theWoolf писал(а):Динамический диапазон порезали до 20 портов средствами Windows.
Поясните, пожалуйста.
theWoolf писал(а):всего 5 платформ( 3 из них в одной подсети видят друг друга, а 2 в других подсетях (друг друга тоже не видят), хисториан в первой тройке)
Если сетевая структура - не домен, то на всех машинах подредактируйте файл HOSTS, если домен - проверьте корректность работы DNS-серверов домена.
Откройте все необходимые порты в брендмауэрах. Перечень портов (приблизительный):
HTTP TCP 80
HTTPS TCP 443
Remote Desktop Connection TCP 3389
CIFS TCP 445 Outbound File serving, deploying. From IDE to IAS.
NETBIOS Datagram UDP 138 Send Name Service/Browsing. From IAS to Browse Master or from Browse Master to Domain Master Browser.
NETBIOS Name Service UDP 137 Send Receive Name Service/Browsing. From IAS to WINS Server or Browse Master or Domain Master Browser.
NETBIOS Session TCP 139 Outbound Server Message Block (SMB). Used to implement Windows networking from IAS to the Domain Controller if applicable.
NMXSVC TCP 5026 Outbound Archestra Communication Channel. Peer-to-Peer, bidirectional between all ArchestrA-enabled nodes.
RPC DCE TCP 135 Outbound DCOM. Peer-to-Peer, bidirectional between all ArchestrA-enabled nodes.
RPC Dynamic Port Range TCP 6000-6050* Outbound *Custom range. Peer-to-Peer, bi-directional between all ArchestrAenabled nodes.
SQL Server TCP 1433 Inbound SQL Server. From SQL Server to Client SQL Client TCP 1433 Outbound SQL Client. From Client to SQL Server
SQL Browser UDP 1434 Send Receive Only if implementing SQL Server instances
SUITELINK TCP 5413 TCP 1024-65000 (see note below) Suitelink: InTouch, IO Server communication.
PING ICMP Protocol Type 8 Between all ArchestrA - enabled nodes.
NTP UDP 123 Time Synchronization. From Client to Domain controller(s) or time master.
DNS UDP 53, TCP 53 Domain Name Service. From client to DNS Server.
LDAP TCP 389 Active Directory Domain, from client to Domain Controller(s)
KERBEROS TCP 88 Authentication
Note SuiteLink establishes a secondary connection in the disclosed port range. Stateful packet inspection firewalls handle this operation automatically. If the user needs to establish this on their own, they are then aware of the secondary connection ports.