@bmeeks:
My answer to the question for those TCP rules is the same as it was for the previous UDP rules. What is the point? The firewall will drop all unsolicited TCP packets as well. I just didn't state that in my earlier response since we were specifically just talking UDP, but pfSense out of the box drops all unsolicited inbound traffic on the WAN.
If you don't open a port and specify a protocol in a firewall rule, then nothing gets in. So if you don't have an explicit firewall rule allowing MS-SQL inbound (TCP port 1433), then nothing can connect to that port. Putting a MS-SQL drop rule in Suricata does not accomplish much in my view. Instead of having Suricata munch through a bunch of rules to drop traffic the firewall is going to block anyway, I would reserve Suricata's processing to protect stuff where I have actual vulnerabilities (such as rules looking for local clients attempting communication with known malware BOT nets, various JavaScript or PDF attacks from web sites, etc.).
Bill
Thanks for clarification.