Obstacles to look out for

<< Click to Display Table of Contents >>

Navigation:  Installation and Update Guide > Operating system configurations >

Obstacles to look out for

Previous pageReturn to chapter overviewNext page

A number of possible obstacles can interfere and create problems for network installations. Some of the most common ones are listed in the table below.

 

Obstacle

Explanation

Firewalls

Firewalls on the server and/or on the workstations may stand in the way of sharing, drive mapping and the TCP/IP communication that is necessary for both Spider database communication and the licensing with server based licenses, either software or hardware lock based. Reconfiguring or turning off such firewalls may be necessary.

 

Anti-virus software

There is no limit to what surprises anti-virus software may cause. The experience says that virtually anything can happen. Please note that operations are affected by anti-virus software both on the server and on the workstations. The situation can worsen when both are active checking the same operations multiple times. Some other known problems created by anti-virus software include poor performance, stability issues and the total loss of all functionality. To avoid and/or reduce such problems, there is a good idea to exclude both the cadett ELSA main directory (typically \ELSA) and the area where your projects are stored, often the project main directory (typically \PROJ), from all runtime anti-virus checks. This should be done both on the server and on the workstations. (cadett ELSA makes its own check of executable files making it unnecessary for anti-virus software to do the same).

 
The cadett ELSA workstation directory on each workstation (C:\ELSAWSxx or similar) should also be excluded in the same way.

 

Other security restrictions

Operating system developers and computer administrators constantly invent new methods of preventing productive work from being done. In most cases, this is made in the name of security.

 

 

In the subtopics listed below, the most common actions that you need to take are discussed in detail.

 

Firewall settings

Sharing including user rights to the share

User rights to the file system

Drive letter mapping on the workstations