will be connecting through ODBC through the firewall (internet) to a URL of the SQL server.

PhilipDAth
Kind of a big deal
Kind of a big deal

It the SQL server has a private IP address, and you are not using VPN, then you'll need to forward a port to it.

@PhilipDAth 

 

I don't think that's the case, because if he tests it from home (He certainly don't have NAT configured) and it worked, it doesn't make sense to create this NAT. It would make sense if it was something external trying to query his server on the LAN.
 
What he wants is for his internal Host to consult the SQL Server that is in a remote location.
I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
Sarv
Getting noticed

It almost sounds like you want to access a SQL server (somewhere on the internet) from inside your network. If that is the case the default L3 rules I believe are allow all (unless you are denying outbound). If you do not have a L3 rule denying then you should be good to go accessing any services. You also do not need an inbound rule for this traffic as the FW is stateful and will allow that same traffic (initiated from internal network) inbound.

 

If the SQL server is on your internal network and you want to allow access to this server externally then you will need a Port Forwarding rule (1:1 NAT rule or 1:Many Nat rule if you want to use a Public IP other than the one you have assigned to your WAN interface, assuming you have multiple public IPs allocated to your company).

 

BTW: from a security perspective I would not allow inbound access to your SQL server directly, since I dont know what application you are using I can't make any recommendations on how to best to allow secure access.

 

Sarv
Getting noticed

One additional note, make sure you don't have a Layer7 rule blocking access to this SQL resource, again that rule would apply to outbound traffic only.

No rule blocking this traffic. 

It almost sounds like you want to access a SQL server (somewhere on the internet) from inside your network. If that is the case the default L3 rules I believe are allow all (unless you are denying outbound). If you do not have a L3 rule denying then you should be good to go accessing any services. You also do not need an inbound rule for this traffic as the FW is stateful and will allow that same traffic (initiated from internal network) inbound.

Yes, that's exactly what I'm wanting. My problem is I have to "prove" it isn't working. 

 

And yes, I wouldn't want a SQL server exposed in any way shape or form. 

 

What I wish I knew for sure are the pots required for ODBC. And what protocol(s) 

It sure seems like it should be working. 

Sarv
Getting noticed

If you have the default L3 rule "allow all"  and no L7 rules doing any kind of deny. Then you should be good. The problem has to be on the other end (SQL side). Typically for this you want 1433/1434 UDP/TCP open (default ports) for communication to SQL (however that's up to whoever setup SQL on the other end) but as stated you are not denying outbound traffic so you should be good on your end. I would check with the other side to see if they are blocking inbound connectivity to the SQL instance.

Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels