{"id":345,"date":"2019-03-25T17:30:24","date_gmt":"2019-03-25T20:30:24","guid":{"rendered":"http:\/\/xexeu.elipse.com.br\/pt\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/"},"modified":"2025-05-15T11:05:43","modified_gmt":"2025-05-15T14:05:43","slug":"dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications","status":"publish","type":"post","link":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/","title":{"rendered":"DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications."},"content":{"rendered":"<div style=\"text-align: justify;\">\n<p><span style=\"font-weight: bold; font-style: italic;\">*For Windows 7, click <a href=\"https:\/\/kb.elipse.com.br\/dcom-and-firewall-settings-in-windows-7-for-elipse-applications\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>*<\/span><\/p>\n<p align=\"justify\"><strong>1) Elipse DCOM Wizard<br \/>\n<\/strong><br \/>\nElipse DCOM Wizard is a wizard to configure DCOM (Distributed Component Object Model) and Windows Firewall to allow remote connections. It displays predefined settings for the main products by Elipse Software, but it can be also used to configure third-party products. <b><span style=\"color: #ff0000;\">By running the wizard, the settings described below are applied automatically.<\/span><\/b><\/p>\n<p>Elipse DCOM Wizard <a href=\"https:\/\/www.elipse.com.br\/en\/downloads\/?key=DCOM+Wizard&#038;language=enus\">Download<\/a>.<\/p>\n<p><span style=\"font-weight: bold;\">2) Introduction<\/span><\/p>\n<p>Anxiously awaited by Windows XP users, the Service Pack 2 has brought a series of updates and improvements to this operational system, mainly in the area of data security. One of the most important new features was the presence of a <span style=\"font-weight: bold;\">software firewall<\/span>, which is now an intrinsic part of the operating system itself.<\/p>\n<p><span style=\"font-weight: bold;\">Firewalls <\/span>are barriers interposed between a private network and an external network, in order to prevent attacks or invasions. That is, they are security mechanisms (devices) that protect the company&#8217;s hardware and software from the dangers to which the system is exposed. These security mechanisms are both hardware- and software-based, and follow the security policy established by the company.<\/p>\n<p>In addition this new feature, <span style=\"font-weight: bold;\">COM <\/span>and <span style=\"font-weight: bold;\">DCOM <\/span>models also underwent changes. Microsoft&#8217;s <span style=\"font-weight: bold;\">COM <\/span>(Component Object Model) is a distributed, platform-independent, object-oriented system for creating binary software components that can interact with each other. <span style=\"font-weight: bold;\">DCOM <\/span>(Distributed Component Object Model) allows applications to be distributed to the most relevant sites for the user and for the application. DCOM connection protocol offers transparent support, for a reliable and efficient communication between COM components. For this reason, this is the protocol used in OPC drivers.<\/p>\n<p>In order to have the Elipse systems functioning properly, you will need to make some adjustments in the settings of Firewall and DCOM, as discussed below. These settings must be performed both in the server and in the client machines, regardless of how communication takes place (either between Elipse modules or between OPC client and server).<\/p>\n<p><span style=\"font-weight: bold;\">3) Firewall<\/span><\/p>\n<p>In the first initialization after Service Pack 2 had been installed, a wizard asks you if you want to either activate the Firewall or to let it remain disabled. After this, a new shortcut is available on the control panel, called <span style=\"font-weight: bold;\">Windows Firewall<\/span> (Fig. 1).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura1.PNG\" alt=\"\" width=\"434\" height=\"515\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 1<\/span> &#8211; Activating the firewall<\/span><\/div>\n<p>If you choose to disable the Firewall, no further action is required to operate the OPC Server or any other feature of Elipse products (notice however that it will still be necessary to follow the instructions contained in the DCOM session). In case you need to activate the firewall, a few other steps must be followed. First of all, the option <span style=\"font-weight: bold; font-style: italic;\">Don&#8217;t allow exceptions<\/span> <span style=\"font-weight: bold;\">MUST <\/span>be <span style=\"font-weight: bold;\">unchecked<\/span>. Otherwise, all exceptions will be ignored, and DCOM (the object of this article) will not be able to operate on the network. Once this precaution is taken, it will be necessary to inform some exceptions in the tab Exceptions (Fig. 2).