SQL Server 2016 Windows Server 2016 Firewall Rule Step-By-Step

SQL Server 2016 Windows Server 2016 Firewall Rule Step-By-Step. Let’s create rule for SQL Server ports (which I’m going to use in SCCM deployment), with GUI and with PowerShell.

With GUI:

  1. Start system and login (with admin rights user);

2. Open Control Panel. Click on Windows Firewall;

3. After that click on Advanced Settings;

4. Windows Firewall console open. If you click on Properties (right side) – you can disable firewall for all networks. We going to Inbound Rules (left side) for our rule creation;

5. Click on New Rule;

6. Rule creation process begin. In my case, I create rule for Inbound TCP ports. For Rule Type select option Port and click Next;

7. For Protocol and Ports select option TCP and Special Local Ports. I use 2 ports for SCCM deploy (8080, 14331) also added standard SQL TCP ports (1433,1434,4022). After entering ports click Next;

8. For Action (in this case leave by default Allow the connection). Click Next;

9. For Profile, leave by default, click Next;

10. Enter name for your rule (as example SQL TCP Ports), so you can easily find it in future. Click Finish;

11. In the last screenshot, you see two rules, which I created for SQL Server. One for TCP ports and one for UPD port (1434).

With PowerShell:

  1. Run PowerShell from administrator;

2. Enter next and press Enter:

New-NetFirewallRule -DisplayName "SQL TCP Ports" -Direction Inbound –Protocol TCP –LocalPort 8080, 1433, 1434, 4022, 14331 -Action allow

Some explanations:

-DisplayName “SQL TCP Ports” – Rule Name;

-Direction Inbound – Rule direction;

–Protocol TCP – Protocol (TCP or UDP);

–LocalPort – Your ports;

-Action allow – Allow or Disallow.

If you need more information about SQL Server Windows Firewall ports – read this technet post.

You might also like

Leave a Reply

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More