Tip: SQL Express Configuration Issue

SQL Express Configuration Issue

You can manually configure SQL Express and the Windows Firewall to allow remote access. Use the following steps to enable remote access to SQL Express:

  1. Open the SQL Server Configuration Manager by clicking Start, All Programs, Microsoft SQL Server 2005, Configuration Tools, SQL Server Configuration Manager.
  2. In the left pane of the SQL Server Configuration Manger, expand the node for SQL Server 2005 Network Configuration and select Protocols for SQLEXPRESS.
  3. In the right pane, right-click Named Pipes and choose Enable.
  4. Right-click TCIP/IP and choose Enable.
  5. In the left pane, select SQL Server 2005 Services.
  6. In the right pane, right-click SQL Server Browser and choose Properties.
  7. Click the Services tab in the Properties dialog box.
  8. On the Services page, set the Start Mode property to Automatic and click OK.
  9. Right-click SQL Server Browser and choose Start.
  10. Right-click SQL Server (SQLEXPRESS) and choose Restart.

Use the following steps to configure the Windows Firewall:

  1. Open the Windows Firewall dialog box and click the Exceptions tab.
  2. Click Add Program and Browse to find sqlbrowser.exe and click OK.
  3. Click Add Program and Browse to find sqlservr.exe. Click OK.
  4. Click Add Port and enter "SQL Service" for Name, 1433 for Port number, and select the TCP radio button.
  5. Click OK on the Windows Firewall dialog.


About the Author

Sushankar layak

Hi I am a Software developer, and specialized in Microsoft.Net.

Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • 2015 is shaping up to include some of the best innovation the mobile industry has ever experienced. There will be new discoveries, new technologies, and existing giants in the vendor space will test the limits to increase productivity while ensuring the confidentiality, integrity, and availability of data. While all of this innovation is taking place, enterprises must continue to remain vigilant as cybercriminals continue to look for weaknesses to steal company data, and intellectual property by infiltrating …

  • When individual departments procure cloud service for their own use, they usually don't consider the hazardous organization-wide implications. Read this paper to learn best practices for setting up an internal, IT-based cloud brokerage function that service the entire organization. Find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date