TAILIEUCHUNG - The Real MTCS SQL Server 2008 Exam 70/432 Prep Kit- P112

The Real MTCS SQL Server 2008 Exam 70/432 Prep Kit- P112: Congratulations on your journey to become certified in SQL Server 2008. This book will help prepare you for your exam and give you a practical view of working with SQL Server 2008. | Service Broker Chapter 12 537 There are two ways that SQL Server can listen for an Endpoint those options are TCP and HTTP. SERVICE BROKER Endpoints require that the listener be a TCP endpoint. The LISTENER_PORT can be set to whatever TCP port number you wish to use to allow communication from other servers. It is recommended that you use a TCP port number over 1024 as most ports under 1024 are assigned to other services. Some key ports over 1024 that you do not want are 1270 Microsoft MOM Agent 1293 IPSec 1311 Dell OpenManage 1433 SQL Servers Port Number 1512 WINS 1521 Oracle Default Port Number 2381 HP Insight Manager 3389 Remote Desktop s Port Number 3306 MySQL If you are having trouble selecting a port number to use you can find the list of registered port numbers and the applications that claim them at http . org wiki List_of_TCP_and_UDP_port_numbers. In the example shown I specify the LISTENER_IP of ALL. This allows a remote SQL Server s SERVICE BROKER to connect on any IP address that is assigned to the server. If the server has a DHCP address then this would be the setting you would want to use. If the server has multiple IP addresses then you will want to use this setting as well if you wish to have the remote system connect to any of the IP addresses. If you wish to have the remote systems connect to a single IP address only then specify the IP address there within single quotes. The IP address that you specify must be an IP address currently hosted by the SQL Server or the CREATE ENDPOINT command will fail with an error. We then tell the CREATE ENDPOINT command that we are creating this endpoint FOR SERVICE_BROKER to use. We are then setting the Authentication to Windows Authentication. If you choose you can use Certification-based authentication. You can also specify whether NTLM or KERBEROS authentication should be used in addition to being able to tell the Endpoint to NEGOTIATE the more secure connection. Because we do not specify which .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.