Server

The firewall rules are installed by the server installer, however if they get lost, this is what is required.

  1. SQL Browser: UDP, port 1434, local subnet
  2. SQL Server: UDP/TCP, program C:\Program Files\Microsoft SQL Server\MSSQL12.SPINALOGIC\MSSQL\Binn\sqlservr.exe, local subnet
  3. DICOM: TCP, port 104, local subnet

And here are the scripts that will create each of these:

  1. netsh advfirewall firewall add rule name=”Spinalogic SQL Server” dir=in action=allow program=”C:\Program Files\Microsoft SQL Server\MSSQL12.SPINALOGIC\MSSQL\Binn\sqlservr.exe” enable=yes profile=private
  2. netsh advfirewall firewall add rule name=”Spinalogic SQL Browser” dir=in action=allow protocol=UDP localport=1434 profile=private
  3. netsh advfirewall firewall add rule name=”Spinalogic DICOM” dir=in action=allow protocol=TCP localport=104 profile=private

Note that these are all assuming a peer-to-peer network. If a domain, replace ‘private’ with ‘domain’.

Finally, the command to turn on/off firewall:

netsh advfirewall set privateprofile state on

Workstations

Spinalogic automatically checks and installs the required rules on startup.

 

Leave a Reply

Your email address will not be published. Required fields are marked *