当前位置:网站首页>Kepserver configuration
Kepserver configuration
2022-07-27 11:15:00 【JDS_ DIJ】
Reference documents :
Interface is introduced : https://www.cnblogs.com/ioufev/p/9366877.html
KEPServer To configure : https://www.cnblogs.com/ioufev/p/9365919.html
practice : https://blog.csdn.net/qq_36079837/article/details/115722521
Create an account
step : Set up --> Account --> Home and other users --> Add other people to this computer
Add to Distributed COM Users Group
step : cmd Window type :control userpasswords2 --> Select the user just added --> attribute --> The group members --> Choose other --> Drop down to select Distributed COM Users --> application –> determine
Configure firewall rules
step : win + q Search firewall --> Inbound rules --> WMI-In --> Right click properties --> Check enabled
establish OPC Rules of procedure
step : New inbound rule --> Right click on the stack rule to create a new rule --> Program --> This program path --> C:\Windows\SysWOW64\OpceEnum.exe --> The next step along the way
add to OPC Rules of the server program
step : New inbound rule --> Right click New inbound rule --> Program --> This program path --> C:\Program Files (x86)\Kepware\KEPServerEX 6\server_runtime.exe --> The next step along the way
Be careful
explain : If firewall software is used , Please take this 2 Rules are added to the white list .
Component service
step : win + q Search component services
OpcEnum Security options for
KEPServer Security options for
边栏推荐
- Today's code farmer girl summarized her notes about NPM package management and URL module
- Budweiser, a well-known beer, plans to launch NFT in an attempt to unveil the "long planned" uplink?
- Maximized array sum after 13 K negations
- NFT leaderboard -nft real offer latest address: NFT leaderboard.com
- 发动机悬置系统冲击仿真-瞬时模态动态分析与响应谱分析
- How to build a data index system is the most effective. From 0 to 1, we will take you a quick start - 02 live review
- A deep analysis of the soul of C language -- pointer
- A verification test of the relationship between iteration number and entropy
- Luogu p1896 non aggression
- [FPGA tutorial case 40] communication case 10 -- Verilog implementation of a simple OFDM system based on FPGA
猜你喜欢

Cancer DDD

数字三角形模型 AcWing 1015. 摘花生

The open source project Taier version 1.1 was officially released, and the list of new functions is fast

背包模型 AcWing 423. 采药

Wechat push - template message parameter configuration

Why is the data service API the standard configuration of the data midrange when we take the last mile of the data midrange?

博弈论 AcWing 894. 拆分-Nim游戏

Compete for the key battle of stock users and help enterprises build a perfect labeling system - 01 live review

Backpack model acwing 1022. Collection of pet elves

Budweiser, a well-known beer, plans to launch NFT in an attempt to unveil the "long planned" uplink?
随机推荐
FAQs of "relay chain" and "dot" in Poka ecosystem
黑白像素分布对迭代次数的影响
Opengauss kernel analysis - statistics and row count estimation
BeautifulSoup的使用
XXX packages are looking for funding run 'NPM fund' for details solutions
Antd table+checkbox default value display
荒野觅踪---寻找迭代次数
Yonbuilder enables innovation, and the "golden keyboard Award" of the fourth UFIDA developer competition is open!
Why is the data service API the standard configuration of the data midrange when we take the last mile of the data midrange?
Sorry, you guys have something to deal with in the bank recently, which has been delayed
Compete for the key battle of stock users and help enterprises build a perfect labeling system - 01 live review
Miscellaneous records of Finance
7 row K with the weakest combat effectiveness in the matrix
How to build a real-time development platform to deeply release the value of enterprise real-time data?
求组合数 AcWing 889. 满足条件的01序列
学习笔记-简易服务器实现
2022牛客多校训练(3)A-Ancestor 题目翻译
Yiwen counts NFT projects valued at more than US $100million
Yum source installation
Introduction to software vulnerability analysis (I)





