Skip to content
  • There are no suggestions because the search field is empty.

Network and System Firewall Readiness

Overview

Before commissioning begins, it is essential to confirm that all security controls — both at the network and system level — allow visability components to communicate without restriction.

Firewall rules and endpoint security tools are one of the most common causes of deployment delays. Validating these ahead of time ensures that systems can communicate as expected and allows commissioning to proceed without unnecessary troubleshooting.

But the goal here is simple: You do not need to change your organization’s security model — only ensure that:

👉 Required communication is allowed from end to end

This includes:

  • Across the network
  • Between VLANs
  • Through firewalls
  • At the operating system level
  • Within endpoint protection policies

Network Firewall and Segmentation

Network firewalls and routing policies must allow communication between all visability components.

At a Minimum

  • Required ports are open between all systems
  • Inter-VLAN communication is allowed where segmentation exists
  • No network-level rules are blocking communication between:
    • System Manager and Display Nodes
    • Display Nodes and source systems
    • Client interfaces and the System Manager

If systems are deployed across multiple VLANs or network segments, routing and firewall rules must be configured and validated accordingly.

Windows Firewall Configuration

Even when network firewall rules are correctly configured, communication can still be blocked at the system level.

Each vis|ability system must be reviewed to ensure that Windows Firewall is not preventing required traffic.

What to Validate

  • Windows Firewall is:
    • Configured to allow required visability services, or
    • Adjusted to permit necessary inbound and outbound communication
  • Required services (web access, streaming, control communication) are accessible between systems

Endpoint Protection and Antivirus Considerations

Endpoint protection platforms — including antivirus, EDR, and security monitoring tools — can interfere with visability operation if not properly configured.

These tools may block:

  • Application processes
  • Network communication
  • Streaming traffic
  • Background services

What to Validate

  • Endpoint protection or antivirus software is installed and accounted for
  • Exceptions are defined for:
    • vis|ability applications and services
    • Required network communication paths
  • Security policies do not block or quarantine vis|ability components

Common Symptoms of Security-Related Blocking

  • Systems are reachable on the network but cannot communicate properly
  • Display Nodes appear offline or fail to register
  • Streams are available but fail to load
  • Intermittent or inconsistent system behavior

These issues are often caused by local or network-level security controls rather than the visability system itself.