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura2.PNG\" alt=\"\" width=\"550\" height=\"489\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 2<\/span> &#8211; Including exceptions<\/span><\/div>\n<p>Basically, you should add <span style=\"font-family: Courier New;\">E3Server.exe<\/span>, <span style=\"font-family: Courier New;\">E3OPCClient.exe<\/span>, <span style=\"font-family: Courier New;\">E3Run.exe<\/span>, and <span style=\"font-family: Courier New;\">Studio.exe<\/span> for E3, or <span style=\"font-family: Courier New;\">Elipse32.exe<\/span> for Elipse SCADA. For Elipse OPC Drivers, add <span style=\"font-family: Courier New;\">ED_OPC.exe<\/span>. In Windows Vista, you must also add <span style=\"font-family: Courier New;\">Opcenum.exe<\/span>, found at <span style=\"font-family: Courier New;\">C:Windowssystem32<\/span> (in 32-bit Windows) or <span style=\"font-family: Courier New;\">C:WindowsSysWOW64<\/span> (in 64-bit Windows), which will enable remote connection with OPC clients.<\/p>\n<p>In addition to these programs, you must also create new input rules to allow ports 135 (TCP and UDP) and 445 (TCP), used by DCOM, and 6515 (TCP), responsible for connecting the Viewer to E3Server and Hot-Standby, and also for connecting the Studio to a remote E3Server.<\/p>\n<p>Once it is done, the application is ready to work with the Firewall.<\/p>\n<p><span style=\"font-weight: bold;\">4) DCOM<\/span><\/p>\n<p>Some Windows XP and Windows 2003 Server users for stand-alone and domestic applications have sometimes wondered if DCOM is really useful for their daily tasks. However, SCADA applications cannot dispense with this functionality. Changes were made at DCOM to get around security failures that were made evident with the proliferation of worm and virus attacks based on this communication protocol, without damaging applications that effectively need DCOM. An example of DCOM evolution in Service Pack 2 is that, unlike older versions of COM server application, DCOM allows restricting the application so that it can only be used locally without being exposed on the network via DCOM. When users have access to a COM server application, they have access to both local and remote use.<\/p>\n<p>For that matter, a few measures must be taken so that the application continues working as it has before: to configure this option from the user interface, the administrator must open the <span style=\"font-weight: bold;\">Component Services Manager<\/span> (<span style=\"font-family: Courier New;\">DCOMCNFG<\/span>) and select <span style=\"font-weight: bold;\">Properties <\/span>from the context menu of the computer being set (Fig. 3).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura3.PNG\" alt=\"\" width=\"406\" height=\"214\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 3<\/span> &#8211; Selecting the computer to be configured<\/span><\/div>\n<p>A dialog box will be displayed (Fig. 4), and security must be configured on <span style=\"font-weight: bold;\">COM Security<\/span> tab.<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura4.PNG\" alt=\"\" width=\"404\" height=\"473\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 4<\/span> &#8211; Configuring security<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit Limits\u2026<\/span> on <span style=\"font-weight: bold;\">Access Permissions<\/span>, add users <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span>, <span style=\"font-family: Courier New;\">Everyone<\/span>, and <span style=\"font-family: Courier New;\">SYSTEM<\/span>, and check the options <span style=\"font-weight: bold;\">Local Access<\/span> and <span style=\"font-weight: bold;\">Remote Access<\/span> for these users (Fig. 5).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura5.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 5<\/span> &#8211; Setting access permissions<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit Limits\u2026<\/span> on <span style=\"font-weight: bold;\">Launch and Activation Permissions<\/span>, add users <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span> and <span style=\"font-family: Courier New;\">SYSTEM<\/span>, and check the options <span style=\"font-weight: bold;\">Remote Launch<\/span> and <span style=\"font-weight: bold;\">Remote Activation<\/span> for these users. You must also check these options for user <span style=\"font-family: Courier New;\">Everyone <\/span>(Fig. 6).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura6.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 6<\/span> &#8211; Setting launch permissions<\/span><\/div>\n<p>You must then grant <span style=\"font-weight: bold;\">E3Server<\/span>&#8216;s access, initialization, and remote activation permissions to <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span> user. To do so, right-click E3Server and select <span style=\"font-weight: bold;\">Properties <\/span>on its context menu (Fig. 7).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura7.PNG\" alt=\"\" width=\"550\" height=\"539\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 7<\/span> &#8211; Selecting E3Server&#8217;s properties<\/span><\/div>\n<p>Select <span style=\"font-weight: bold;\">Security <\/span>tab (Fig. 8).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura8.PNG\" alt=\"\" width=\"404\" height=\"455\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 8<\/span> &#8211; Setting E3Server&#8217;s security<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit<\/span> on <span style=\"font-weight: bold;\">Launch and Activation Permissions<\/span>, add user <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span>, and check the options <span style=\"font-weight: bold;\">Remote Launch<\/span> and <span style=\"font-weight: bold;\">Remote Activation<\/span> (Fig. 9).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura9.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 9 <\/span>&#8211; Setting E3Server&#8217;s launch permissions<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit<\/span> on <span style=\"font-weight: bold;\">Access Permissions<\/span>, add user <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span>, and check the option <span style=\"font-weight: bold;\">Remote Acces<\/span>s (Fig. 10).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura10.PNG\" alt=\"\" width=\"367\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 10<\/span> &#8211; Setting E3Server&#8217;s access permissions<\/span><\/div>\n<p>After that, you must grant <span style=\"font-weight: bold;\">E3Run<\/span>&#8216;s access, initialization, and remote activation permissions to <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span> user. To do so, right-click E3Run and select <span style=\"font-weight: bold;\">Properties <\/span>on its context menu (Fig. 11).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura11.png\" alt=\"\" width=\"500\" height=\"322\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 11<\/span> &#8211; Selecting E3Run&#8217;s properties<\/span><\/div>\n<p>Select <span style=\"font-weight: bold;\">Security <\/span>tab (Fig. 12).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura12.png\" alt=\"\" width=\"404\" height=\"455\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 12<\/span> &#8211; Setting E3Run&#8217;s security<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit<\/span> on <span style=\"font-weight: bold;\">Launch and Activation Permissions<\/span>, add user <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span>, and check the options <span style=\"font-weight: bold;\">Remote Launch<\/span> and <span style=\"font-weight: bold;\">Remote Activation<\/span> (Fig. 13).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura13.png\" alt=\"\" width=\"368\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 13<\/span> &#8211; Setting E3Run&#8217;s launch permissions<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit<\/span> on <span style=\"font-weight: bold;\">Access Permissions<\/span>, add user <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span>, and check the option <span style=\"font-weight: bold;\">Remote Access<\/span> (Fig. 14).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura14.png\" alt=\"\" width=\"369\" height=\"451\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 14<\/span> &#8211; Setting E3Run&#8217;s access permissions<\/span><\/div>\n<p>Finally, if the application uses OPC, you must also grant <span style=\"font-weight: bold;\">OpcEnum<\/span>&#8216;s access, initialization, and remote activation permissions to <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span> user. To do so, right-click OpcEnum and select <span style=\"font-weight: bold;\">Properties <\/span>on its context menu (Fig. 15).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura15.png\" alt=\"\" width=\"500\" height=\"532\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 15<\/span> &#8211; Selecting OpcEnum&#8217;s properties<\/span><\/div>\n<p>Select <span style=\"font-weight: bold;\">Security <\/span>tab (Fig. 16).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura16.png\" alt=\"\" width=\"402\" height=\"454\" align=\"bottom\" border=\"0\" \/><\/div>\n<div style=\"text-align: center;\"><span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 16<\/span> &#8211; Setting OpcEnum&#8217;s security<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit<\/span> on <span style=\"font-weight: bold;\">Launch and Activation Permissions<\/span>, add users <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span> and <span style=\"font-family: Courier New;\">SYSTEM<\/span>, and check the options <span style=\"font-weight: bold;\">Remote Launch<\/span> and <span style=\"font-weight: bold;\">Remote Activation<\/span> (Fig. 17).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura17.png\" alt=\"\" width=\"366\" height=\"449\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 17<\/span> &#8211; Setting OpcEnum&#8217;s launch permissions<\/span><\/div>\n<p>Click <span style=\"font-weight: bold;\">Edit<\/span> on <span style=\"font-weight: bold;\">Access Permissions<\/span>, add users <span style=\"font-family: Courier New;\">ANONYMOUS LOGON<\/span> and <span style=\"font-family: Courier New;\">SYSTEM<\/span>, and check the option <span style=\"font-weight: bold;\">Remote Access<\/span> (Fig. 18).<\/p>\n<div style=\"text-align: center;\"><img loading=\"lazy\" title=\"\" src=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura18.png\" alt=\"\" width=\"366\" height=\"450\" align=\"bottom\" border=\"0\" \/><br \/>\n<span style=\"font-size: xx-small;\"><span style=\"font-weight: bold;\">Figure 18 <\/span>&#8211; Setting E3Run&#8217;s access permissions<\/span><\/div>\n<p>For <b>Elipse E3 versions 4.6 or higher<\/b>, you will also need to grant permissions for accessing, initializing, and remotely activating <b>E3OPCClient <\/b>to ANONYMOUS LOGON user.<\/p>\n<p>These changes will make DCOM as Windows XP did before Service Pack 2.<\/p>\n<p><span style=\"font-weight: bold;\">NOTE<\/span>: It is essential that all computers on the network use the same settings suggested in this article, otherwise they too will refuse the connection to the OPC Server.<\/p>\n<p><b>5) Network<\/b><\/p>\n<p>To establish OPC communication with the settings in this article, all the computers involved must be in the same Microsoft domain, or at least in Work Groups with necessarily the same user and the same password in all computers (the user won&#8217;t necessarily need to be logged in, only to have been already created).<\/p>\n<p>All computers in the network must be able to &#8220;spot&#8221; each other <b>by their names<\/b> to exchange information; sharing only the IP or a folder won&#8217;t be enough for establishing OPC communication.<\/p>\n<p><span style=\"font-weight: bold;\">6) Final Remarks<\/span><\/p>\n<p>By better understanding how Windows Firewall (which guarantees extra protection for the computer on the network) and DCOM (an important protocol used by OPC drivers) work, it is possible to design a configuration that makes sure Elipse OPC drivers work the same way as they did in Windows XP&#8217;s previous edition.<\/p>\n<p>The changes suggested here do not represent the only alternative to solve the problem in question. For more specific solutions, and even less network exposure, please refer to:<\/p>\n<p><a href=\"http:\/\/download.microsoft.com\/download\/8\/7\/9\/879a7b46-5ddb-4a82-b64d-64e791b3c9ae\/02_CIF_Network_Protection.DOC\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/download.microsoft.com\/download\/8\/7\/9\/879a7b46-5ddb-4a82-b64d-64e791b3c9ae\/02_CIF_Network_Protection.DOC<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Elipse DCOM Wizard is a wizard to configure DCOM (Distributed Component Object Model) and Windows Firewall to allow remote connections. It displays predefined settings for the main products by Elipse Software, but it can be also used to configure third-party products&#8230;.<br \/>\nAutor<br \/>\nDiogo Augusto Hiller<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0},"categories":[737,770,773,756,775,757,824],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications. - Elipse Knowledgebase<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications.\" \/>\n<meta property=\"og:description\" content=\"Elipse DCOM Wizard is a wizard to configure DCOM (Distributed Component Object Model) and Windows Firewall to allow remote connections. It displays predefined settings for the main products by Elipse Software, but it can be also used to configure third-party products.... Autor  Diogo Augusto Hiller\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"Elipse Knowledgebase\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/elipsesoftware\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-25T20:30:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-15T14:05:43+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura1.PNG\" \/>\n<meta name=\"author\" content=\"Elipse Software\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elipse Software\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/\"},\"author\":{\"name\":\"Elipse Software\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87\"},\"headline\":\"DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications.\",\"datePublished\":\"2019-03-25T20:30:24+00:00\",\"dateModified\":\"2025-05-15T14:05:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/\"},\"wordCount\":2862,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\"},\"articleSection\":[\"Domain \/ E3Server \/ HotStandBy\",\"Elipse Scada\",\"OPCServer\",\"OPCServer\",\"Other\",\"Other\",\"Elipse Drivers OPC Altus TCP\/IP\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/\",\"url\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/\",\"name\":\"[:pt]DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications.[:en]DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications.[:] - Elipse Knowledgebase\",\"isPartOf\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#website\"},\"datePublished\":\"2019-03-25T20:30:24+00:00\",\"dateModified\":\"2025-05-15T14:05:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/kb.elipse.com.br\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kb.elipse.com.br\/#website\",\"url\":\"https:\/\/kb.elipse.com.br\/\",\"name\":\"Elipse Knowledgebase\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kb.elipse.com.br\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kb.elipse.com.br\/#organization\",\"name\":\"Elipse Software\",\"url\":\"https:\/\/kb.elipse.com.br\/\",\"sameAs\":[\"http:\/\/www.facebook.com\/elipsesoftware\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png\",\"contentUrl\":\"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png\",\"width\":161,\"height\":58,\"caption\":\"Elipse Software\"},\"image\":{\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87\",\"name\":\"Elipse Software\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kb.elipse.com.br\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g\",\"caption\":\"Elipse Software\"},\"url\":\"https:\/\/kb.elipse.com.br\/en\/author\/webmasterelipse-com-br\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications. - Elipse Knowledgebase","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/","og_locale":"en_US","og_type":"article","og_title":"[:pt]DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications.[:en]DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications.[:] - Elipse Knowledgebase","og_description":"[:en]Elipse DCOM Wizard is a wizard to configure DCOM (Distributed Component Object Model) and Windows Firewall to allow remote connections. It displays predefined settings for the main products by Elipse Software, but it can be also used to configure third-party products.... Autor  Diogo Augusto Hiller[:]","og_url":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/","og_site_name":"Elipse Knowledgebase","article_publisher":"http:\/\/www.facebook.com\/elipsesoftware","article_published_time":"2019-03-25T20:30:24+00:00","article_modified_time":"2025-05-15T14:05:43+00:00","og_image":[{"url":"http:\/\/kb.elipse.com.br\/pt-br\/images\/ID79\/Figura1.PNG"}],"author":"Elipse Software","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Elipse Software","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/#article","isPartOf":{"@id":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/"},"author":{"name":"Elipse Software","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87"},"headline":"DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications.","datePublished":"2019-03-25T20:30:24+00:00","dateModified":"2025-05-15T14:05:43+00:00","mainEntityOfPage":{"@id":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/"},"wordCount":2862,"commentCount":0,"publisher":{"@id":"https:\/\/kb.elipse.com.br\/#organization"},"articleSection":["Domain \/ E3Server \/ HotStandBy","Elipse Scada","OPCServer","OPCServer","Other","Other","Elipse Drivers OPC Altus TCP\/IP"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/","url":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/","name":"[:pt]DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications.[:en]DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications.[:] - Elipse Knowledgebase","isPartOf":{"@id":"https:\/\/kb.elipse.com.br\/#website"},"datePublished":"2019-03-25T20:30:24+00:00","dateModified":"2025-05-15T14:05:43+00:00","breadcrumb":{"@id":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kb.elipse.com.br\/en\/dcom-and-firewall-settings-in-windows-xp2003vista2008-for-elipse-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/kb.elipse.com.br\/en\/"},{"@type":"ListItem","position":2,"name":"DCOM and Firewall Settings in Windows XP\/2003\/Vista\/2008 for Elipse applications."}]},{"@type":"WebSite","@id":"https:\/\/kb.elipse.com.br\/#website","url":"https:\/\/kb.elipse.com.br\/","name":"Elipse Knowledgebase","description":"","publisher":{"@id":"https:\/\/kb.elipse.com.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kb.elipse.com.br\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kb.elipse.com.br\/#organization","name":"Elipse Software","url":"https:\/\/kb.elipse.com.br\/","sameAs":["http:\/\/www.facebook.com\/elipsesoftware"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/","url":"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png","contentUrl":"https:\/\/kb.elipse.com.br\/wp-content\/uploads\/2019\/05\/schererelipse-com-br\/logoElipse.png","width":161,"height":58,"caption":"Elipse Software"},"image":{"@id":"https:\/\/kb.elipse.com.br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/def69ea453ea60b250497b89225a9f87","name":"Elipse Software","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kb.elipse.com.br\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ff1f7ec38f4687b06f6851d97b3cd2d0?s=96&d=mm&r=g","caption":"Elipse Software"},"url":"https:\/\/kb.elipse.com.br\/en\/author\/webmasterelipse-com-br\/"}]}},"_links":{"self":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/345"}],"collection":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/comments?post=345"}],"version-history":[{"count":7,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/345\/revisions"}],"predecessor-version":[{"id":16944,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/posts\/345\/revisions\/16944"}],"wp:attachment":[{"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/media?parent=345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/categories?post=345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kb.elipse.com.br\/en\/wp-json\/wp\/v2\/tags?post=345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}