EasyManua.ls Logo

ETAS ES415.1 - Personal Firewall Blocks Communication

ETAS ES415.1
113 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ES415.1 - User’s Guide 67
ETAS
Cause: Automatic disruption of network connection
It is possible after a certain period of time without data traffic that the network
card automatically interrupts the Ethernet connection. This can be prevented by
setting the registry key autodisconnect.
Setting the Registry Key autodisconnect:
1. Open the Registry Editor:
Windows 7, 8.1:
1.1 Click on the Windows symbol.
1.2 Enter regedit in the entry field.
1.3 Push <E
NTER>.
Windows 10:
1.1 Rightclick on the Windows symbol.
1.2 Click on Search.
1.3 Enter regedit in the entry field.
1.4 Push <E
NTER>.
2. Select under HKEY_LOCAL_MACHINE\SYSTEM\
ControlSet001\Services\lanmanserver\
parameters the Registry Key autodiscon-
nect.
3. Change its value to 0xffffffff.
6.3.3 Personal Firewall Blocks Communication
Reason: Missing releases in the firewall block the ETAS hardware
Personal firewalls may interfere with access to ETAS Ethernet hardware. The
automatic search for hardware typically cannot find any Ethernet hardware at all,
although the configuration parameters are correct.
Some actions in ETAS products can lead to problems if the firewall is not properly
parameterized, e.g. when opening the experiment environment in ASCET or for
the hardware search by INCA or HSP.
If a firewall is blocking communication to ETAS hardware, you must either disable
the firewall software while working with ETAS software, or the firewall must be
configured to give the following permissions:
Outgoing limited IP broadcasts via UDP (destination IP 255.255.255.255)
for the destination port 17099 or 18001
Incoming limited IP broadcasts via UDP (destination IP 255.255.255.255,
originating from source IP 0.0.0.0) for destination port 18001
Directed IP broadcasts via UDP to the network configured for the ETAS
application, destination ports 17099 or 18001
Outgoing IP unicasts via UDP to every IP address in the network configured
for the ETAS application, destination ports 17099 to 18020
Incoming IP unicasts via UDP originating from any IP address in the net-
work configured for the ETAS application, originating ports 17099 to
18020, destination ports 17099 to 18020

Table of Contents

Related product manuals