Integrity Modeler Installation > Installing Integrity Modeler > Server Only Installation > Post-Server Only Installation Tasks > Setting up the Windows Firewall
  
Setting up the Windows Firewall
The Windows firewall on the Modeler server computer will prevent Modeler clients from accessing the server's repositories. To overcome this problem, set up the Windows firewall to allow access to the Modeler applications.
When a Windows server is added to a domain, ping is blocked by default. You must enable ping on the Windows server. For more information, see I cannot connect to the server.
If you are using Windows Server, verify that the Windows firewall rule named File and Printer Sharing (Echo Request — ICMPv4–In) is enabled by performing the following steps:
1. On the Windows Start menu, point to Administrative Tools, and then click Windows Firewall with Advanced Security.
2. In the left pane, click Inbound Rules.
3. In the rules list, find the File and Printer Sharing (Echo Request - ICMPv4–In) rule for the Domain profile.
4. Check that the Enabled column is set to Yes for the rule name.
A gray icon indicates that a rule is disabled.
5. If the Enabled column is set to No, right-click the rule name, and then click Enable Rule to enable the rule.
6. Close the Windows Firewall with Advanced Security window.
The following files need to be set up as exceptions. In each case, the path shown is for a Modeler installation to the default locations.
For 64-bit versions of Windows:
C:\Program Files (x86)\PTC Integrity Modeler\License Manager\lmgrd.exe (for Floating License Server)
C:\Program Files (x86)\PTC Integrity Modeler\License Manager\artsansw.exe (for Floating License Server)
C:\Program Files (x86)\Microsoft SQL Server\MSSQL12.MODELER\MSSQL\Binn\sqlservr.exe (Allow inbound connections to SQL Server)
For 32-bit versions of Windows:
C:\Program Files\PTC Integrity Modeler\License Manager\lmgrd.exe (for Floating License Server)
C:\Program Files\PTC Integrity Modeler\License Manager\artsansw.exe (for Floating License Server)
C:\Program Files\Microsoft SQL Server\MSSQL12.MODELER\MSSQL\Binn\sqlservr.exe (Allow inbound connections to SQL Server)
You should also ensure that the following ports are open:
1433 - for the SQL Server instance, sqlservr.exe
1434 - allow inbound UPD connections to the Microsoft SQL Server Browser service, sqlbrowser.exe.
27000 - for the PTC Integrity Modeler License Server service, which is used by the Floating License Server. The lmgrd port by default is 27000 but can be explicitly specified on the SERVER line: SERVER myserver.mycompany.com ID 27001
It is necessary to define not only the TCP port that lmgrd will use, but also the port each vendor daemon will use. The vendor daemon port is random but can be explicitly specified on the DAEMON line. The 'PORT=' entry on the DAEMON line allows explicit selection of both externally available ports. 27001 is the TCP port reserved for use by the lmgrd process while 27002 is the port used by the vendor daemon process idl_lmgrd. Both port numbers must be unused by other processes. For example: DAEMON ARTSANSW PORT=27002
For more information about the ports that Modeler uses, see Executables that use Ports and their protocols in Integrity Modeler.