{"id":2502,"date":"2019-03-25T17:39:52","date_gmt":"2019-03-25T20:39:52","guid":{"rendered":"http:\/\/xexeu.elipse.com.br\/pt\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/"},"modified":"2023-09-28T09:23:15","modified_gmt":"2023-09-28T12:23:15","slug":"configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse","status":"publish","type":"post","link":"https:\/\/kb.elipse.com.br\/en\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/","title":{"rendered":"Configura\u00e7\u00f5es de Firewall e DCOM no Windows 7 para aplica\u00e7\u00f5es Elipse."},"content":{"rendered":"<div style=\"text-align: justify;\">\n<p><span style=\"font-weight: bold; font-style: italic;\">* Se o sistema operacional for o Windows XP\/2003\/Vista\/2008, clique <a href=\"http:\/\/kb.elipse.com.br\/?p=291\" target=\"_blank\" rel=\"noopener noreferrer\">aqui <\/a>*<\/span><\/p>\n<p><strong>1) Elipse DCOM Wizard<\/strong><\/p>\n<p>O Elipse DCOM Wizard \u00e9 um assistente de configura\u00e7\u00e3o do DCOM (<em>Distributed Component Object Model<\/em>) e do Firewall do Windows para permitir conex\u00f5es remotas. Apresenta configura\u00e7\u00f5es pr\u00e9-definidas para os principais produtos da Elipse Software, mas pode ser usado tamb\u00e9m para configurar produtos de terceiros. <b><span style=\"color: #ff0000;\">Ao executar o assistente, as configura\u00e7\u00f5es descritas\u00a0abaixo ser\u00e3o aplicadas automaticamente.<\/span><\/b><\/p>\n<p>O download do <strong>Elipse DCOM Wizard<\/strong> est\u00e1 dispon\u00edvel <a href=\"https:\/\/www.elipse.com.br\/downloads\/?cat=73&#038;key=Elipse+DCOM+Wizard&#038;language=ptbr\">em nosso site.<\/a><\/p>\n<p><span style=\"font-weight: bold;\">2) Introdu\u00e7\u00e3o<\/span><\/p>\n<p><span style=\"font-weight: bold;\">Firewalls <\/span>s\u00e3o barreiras interpostas entre a rede privada e a rede externa com a finalidade de evitar ataques ou invas\u00f5es; ou seja, s\u00e3o mecanismos (dispositivos) de seguran\u00e7a que protegem os recursos de hardware e software da empresa dos perigos aos quais o sistema est\u00e1 exposto. Estes mecanismos de seguran\u00e7a s\u00e3o baseados em hardware e software, e seguem a pol\u00edtica de seguran\u00e7a estabelecida pela empresa.<\/p>\n<p>O <span style=\"font-weight: bold;\">COM <\/span>(Component Object Model) da Microsoft \u00e9 um sistema orientado a objetos, distribu\u00eddo e independente de plataforma, destinado \u00e0 cria\u00e7\u00e3o de componentes de software bin\u00e1rios que podem interagir entre si. O <span style=\"font-weight: bold;\">DCOM <\/span>(Distributed Component Object Model) permite que os aplicativos sejam distribu\u00eddos entre os locais mais relevantes para o usu\u00e1rio e para o aplicativo. O protocolo de conex\u00e3o DCOM oferece suporte de forma transparente, visando a comunica\u00e7\u00e3o confi\u00e1vel e eficiente entre os componentes COM. Por este motivo, os drivers de comunica\u00e7\u00e3o OPC utilizam este protocolo.<\/p>\n<p>Para que os sistemas Elipse possam funcionar adequadamente, \u00e9 necess\u00e1rio fazer alguns ajustes nas configura\u00e7\u00f5es do Firewall e do DCOM, como veremos a seguir. Estes ajustes devem ser feitos tanto na m\u00e1quina servidora quanto na m\u00e1quina cliente, independentemente da comunica\u00e7\u00e3o ocorrer entre m\u00f3dulos do Elipse ou entre cliente e servidor OPC.<\/p>\n<p><span style=\"font-weight: bold;\">3) Firewall<\/span><\/p>\n<p>Para acessar as configura\u00e7\u00f5es do Firewall, um atalho est\u00e1 dispon\u00edvel no Painel de Controle (Fig. 1).