0% found this document useful (0 votes)
285 views

DCOM Configuration Guide

This document provides instructions for configuring DCOM on Windows servers and clients to enable remote communication between an OPC server and client. The summary is: 1. Configure the server by setting DCOM properties to enable distributed COM, set authentication and impersonation levels, add users to access and launch permissions, and configure the OpcEnum service. 2. Configure the client by adding permissions for the user account to be used. 3. Both server and client should use the same user account and password for configuration. 4. Access paths are provided for different Windows versions to configure DCOM properties.

Uploaded by

Herie Heriadie
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
285 views

DCOM Configuration Guide

This document provides instructions for configuring DCOM on Windows servers and clients to enable remote communication between an OPC server and client. The summary is: 1. Configure the server by setting DCOM properties to enable distributed COM, set authentication and impersonation levels, add users to access and launch permissions, and configure the OpcEnum service. 2. Configure the client by adding permissions for the user account to be used. 3. Both server and client should use the same user account and password for configuration. 4. Access paths are provided for different Windows versions to configure DCOM properties.

Uploaded by

Herie Heriadie
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

DCOM Configuration Manual

Notices

 The reproduction, transmission or use of this document or its contents is not permitted without express
written authority.

 Information and specifications in this document are subject to change without notice.

 While information in this document is well edited and checked, mistake or omission may exist. Please
don’t hesitate to contact SUPCON if you have any question about this document.

 Please contact SUPCON via email "SMS@supcon.com" if you have any question.

Trademarks

Trademarks or marks SUPCON, SPlant, Webfield, ESP-iSYS, MultiF, InScan, SupField are all registered,
registering or using by Zhejiang SUPCON Technology Co., Ltd., which owns the properties of all trademarks or
marks above. Without the written authority from Zhejiang SUPCON Technology Co., Ltd, no individual or
company shall use any trademarks or marks above. We reserve the right to take legal action for any individual or
company using trademarks or marks above illegally.

Symbol Definition

WARNING: Indicates information that a potentially hazardous situation which, if not avoided, could
result in serious injury or death.

RISK OF ELECTRICAL SHOCK: Indicates information that Potential shock hazard where
HAZARDOUS LIVE voltages greater than 30V RMS, 42.4V peak, or 60V DC may be accessible.

ESD HAZARD: Indicates information that Danger of an electro-static discharge to which


equipment may be sensitive. Observe precautions for handling electrostatic sensitive devices

ATTENTION: Identifies information that requires special consideration.

TIP: Identifies advice or hints for the user.


Table of Contents

Table of Contents

DCOM Configuration ....................................................................................................................1

Section 1 Overview.......................................................................................................................1

Section 2 Preliminary Preparation of Configuration..................................................................2

Section 3 DCOM Configuration ...................................................................................................3

3.1 Configure Server ...............................................................................................................3


3.1.1 Configure Component Services...............................................................................3
3.1.2 Configure Folder Options ......................................................................................14
3.1.3 Configure System Service .....................................................................................15
3.1.4 Configure System Security Strategy......................................................................17
3.2 Configure Client...............................................................................................................18

Section 4 Configuration Interface Access Path .......................................................................20

4.1 Windows XP ....................................................................................................................20


4.2 Windows 7.......................................................................................................................20
4.3 Windows Server 2003 .....................................................................................................20
4.4 Windows Server 2008 Standard 64-bit ............................................................................21
4.5 Windows 10.....................................................................................................................23

Section 5 Information of OPC Server........................................................................................25

Section 6 Revision......................................................................................................................26
DCOM Configuration Manual

DCOM Configuration

Section 1 Overview
OPC, as a universal industrial standard used wildly, is usually used for the inter-connection
between DCS and the process of the other system software. If OPC server and OPC client are not
running in the same computer, it needs to perform OPC remote connection and DCOM
configuration for both computers.
DCOM Configuration Manual

Section 2 Preliminary Preparation of Configuration


Before configuring DCOM, make sure:

 Windows operating system should be installed and configured according to responding


installation specification.

 User should use “administrator” to login Windows on the computer which is as sever and
client. Only the administrator-level user could set user account and configure DCOM.

 Communication between DCOM sever and DCOM client is well.(User can use the
command “ping”)

 The account and password of current user on the server should accord with that on the
client. For example, if the account and password of computer running client software are
DcomUser and abc, the account and password of server software have to be DcomUser
and abc, too.

Attention:

Both the account and the password should be the same. And empty password is not
allowed.
DCOM Configuration Manual

Section 3 DCOM Configuration


This section takes Windows 7 operation system as an example to introduce how to configure
DCOM. Configuration methods in other operation systems are similar.

 For 32-bit operation system, input “DCOMCNFG” in “Run” dialog to configure DCOM.

 For 64-bit operation system, input “mmc -32” in “Run” dialog, and add “Component
Services” in the window popped up to configure DCOM.
Operations in 64-bit windows 7 are same to operations in windows server 2008. For
detail, please refer to “1” in “4.4 Windows Server 2008 Standard 64-bit”.

Restart the computer after DCOM configuration completed. Server and client should login by the
same user name and password, and the password should not be null.

3.1 Configure Server

Configure following items for server:

 Configure “Computer” properties.

 Configure “OpcEnum” properties.

 Configure OPC server properties.

 Configure folder options.

 Configure system service.

 Configure system security strategy.

3.1.1 Configure Component Services

Press the keys “Win+R” on computer with OPC server to pop up the “Run” dialog. Input
“dcomcnfg” to enter into the “Component Services” interface, as shown in Figure 3-1.
DCOM Configuration Manual

Figure 3-1 Component Services

Configure Computer Properties

Select [Component Services/ Computers/ My Computer] in Figure 3-1, right-click “My Computer”
and select “Properties”, and select “Default Properties” tab in the interface popped up. Settings for
items are shown in Figure 3-2.
DCOM Configuration Manual

Figure 3-2 Default Properties


 Select “Enable Distributed COM on this computer”.

 Set “Default Authentication Level” as “None”.

 Set “Default Impersonation Level” as “Default”.

Switch to “Default Protocols” tab, as shown in Figure 3-3.


DCOM Configuration Manual

Figure 3-3 Default Protocols

Switch to “COM Security” tab, as shown in Figure 3-4.

Figure 3-4 COM Security

Click buttons “Edit Limits” and “Edit Default” for both “Access Permissions” and “Launch and
Activation Permissions” panes, and add following users:
DCOM Configuration Manual

 Everyone

 Interactive

 ANONYMOUSLOGIN

 Administrator

 Administrators

 SYSTEM

Take settings for “Edit Default” of “Everyone” as an example, steps to add user are shown below:

Click “Edit Default” for “Access Permissions”, to pop up the interface in Figure 3-5.

Figure 3-5 Access Permission

Click “Add” and click “Advanced” in the interface popped up, and then click “Find Now”, select
“Everyone”, as shown in Figure 3-6.
DCOM Configuration Manual

Figure 3-6 Select Users, Computer, Service Accounts, or Groups

Click “OK” to view the selected user, as shown in Figure 3-7.


DCOM Configuration Manual

Figure 3-7 View user name

Click “OK” to add “Everyone” successfully.

Select “Everyone” and select “Allow” for both local and remote access, as shown in Figure 3-8.

Figure 3-8 Add “Everyone” to access permission

The interface adding “Everyone” user permissions in “Launch and Activation Permission” is shown
DCOM Configuration Manual

in Figure 3-9.

Figure 3-9 Add “Everyone” to launch and activation permission

Please make sure that the 6 user permissions added are selected as “Allow”.

Configure OpcEnum Properties

Select [Component Services/ Computers/ My Computer/ DCOM Config/ OpcEnum], right-click and
select “Properties”, and select “General” tab. Change “Authentication Level” as “None”, as shown
in Figure 3-10.
DCOM Configuration Manual

Figure 3-10 General

Select “Location” pane, the setting is shown in Figure 3-11.

Figure 3-11 Location

Select “Security’ tab. Select “Customize” for 3 permissions, as shown in Figure 3-12. Click “Edit”
buttons one by one to add users “Everyone”, “Interactive”, “ANONYMOUS LOGIN”,
“Administrator”, “Administrators”, “SYSTEM”. All permissions are set as “Allow”. Operations steps
are shown from Figure 3-5 to Figure 3-9.
DCOM Configuration Manual

Figure 3-12 Security

Select “Endpoints” tab, the setting is shown in Figure 3-13.

