TickeTrak Database Connection Options: ODBC vs. IPSec

Created by Joshua Hall, Modified on Fri, 14 Nov at 12:32 PM by Joshua Hall

Overview

TickeTrak offers two methods for clients to establish a direct connection to their hosted database: ODBC (Open Database Connectivity) and IPSec (Internet Protocol Security). These options enable data extraction for reporting and integration with external systems. However, direct modifications to the database are strongly discouraged, as they can compromise system stability.

 

Choosing the Right Connection

Feature

ODBC

IPSec

Security Level

Moderate

High

Ease of Setup

Easy

Complex

Best For

Reporting & analytics

Secure system integrations

Network Requirements

Open firewall rules

VPN/IPSec tunnel setup

 

If security is your primary concern, IPSec is the recommended choice. If you prefer a simpler setup, ODBC may be more suitable.

 

Option 1: ODBC Connection

What It Does:

  • Enables querying and extracting data from the database.
  • Works with reporting tools like Excel, Power BI, and SQL-based applications.
  • Allows integration with third-party applications requiring database access.

 

Limitations & Risks:

  • Direct database modifications are not recommended due to potential system issues.
  • Performance may be impacted by inefficient queries.
  • Security relies on network configurations and access controls.

 

Technical Requirements for ODBC Setup

To establish an ODBC connection, please provide the following information:

  1. List of all external IP addresses that will be used for the connection.
  2. Firewall access: Your IT team must allow traffic to 146.20.176.67 on port 1433.
  3. SQL login credentials: A database login must be created for ODBC access.
  4. ODBC configuration: The ODBC driver must be installed and configured on workstations that need to connect to 146.20.176.67 on port 1433.

Option 2: IPSec Connection

What It Does:

  • Creates a secure, encrypted tunnel between your network and TickeTrak’s hosted database.
  • Ensures secure data transmission for integrations and reporting.
  • Reduces exposure to unauthorized access.

 

Limitations & Risks:

  • Requires IT expertise to configure and maintain the VPN.
  • Encryption may introduce minor performance overhead.

Technical Requirements for IPSec Setup

To configure an IPSec tunnel, please provide the following details:

 

  1. IKE Version: IKEv1 or IKEv2
  2. VPN Device Details: Manufacturer and model number
  3. Public IP Address: Peer address for the VPN device
  4. Encryption Domain: Your remote IP(s) or network(s) that will communicate via VPN
  5. Encryption & Authentication Settings:
    • Phase 1 Encryption Algorithm: AES-128/192/256
    • Phase 1 Hash Algorithm: MD5, SHA1, SHA256, SHA384, SHA512
    • Phase 1 Diffie Hellman Group: 2, 5, 14, 19, 20, 21
    • Phase 1 Pseudorandom Function (PRF): MD5, SHA1, SHA256, SHA384, SHA512
    • Phase 1 Lifetime (seconds): 86400 or 28800 recommended
  6. Pre-Shared Key:
    • IKEv1: Custom password of your choice
    • IKEv2: Pre-Shared Key (secure transmission required)
  7. Phase 2 Security Settings:
    • Encryption Algorithm: AES-128/192/256
    • Hash Algorithm: MD5, SHA1, SHA256, SHA384, SHA512
    • Perfect Forward Secrecy (PFS): Enabled? If so, specify DH Group (2, 5, 14, 19, 20, 21)
    • Phase 2 Lifetime (seconds): Preferably lower than Phase 1

Next Steps

Once we receive the required information, our team will coordinate with your IT department to complete the setup. If you have questions or need guidance, please contact our support team at support@cardinaltracking.com.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article