experience shows that a minimum of 100 ports should be opened, because several system services rely on these RPC ports to communicate with each other
Windows Server 2008 and Windows 7 include changes designed to enhance the security of the NTLM
authentication protocol, which is used by servers and clients when running in workgroup mode.
By default,
these versions of Windows are configured so that they will only communicate with other computers that use the enhanced NTLM security. This can prevent authentication from the OPC client to the OPC server when using local accounts. To ensure interoperability, OPC server and client nodes must be configured so that the NTLM-specific settings on the two computers match. Older Windows versions (at least back to
Windows XP) with up-to-date service packs will support the new settings. Windows 2003 Service Pack supports this setting.
See the OSIsoft KB article for details KB - Configuring NTLM authentication for OPC
Parent topic: Configuring operating system settings
Configure Windows Firewall settings
If Windows Firewall is enabled on your OPC computers, you must allow certain programs through the firewall.
The general guidelines for firewall configuration are to Deny all incoming traffic to the OPC node (recommended Allow incoming traffic from specific OPC nodes to TCP port 135.
• Allow incoming traffic from specific OPC nodes to the specific ephemeral TCP port range.
Procedure
1. Click
Start >
Control Panel and double-click
Windows Firewall.
2. On the
Exceptions tab, enable exceptions for the following TCP Port 135 (Click
Add port...)
• Ephemeral ports (Click
Add port... for each
opcenum.exe (Click
Add program...)
• Your OPC server executable (Click
Add program...)
3. To restrict the source of the incoming TCP connections to the
OPC client node exclusively, click
ChangeShare with your friends: