Configure the Windows Firewall to allow inbound access for Microsoft SQL Server and the Microsoft Distributed Transaction Coordinator (MSDTC).

Procedure

  1. Log in to the Microsoft SQL Server virtual machine with an administrative user by using a Remote Desktop Protocol (RCP) client.
  2. From the Start menu, click Run, type WF.msc in the Open text box, and click OK.
    The Windows Firewall with Advanced Security dialog box appears to configure firewall properties for each network profile.
  3. Allow Access for Microsoft SQL Server on TCP Port 1433.
    1. In the navigation pane, under Windows Firewall with Advanced Security, select and right-click Inbound Rules, and click New Rule in the action pane.
      The  New Inbound Rule Wizard appears.
    2. On the Rule Type page of the New Inbound Rule Wizard, select the Port radio button, and click Next.
    3. On the Protocol and Ports page, select TCP and enter the port number 1433 in the Specific local ports text box, and click Next.
    4. On the Action page, select Allow the connection, and click Next.
    5. On the Profile page, select the Domain,Private, and Public profiles, and click Next.
    6. On the Name page, enter a Name and a Description for this rule, and click Finish.
  4. Allow access for Microsoft Distributed Transaction Coordinator.
    1. In the navigation pane, under Windows Firewall with Advanced Security, select and right-click Inbound Rules, and click New Rule in the action pane.
    2. On the Rule Type page click Predefined, click Distributed Transaction Coordinator, and click Next.
    3. On the Predefined Rules page, select all rules for Distributed Transaction Coordinator (RPC-EPMAP), Distributed Transaction Coordinator (RPC), Distributed Transaction Coordinator (TCP-In), and click Next.
    4. On the Action page, select Allow the connection, and click Finish.
  5. Exit the Windows Firewall with Advanced Security wizard.
  6. Right click Powershell, select Run as Administrator, and run the following commands. These commands adjust the User Account Controls, disable IPv6, and restart the server to activate these changes.
    Command
    set-ItemProperty -Path "HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System" -Name "EnableLUA" -Value "0"
    set-ItemProperty -Path "HKLM:\System\CurrentControlSet\Services\TCPIP6\Parameters" -Name "DisabledComponents" -Value 0xff
    Restart-Computer