<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4139\/firewall11.jpg\" alt=\"\" width=\"500\" height=\"389\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 1<\/span> &#8211; Ativando o Firewall<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Caso escolha desabilitar o Firewall, nenhuma outra provid\u00eancia a seu respeito dever\u00e1 ser tomada para o funcionamento do OPC Server ou qualquer outra funcionalidade dos produtos Elipse (note que ainda assim ser\u00e1 necess\u00e1rio seguir as instru\u00e7\u00f5es contidas na sess\u00e3o DCOM). Caso seja necess\u00e1rio ativar o Firewall, alguns passos dever\u00e3o ser seguidos. Em primeiro lugar, deve-se liberar alguns programas do firewall clicando na op\u00e7\u00e3o <span style=\"font-weight: bold;\">Permitir que programas se comuniquem pelo Firewall do Windows<\/span> (Fig. 2).<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4139\/firewall22.jpg\" alt=\"\" width=\"500\" height=\"507\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 2 <\/span>&#8211; Liberando programas<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Basicamente, deve-se adicionar o <span style=\"font-family: Courier New;\">E3OPCClient<span style=\"font-family: null;\">, o <\/span>E3Server.exe<\/span>, o <span style=\"font-family: Courier New;\">E3Run.exe<\/span> e o <span style=\"font-family: Courier New;\">Studio.exe<\/span> para o E3, e o <span style=\"font-family: Courier New;\">Elipse32.exe<\/span> para o Elipse SCADA. No caso do Elipse Drivers OPC, adicione o <span style=\"font-family: Courier New;\">ED_OPC.exe<\/span>. Tamb\u00e9m deve ser adicionado o <span style=\"font-family: Courier New;\">Opcenum.exe<\/span>, que pode ser encontrado nas pastas <span style=\"font-family: Courier New;\">C:Windowssystem32 <\/span>(na vers\u00e3o 32 bits do Windows) ou <span style=\"font-family: Courier New;\">C:WindowssysWOW6<\/span>4 (na vers\u00e3o 64 bits do Windows), o que permitir\u00e1 a conex\u00e3o remota de clientes OPC.<\/p>\n<p>Al\u00e9m dos programas, \u00e9 necess\u00e1rio criar novas regras de entrada para liberar as portas TCP e UDP de n\u00famero 135 e a porta TCP 445, utilizadas pelo DCOM, al\u00e9m da porta TCP de n\u00famero 6515, respons\u00e1vel pela conex\u00e3o do Viewer com o E3Server e Hot-Standby, e conex\u00e3o do Studio a um E3Server remoto. Isto pode ser feito clicando na op\u00e7\u00e3o <span style=\"font-weight: bold;\">Configura\u00e7\u00f5es Avan\u00e7adas <\/span>da p\u00e1gina inicial do Firewall (Fig. 3).<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4139\/firewall33.jpg\" alt=\"\" width=\"500\" height=\"404\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 3<\/span> &#8211; Liberando portas<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Feito isso, a aplica\u00e7\u00e3o est\u00e1 pronta para funcionar com o Firewall.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: bold;\">4) DCOM<\/span><\/p>\n<p>Para configurar esta op\u00e7\u00e3o a partir da interface do usu\u00e1rio, o administrador deve abrir o gerenciador de <span style=\"font-weight: bold;\">Servi\u00e7os de componente<\/span> (<span style=\"font-family: Courier New;\">dcomcnfg<\/span>) e selecionar <span style=\"font-weight: bold;\">Propriedades <\/span>no menu de contexto do computador a ser configurado (Fig. 4).<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura3.PNG\" alt=\"\" width=\"404\" height=\"212\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 4<\/span> &#8211; Selecionando o computador a ser configurado<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Ser\u00e1 exibida uma caixa de di\u00e1logo (Fig. 5), e a seguran\u00e7a dever\u00e1 ser configurada na aba <span style=\"font-weight: bold;\">Seguran\u00e7a COM<\/span>.