Default firewall ports used by eMServer and Process Simulate?
Tecnomatix Application Tune.exe and eMPlanner.exe should be added in exception list of firewalls.
Fixed ports:
Ports 53, 135 and 445 should be opened on both server and client, and any firewall in between.
53 is for DNS lookup
135 is for RPC (DCOM)
445 is for SMB - to access the system root
DCOM dynamic port range:
49152-65535 DCOM dynamic port range (it can be also even larger 1024-65535)
[https://learn.microsoft.com/en-us/system-center/dpm/configure-firewall-settings-for-dpm?view=sc-dpm-2022](https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fsystem-center%2Fdpm%2Fconfigure-firewall-settings-for-dpm%3Fview%3Dsc-dpm-2022&data=05%7C01%7C03b68c35-537f-4fd4-a7ee-9ae8590b062a%40ad011.siemens.com%7C430afca5e7354c05025908daa5530548%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C638004073246386156%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=MWoclB7UoDsywi419nsVcgE0OpoHXnggF6ne3KVALIs%3D&reserved=0)
The actual value of the dynamic range can be assessed based on this article:
[https://learn.microsoft.com/en-US/troubleshoot/windows-server/networking/default-dynamic-port-range-tcpip-chang](https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fen-US%2Ftroubleshoot%2Fwindows-server%2Fnetworking%2Fdefault-dynamic-port-range-tcpip-chang&data=05%7C01%7C03b68c35-537f-4fd4-a7ee-9ae8590b062a%40ad011.siemens.com%7C430afca5e7354c05025908daa5530548%7C38ae3bcd95794fd4addab42e1495d55a%7C1%7C0%7C638004073246386156%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=3fKPAd71EXHB3YF%2B0%2FJgLYMawZYi7qmTfE6LC797nVc%3D&reserved=0)
The Windows Firewall recognizes the RPC Dynamic Port range, when configuring the ports in a firewall rule, therefore one could set rules to permit the whole range.
Both articles describe ways to change the dynamic port range.
There could be other services or applications which use the DPM range, not only our software. Changing this value reduces the port pool used by RPC for communication.
Here is an explanation of how ports are being used:
Remote Procedure Call (RPC) is a mechanism that allows Windows processes to communicate, either between a client and server across a network or within a single computer. Numerous integrated Windows components use RPC. RPC uses dynamic ports for communication between computers, but a static port (TCP port 135) must also be used as a starting point for communication. The RPC endpoint mapper listens on this static port.
In a typical RPC session, a client contacts a server's endpoint mapper on TCP port 135 and requests the dynamic port number that is assigned to a particular service. The server responds with the IP address and port number that the service registered with RPC when it started. The client then contacts the service on that IP address and port.Here is another article about configuring the Firewall
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732839(v=ws.10)
Notes