Figure 3-13 Endpoints

Select “Identity” and select “The interactive user”, as shown in Figure 3-14.
DCOM Configuration Manual

Figure 3-14 Identity

If the option “The interactive user” is disabled, execute cmd command in “Run” dialog. Open the
cmd interface and execute commands “opcenum /unregserver”, then execute commands
“opcenum /regserver” to enable “The interactive user”.

Configure OPC Server Properties

Take ECSDASVR server as an example, select [Component Services/ Computers/ My Computer/


DCOM Config/ SUPCON.ECSDASVR], right-click and select “Properties”, to open the
ECSDASVR properties interface, as shown in Figure 3-15.

Configuration of ECSDASVR server is same with OpcEnum.


DCOM Configuration Manual

Figure 3-15 ECSDASVR properties

3.1.2 Configure Folder Options

Double-click “Computer” icon on desktop to open its interface. Select [Organize/ Folder and
search options] to open the “Folder Options” interface. Select “View” tab, unselect “Use Sharing
Wizard (Recommended)”, as shown in Figure 3-16.
DCOM Configuration Manual

Figure 3-16 Folder Options

3.1.3 Configure System Service

Select [Start/ Control Panel/ System and Security/ Administrative Tools/ Services] to open the
“Services” interface, as shown in Figure 3-17.
DCOM Configuration Manual

Figure 3-17 Services

Make sure items below are “Started”, as shown in Figure 3-18.

Figure 3-18 Check items status

If the item selected is “Disabled”, please start t by following operation.

Double-click the item to pop up the dialog shown in Figure 3-19, click “Start” to start it.
DCOM Configuration Manual

Figure 3-19 Service status

3.1.4 Configure System Security Strategy

Press the keys “Win+R” to pop up the “Run” dialog, input “secpol.msc” to enter into “Local Security
Policy” interface, as shown in Figure 3-20.
DCOM Configuration Manual

Figure 3-20 Local Security Policy

Set the “Security Setting” status of following items as shown in Figure 3-21.

Figure 3-21 Security settings

3.2 Configure Client

Configure following items for client computer:

 Configure “Computer” properties: configuration method and contents are same with
server, please refer to 3.1.1.

 Configure “OpcEnum” properties: configuration method and contents are same with
server, please refer to 3.1.1.

 Configure folder options: configuration method and contents are same with server,
please refer to 3.1.2.

 Configure system service: configuration method and contents are same with server,
DCOM Configuration Manual

please refer to 3.1.3.

 Configure system security strategy: configuration method and contents are same with
server, please refer to 3.1.4.
DCOM Configuration Manual

Section 4 Configuration Interface Access Path


Different operation systems have different access paths for configuration interface

4.1 Windows XP

1. Configuration Interface Access of Component Services

Select [Start/ Run] and input “DCOMCNFG” to open the “Components Services”
interface.

2. Configuration Interface Access of Folder Options

Open “Computer” interface, select [Tools/ Folder Options]. Select “View” tab, unselect
“Use Simple File Sharing (Recommended)”.

3. Configuration Interface Access of System Service

Select [Start/ Settings/ Control Panel (Classical View)/ Administrative Tools/ Services].

4. Configuration Interface Access of System Security Strategy

Press the keys “Win+R” to pop up the “Run” dialog, input “secpol.msc” to enter into
“Local Security Policy” interface.

4.2 Windows 7

“Section 3 DCOM Configuration” describes how to configure DCOM taking the Window 7 OS as
example (including 32-bit OS and 64-bit OS).

Tip:

Only the start of “Component Services” is different between 64-bit window 7 and 32-bit
window 7, other operations are same.

4.3 Windows Server 2003

5. Configuration Interface Access of Component Services

Select [Start/ Run] and input “DCOMCNFG” to open the “Components Services”
interface.

6. Configuration Interface Access of Folder Options


DCOM Configuration Manual

Open “Computer” interface, select [Tools/ Folder Options]. Select “View” tab, unselect
“Use Simple File Sharing (Recommended)”.

