
ETAS
Troubleshooting Problems
ES592.1
-
User Guide
38
3. Right click on the used network adapter and select
Properties
in the context menu.
4. Select the
Power Management
tab and deactivate the
Allow
the computer to turn off this device to save power
option.
5. Select the
Advanced
tab. If the property
Autosense
is
included, deactivate it also.
6. Click
OK
to apply the settings.
Cause: Automatic disruption of network connection
It is possible after a certain period of time without data traffic that the network
card automatically interrupts the Ethernet connection. This can be prevented
by setting the registry key
autodisconnect
.
To set the registry key
autodisconnect
:
1. Open the Registry Editor.
2. Select under
HKEY_LOCAL_MACHINE\SYSTEM\
ControlSet001\Services\lanmanserver\paramete
rs
the Registry Key
autodisconnect
and change its value
to
0xffffffff
.
7.3.3
Personal Firewall blocks Communication
Cause: Permissions given through the firewall block ETAS hard
-
ware
Personal firewalls may interfere with access to ETAS Ethernet hardware. The
automatic search for hardware typically cannot find any Ethernet hardware at
all, although the configuration parameters are correct.
Certain actions in ETAS products may lead to some trouble if the firewall is not
properly parameterized, e.g. upon opening an experiment in ASCET or search
-
ing for hardware from within INCA or HSP.
If a firewall is blocking communication to ETAS hardware, you must either dis
-
able the firewall software while working with ETAS software, or the firewall
must be configured to give the following permissions:
• Outgoing limited IP broadcasts via UDP (destination address
255.255.255.255) for destination port 18001
• Incoming limited IP broadcasts via UDP (destination IP
255.255.255.255, originating from source IP 0.0.0.0) for destination port
18001
• Directed IP broadcasts via UDP to the network configured for the ETAS
application, destination port 18001
• Outgoing IP unicasts via UDP to any IP in network configured for the
ETAS application, destination ports 69, 18001, 18017 or 49152 to 50175
• Incoming IP unicasts via UDP originating from any IP in the network con
-
figured for the ETAS application, source ports 69, 18001, 18017 or 49152
to 50175