Network and System Firewall Readiness
Overview
Before commissioning begins, it is essential to confirm that all security controls — both at the network and system level — allow visability components to communicate without restriction.
Firewall rules and endpoint security tools are one of the most common causes of deployment delays. Validating these ahead of time ensures that systems can communicate as expected and allows commissioning to proceed without unnecessary troubleshooting.
But the goal here is simple: You do not need to change your organization’s security model — only ensure that:
👉 Required communication is allowed from end to end
This includes:
- Across the network
- Between VLANs
- Through firewalls
- At the operating system level
- Within endpoint protection policies
Network Firewall and Segmentation
Network firewalls and routing policies must allow communication between all visability components.
At a Minimum
- Required ports are open between all systems
- Inter-VLAN communication is allowed where segmentation exists
- No network-level rules are blocking communication between:
- System Manager and Display Nodes
- Display Nodes and source systems
- Client interfaces and the System Manager
If systems are deployed across multiple VLANs or network segments, routing and firewall rules must be configured and validated accordingly.
Windows Firewall Configuration
Even when network firewall rules are correctly configured, communication can still be blocked at the system level.
Each vis|ability system must be reviewed to ensure that Windows Firewall is not preventing required traffic.
What to Validate
- Windows Firewall is:
- Configured to allow required visability services, or
- Adjusted to permit necessary inbound and outbound communication
- Required services (web access, streaming, control communication) are accessible between systems
Endpoint Protection and Antivirus Considerations
Endpoint protection platforms — including antivirus, EDR, and security monitoring tools — can interfere with visability operation if not properly configured.
These tools may block:
- Application processes
- Network communication
- Streaming traffic
- Background services
What to Validate
- Endpoint protection or antivirus software is installed and accounted for
- Exceptions are defined for:
- vis|ability applications and services
- Required network communication paths
- Security policies do not block or quarantine vis|ability components
Common Symptoms of Security-Related Blocking
- Systems are reachable on the network but cannot communicate properly
- Display Nodes appear offline or fail to register
- Streams are available but fail to load
- Intermittent or inconsistent system behavior
These issues are often caused by local or network-level security controls rather than the visability system itself.