<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura4.PNG\" alt=\"\" width=\"404\" height=\"473\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 5<\/span> &#8211; Configurando a seguran\u00e7a<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Clique em <span style=\"font-weight: bold;\">Editar Limites&#8230;<\/span> na \u00e1rea <span style=\"font-weight: bold;\">Permiss\u00f5es de acesso<\/span>, adicione os usu\u00e1rios <span style=\"font-family: Courier New;\">LOGON AN\u00d4NIMO<\/span>, <span style=\"font-family: Courier New;\">Todos <\/span>e <span style=\"font-family: Courier New;\">SYSTEM<\/span>, e habilite as op\u00e7\u00f5es <span style=\"font-weight: bold;\">Acesso Local<\/span> e <span style=\"font-weight: bold;\">Acesso Remoto<\/span> de cada um deles (Fig. 6):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura5.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 6<\/span> &#8211; Definindo permiss\u00f5es de acesso<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Clique em\u00a0 <span style=\"font-weight: bold;\">Editar Limites&#8230;<\/span> na \u00e1rea <span style=\"font-weight: bold;\">Permiss\u00f5es de Inicializa\u00e7\u00e3o e Ativa\u00e7\u00e3o<\/span>, adicione os usu\u00e1rios <span style=\"font-family: Courier New;\">LOGON AN\u00d4NIMO<\/span> e <span style=\"font-family: Courier New;\">SYSTEM<\/span>, e habilite as op\u00e7\u00f5es <span style=\"font-weight: bold;\">Inicializa\u00e7\u00e3o Remota<\/span> e <span style=\"font-weight: bold;\">Ativa\u00e7\u00e3o Remota<\/span>. Deve-se tamb\u00e9m marcar as op\u00e7\u00f5es <span style=\"font-weight: bold;\">Inicializa\u00e7\u00e3o Remota<\/span> e <span style=\"font-weight: bold;\">Ativa\u00e7\u00e3o Remota<\/span> do usu\u00e1rio <span style=\"font-family: Courier New;\">Todos <\/span>(Fig. 7):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura6.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 7<\/span> &#8211; Definindo permiss\u00f5es de acesso em Permiss\u00e3o para iniciar<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Tamb\u00e9m \u00e9 necess\u00e1rio dar permiss\u00f5es de acesso, inicializa\u00e7\u00e3o e ativa\u00e7\u00e3o remota do <span style=\"font-weight: bold;\">E3Server <\/span>para o usu\u00e1rio <span style=\"font-family: Courier New;\">LOGON AN\u00d4NIMO<\/span>. Para isto, selecione as propriedades atrav\u00e9s do menu de contexto do E3Server, clicando com o bot\u00e3o direito do mouse sobre o E3Server (Fig. 8):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura7.PNG\" alt=\"\" width=\"557\" height=\"530\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 8 <\/span>&#8211; Selecionando as propriedades do E3Server<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>As configura\u00e7\u00f5es dever\u00e3o ser feitas na aba <span style=\"font-weight: bold;\">Seguran\u00e7a <\/span>(Fig. 9):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura8.PNG\" alt=\"\" width=\"404\" height=\"455\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 9<\/span> &#8211; Configurando a seguran\u00e7a do E3Server<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Clique em <span style=\"font-weight: bold;\">Editar<\/span> na \u00e1rea <span style=\"font-weight: bold;\">Permiss\u00f5es de Inicializa\u00e7\u00e3o e Ativa\u00e7\u00e3o<\/span>, adicione o usu\u00e1rio <span style=\"font-family: Courier New;\">LOGON AN\u00d4NIMO<\/span>, e habilite as op\u00e7\u00f5es <span style=\"font-weight: bold;\">Inicializa\u00e7\u00e3o Remota<\/span> e <span style=\"font-weight: bold;\">Ativa\u00e7\u00e3o Remota<\/span> (Fig. 10):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura9.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 10<\/span> &#8211; Definindo permiss\u00f5es para iniciar o E3Server<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Clique em <span style=\"font-weight: bold;\">Editar<\/span> na \u00e1rea <span style=\"font-weight: bold;\">Permiss\u00f5es de acesso<\/span>, adicione o usu\u00e1rio <span style=\"font-family: Courier New;\">LOGON AN\u00d4NIMO<\/span>, e habilite a op\u00e7\u00e3o <span style=\"font-weight: bold;\">Acesso Remoto<\/span> (Fig. 11):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura10.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 11 <\/span>&#8211; Definindo permiss\u00f5es de acesso para o E3Server<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Logo ap\u00f3s, \u00e9 necess\u00e1rio dar permiss\u00f5es de acesso, inicializa\u00e7\u00e3o e ativa\u00e7\u00e3o remota do <span style=\"font-weight: bold;\">E3Run <\/span>para o usu\u00e1rio <span style=\"font-family: Courier New;\">LOGON AN\u00d4NIMO<\/span>. Para isto, selecione as propriedades atrav\u00e9s do menu de contexto do E3Run, clicando com o bot\u00e3o direito do mouse sobre o E3Run (Fig. 12):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura11.PNG\" alt=\"\" width=\"562\" height=\"531\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 12<\/span> &#8211; Selecionando as propriedades do E3Run<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>As configura\u00e7\u00f5es dever\u00e3o ser feitas na aba <span style=\"font-weight: bold;\">Seguran\u00e7a <\/span>(Fig. 13):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura12.PNG\" alt=\"\" width=\"403\" height=\"455\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 13<\/span> &#8211; Configurando a seguran\u00e7a do E3Run<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Clique em <span style=\"font-weight: bold;\">Editar<\/span> na \u00e1rea <span style=\"font-weight: bold;\">Permiss\u00f5es de Inicializa\u00e7\u00e3o e Ativa\u00e7\u00e3o<\/span>, adicione o usu\u00e1rio<span style=\"font-family: Courier New;\"> LOGON AN\u00d4NIMO<\/span>, e habilite as op\u00e7\u00f5es <span style=\"font-weight: bold;\">Inicializa\u00e7\u00e3o Remota<\/span> e <span style=\"font-weight: bold;\">Ativa\u00e7\u00e3o Remota<\/span> (Fig. 14):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura13.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 14<\/span> &#8211; Definindo permiss\u00f5es para iniciar o E3Run<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Clique em <span style=\"font-weight: bold;\">Editar<\/span> na \u00e1rea <span style=\"font-weight: bold;\">Permiss\u00f5es de acesso<\/span>, adicione o usu\u00e1rio <span style=\"font-family: Courier New;\">LOGON AN\u00d4NIMO<\/span>, e habilite a op\u00e7\u00e3o <span style=\"font-weight: bold;\">Acesso Remoto<\/span> (Fig. 15):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" style=\"font-weight: bold;\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura14.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br style=\"font-weight: bold;\" \/><span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 15<\/span> &#8211; Definindo permiss\u00f5es de acesso para o E3Run<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Caso a aplica\u00e7\u00e3o tamb\u00e9m utilize o OPC, \u00e9 necess\u00e1rio dar permiss\u00f5es de acesso, inicializa\u00e7\u00e3o e ativa\u00e7\u00e3o remota do <span style=\"font-weight: bold;\">OpcEnum <\/span>para o usu\u00e1rio <span style=\"font-family: Courier New;\">LOGON AN\u00d4NIMO<\/span>, em procedimento semelhante aos utilizados com o E3Server e o E3Run. Para isto, selecione as propriedades atrav\u00e9s do menu de contexto do OpcEnum, clicando com o bot\u00e3o direito do mouse sobre o OpcEnum (Fig. 16):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura15.PNG\" alt=\"\" width=\"558\" height=\"530\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 16<\/span> &#8211; Selecionando as propriedades do OpcEnum<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>As configura\u00e7\u00f5es dever\u00e3o ser feitas na aba <span style=\"font-weight: bold;\">Seguran\u00e7a <\/span>(Fig. 17):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura16.PNG\" alt=\"\" width=\"404\" height=\"455\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 17<\/span> &#8211; Configurando a seguran\u00e7a do OpcEnum<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Clique em <span style=\"font-weight: bold;\">Editar<\/span> na \u00e1rea <span style=\"font-weight: bold;\">Permiss\u00f5es de Inicializa\u00e7\u00e3o e Ativa\u00e7\u00e3o<\/span>, adicione os usu\u00e1rios <span style=\"font-family: Courier New;\">LOGON AN\u00d4NIMO<\/span> e <span style=\"font-family: Courier New;\">SYSTEM<\/span>, e habilite\u00a0 as op\u00e7\u00f5es <span style=\"font-weight: bold;\">Inicializa\u00e7\u00e3o Remota<\/span> e <span style=\"font-weight: bold;\">Ativa\u00e7\u00e3o Remota <\/span>(Fig. 18):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura17.PNG\" alt=\"\" width=\"367\" height=\"449\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 18<\/span> &#8211; Definindo permiss\u00f5es para iniciar o OpcEnum<\/span><\/div>\n<div style=\"text-align: justify;\">\n<p>Clique em <span style=\"font-weight: bold;\">Editar<\/span> na \u00e1rea <span style=\"font-weight: bold;\">Permiss\u00f5es de acesso<\/span>, adicione os usu\u00e1rios <span style=\"font-family: Courier New;\">LOGON AN\u00d4NIMO<\/span> e <span style=\"font-family: Courier New;\">SYSTEM<\/span>, e habilite\u00a0 a op\u00e7\u00e3o <span style=\"font-weight: bold;\">Acesso Remoto<\/span> (Fig. 19):<\/p>\n<\/div>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID17\/Figura18.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figura 19<\/span> &#8211; Definindo permiss\u00f5es de acesso para o OpcEnum<\/span><\/div>\n<div style=\"text-align: justify;\" align=\"center\">\n<p>A partir da <strong>vers\u00e3o 4.6<\/strong> do Elipse E3, tamb\u00e9m \u00e9 necess\u00e1rio dar permiss\u00f5es de acesso, inicializa\u00e7\u00e3o e ativa\u00e7\u00e3o remota do <strong>E3OpcClient<\/strong> para o usu\u00e1rio LOGON AN\u00d4NIMO.<\/p>\n<div align=\"justify\">\n<p><b>5) Rede<\/b><\/p>\n<p>Para estabelecer a comunica\u00e7\u00e3o OPC com as configura\u00e7\u00f5es deste artigo, os computadores envolvidos precisam estar em um mesmo dom\u00ednio Microsoft, ou pelo menos em Grupos de Trabalho com necessariamente mesmo usu\u00e1rio e a mesma senha em todos os computadores (o usu\u00e1rio n\u00e3o precisa necessariamente estar logado, bastando apenas ter sido criado).<\/p>\n<p>\u00c9 necess\u00e1rio que ambos os computadores sejam capazes de se &#8220;enxergar&#8221; pelos seus nomes na rede para a troca de informa\u00e7\u00f5es, n\u00e3o sendo suficiente apenas o IP ou uma pasta compartilhada.<\/p>\n<p><span style=\"font-weight: bold;\">Importante<\/span>: \u00c9 indispens\u00e1vel que todos os computadores da rede com o Windows 7 instalado sejam configurados do mesmo modo, do contr\u00e1rio eles\u00a0 tamb\u00e9m recusar\u00e3o a conex\u00e3o com o Servidor OPC.<\/p>\n<p><iframe loading=\"lazy\" title=\"Configurando DCOM e Firewall\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/LU7S0RyKJ_Y?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<\/div>\n<p align=\"center\"><span style=\"color: #000000;\"><strong>Assista o <\/strong><\/span><a href=\"http:\/\/www.youtube.com\/watch?v=LU7S0RyKJ_Y\"><span style=\"color: #0000ff;\"><strong>v\u00eddeo<\/strong><\/span><\/a>\u00a0<span style=\"color: #000000;\"><strong>relacionado a este artigo, tamb\u00e9m em nosso <\/strong><\/span><a href=\"http:\/\/www.youtube.com\/user\/ElipseSoftware\"><span style=\"color: #0000ff;\"><strong>canal do YouTube.<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>* Se o sistema operacional for o Windows XP\/2003\/Vista\/2008, clique aqui * 1) Elipse DCOM Wizard O Elipse DCOM Wizard \u00e9 um assistente de configura\u00e7\u00e3o do DCOM (Distributed Component Object&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0},"categories":[585,603,604],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Configura\u00e7\u00f5es de Firewall e DCOM no Windows 7 para aplica\u00e7\u00f5es Elipse. - Elipse Knowledgebase<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Configura\u00e7\u00f5es de Firewall e DCOM no Windows 7 para aplica\u00e7\u00f5es Elipse.\" \/>\n<meta property=\"og:description\" content=\"* Se o sistema operacional for o Windows XP\/2003\/Vista\/2008, clique aqui * 1) Elipse DCOM Wizard O Elipse DCOM Wizard \u00e9 um assistente de configura\u00e7\u00e3o do DCOM (Distributed Component Object&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/\" \/>\n<meta property=\"og:site_name\" content=\"Elipse Knowledgebase\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/elipsesoftware\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-25T20:39:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-28T12:23:15+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4139\/firewall11.jpg\" \/>\n<meta name=\"author\" content=\"Elipse Software\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elipse Software\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/\"},\"author\":{\"name\":\"Elipse Software\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87\"},\"headline\":\"Configura\u00e7\u00f5es de Firewall e DCOM no Windows 7 para aplica\u00e7\u00f5es Elipse.\",\"datePublished\":\"2019-03-25T20:39:52+00:00\",\"dateModified\":\"2023-09-28T12:23:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/\"},\"wordCount\":2915,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\"},\"articleSection\":[\"Domain \/ E3Server \/ HotStandBy\",\"OPCClient\",\"OPCServer\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/\",\"url\":\"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/\",\"name\":\"[:pt]Configura\u00e7\u00f5es de Firewall e DCOM no Windows para aplica\u00e7\u00f5es Elipse.[:en]Configura\u00e7\u00f5es de Firewall e DCOM no Windows 7 para aplica\u00e7\u00f5es Elipse.[:] - Elipse Knowledgebase\",\"isPartOf\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#website\"},\"datePublished\":\"2019-03-25T20:39:52+00:00\",\"dateModified\":\"2023-09-28T12:23:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/kb.elipse.com.br\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Configura\u00e7\u00f5es de Firewall e DCOM no Windows para aplica\u00e7\u00f5es Elipse.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kb.elipse.com.br\/#website\",\"url\":\"https:\/\/kb.elipse.com.br\/\",\"name\":\"Elipse Knowledgebase\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kb.elipse.com.br\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\",\"name\":\"Elipse Software\",\"url\":\"https:\/\/kb.elipse.com.br\/\",\"sameAs\":[\"http:\/\/www.facebook.com\/elipsesoftware\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png\",\"contentUrl\":\"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png\",\"width\":161,\"height\":58,\"caption\":\"Elipse Software\"},\"image\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87\",\"name\":\"Elipse Software\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g\",\"caption\":\"Elipse Software\"},\"url\":\"https:\/\/kb.elipse.com.br\/en\/author\/webmasterelipse-com-br\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Configura\u00e7\u00f5es de Firewall e DCOM no Windows 7 para aplica\u00e7\u00f5es Elipse. - Elipse Knowledgebase","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/","og_locale":"en_US","og_type":"article","og_title":"[:pt]Configura\u00e7\u00f5es de Firewall e DCOM no Windows para aplica\u00e7\u00f5es Elipse.[:en]Configura\u00e7\u00f5es de Firewall e DCOM no Windows 7 para aplica\u00e7\u00f5es Elipse.[:] - Elipse Knowledgebase","og_description":"* Se o sistema operacional for o Windows XP\/2003\/Vista\/2008, clique aqui * 1) Elipse DCOM Wizard O Elipse DCOM Wizard \u00e9 um assistente de configura\u00e7\u00e3o do DCOM (Distributed Component Object&hellip;","og_url":"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/","og_site_name":"Elipse Knowledgebase","article_publisher":"http:\/\/www.facebook.com\/elipsesoftware","article_published_time":"2019-03-25T20:39:52+00:00","article_modified_time":"2023-09-28T12:23:15+00:00","og_image":[{"url":"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID4139\/firewall11.jpg"}],"author":"Elipse Software","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Elipse Software","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/#article","isPartOf":{"@id":"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/"},"author":{"name":"Elipse Software","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87"},"headline":"Configura\u00e7\u00f5es de Firewall e DCOM no Windows 7 para aplica\u00e7\u00f5es Elipse.","datePublished":"2019-03-25T20:39:52+00:00","dateModified":"2023-09-28T12:23:15+00:00","mainEntityOfPage":{"@id":"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/"},"wordCount":2915,"commentCount":0,"publisher":{"@id":"https:\/\/kb.elipse.com.br\/#organization"},"articleSection":["Domain \/ E3Server \/ HotStandBy","OPCClient","OPCServer"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/","url":"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/","name":"[:pt]Configura\u00e7\u00f5es de Firewall e DCOM no Windows para aplica\u00e7\u00f5es Elipse.[:en]Configura\u00e7\u00f5es de Firewall e DCOM no Windows 7 para aplica\u00e7\u00f5es Elipse.[:] - Elipse Knowledgebase","isPartOf":{"@id":"https:\/\/kb.elipse.com.br\/#website"},"datePublished":"2019-03-25T20:39:52+00:00","dateModified":"2023-09-28T12:23:15+00:00","breadcrumb":{"@id":"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kb.elipse.com.br\/configuracoes-de-firewall-e-dcom-no-windows-7-para-aplicacoes-elipse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/kb.elipse.com.br\/en\/"},{"@type":"ListItem","position":2,"name":"Configura\u00e7\u00f5es de Firewall e DCOM no Windows para aplica\u00e7\u00f5es Elipse."}]},{"@type":"WebSite","@id":"https:\/\/kb.elipse.com.br\/#website","url":"https:\/\/kb.elipse.com.br\/","name":"Elipse Knowledgebase","description":"","publisher":{"@id":"https:\/\/kb.elipse.com.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kb.elipse.com.br\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kb.elipse.com.br\/#organization","name":"Elipse Software","url":"https:\/\/kb.elipse.com.br\/","sameAs":["http:\/\/www.facebook.com\/elipsesoftware"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png","contentUrl":"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png","width":161,"height":58,"caption":"Elipse Software"},"image":{"@id":"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87","name":"Elipse Software","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g","caption":"Elipse Software"},"url":"https:\/\/kb.elipse.com.br\/en\/author\/webmasterelipse-com-br\/"}]}},"_links":{"self":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/2502"}],"collection":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/comments?post=2502"}],"version-history":[{"count":11,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/2502\/revisions"}],"predecessor-version":[{"id":15141,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/2502\/revisions\/15141"}],"wp:attachment":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/media?parent=2502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/categories?post=2502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/tags?post=2502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}