7. Configuration Interface Access of System Service

Select [Start/ Settings/ Control Panel (Classical View)/ Administrative Tools/ Services].

8. Configuration Interface Access of System Security Strategy

Press the keys “Win+R” to pop up the “Run” dialog, input “secpol.msc” to enter into
“Local Security Policy” interface.

4.4 Windows Server 2008 Standard 64-bit

1. Configuration Interface Access of Component Services

Select [Start/ Run] and input “mmc -32” to open the “Console Root” interface, as shown
in Figure 4-1.

Figure 4-1 Console1 interface

Click [File/ Add/Remove Snap-in…] to open the following window, as shown in Figure
4-2.
DCOM Configuration Manual

Figure 4-2 Add or Remove Snap-ins

Select “Component Services” in “Available snap-ins” pane, then click “Add” and “OK” to
add component services to console root, as shown in Figure 4-3. Configure DCOM as
below for the component service added.

Figure 4-3 Add component services to console root


2. Configuration Interface Access of Folder Options

Open “Computer” interface, select [Start/ Computer/ Organize/ Folder and search
options]. Select “View” tab, unselect “Use Sharing Wizard (Recommended)”.
DCOM Configuration Manual

3. Configuration Interface Access of System Service

Select [Start/ Control Panel/ System and Security/ Administrative Tools/ Services].

4. Configuration Interface Access of System Security Strategy

Press the keys “Win+R” to pop up the “Run” dialog, input “secpol.msc” to enter into
“Local Security Policy” interface.

4.5 Windows 10

1. Configuration Interface Access of Component Services

 For 32-bit operation system, input “DCOMCNFG” in “Run” dialog to configure DCOM.

 For 64-bit operation system, input “mmc -32” in “Run” dialog, and add “Component
Services” in the window popped up to configure DCOM.
Operations in 64-bit windows 7 are same to operations in windows server 2008. For
detail, please refer to “1” in “4.4 Windows Server 2008 Standard 64-bit”.

2. Configuration Interface Access of Folder Options

Open “This PC” interface, select [View/ Options]. Select “View” tab, unselect “Use
Simple File Sharing (Recommended)”.

3. Configuration Interface Access of System Service

Right click “This PC” and select “Manage” in the right-click menu, pop up the “Computer
Management” interface, then select “Services” below “Services and Applications”, as
shown below.
DCOM Configuration Manual

Figure 4-4 Service list window


4. Configuration Interface Access of System Security Strategy

Press the keys “Win+R” to pop up the “Run” dialog, input “secpol.msc” to enter into
“Local Security Policy” interface.
DCOM Configuration Manual

Section 5 Information of OPC Server


The OPC server information of SUPCON main system and product is shown in Table 5-1.

Table 5-1 Information of OPC server

Control System or Product OPCServer Description


ECS-100/JX-300X/JX-300XP SUPCON.JXServer Independent software: OPC Server
SUPCON.SCRTCore Integrated with VisualField
ECS-700 SUPCON.ECSDASVR
Independent software: ECSOPCSvr.exe
SUPCON.ECSAESVR
G3/G5 SUPCON.GCSServer Integrated with GCSContrix
TCS-900 SUPCON.TCSOPCDASVR Integrated with SafeContrix
VxSCADA SUPCON.VxSCADA Integrated with VxSCADA
SUPCON.SAMS
SAMS Integrated with SAMS
SUPCON.SAMSAEServer
SUPCON.MISGateOPC
MISGate Integrated with MISGate
SUPCON.OPCConnectGate
PIMS SUPCON.PIMS Integrated with PIMS
VxCollector SUPCON.RCIOPC Integrated with VxCollector
DCOM Configuration Manual

Section 6 Revision
Table 6-1 Retrofit list of the version

Document Version Applicable Version Remarks

Achieve interconnection via


V1.0 The first version
OPC (remote connection)

Achieve interconnection via


V1.1 (20121228)
OPC (remote connection)

V2.0 (20151023) For OPC interconnection. Rewrite.

V2.1 (20161011) For OPC interconnection. Add setting steps of Windows 10 operation system.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy