Anyone using a computer connected to the Internet these days must be concerned with the security of the connection.
Most computer users will have a firewall of some type operating when connected to the Internet. Firewalls come in a variety of forms from a piece of hardware in the wiring connection, to a program supplied as part of the operating system. However they all perform the same basic function in that whenever a computer-to-computer connection across the firewall is attempted, the firewall decides to allow or deny the connection.
Different firewalls use different processes to make this decision, but generally there is a list of allowed and / or a list of disallowed connections. When Phoenix attempts to make a connection for live updating, the firewall compares the connection to the list, and then either allows or disallows the connection. Some firewalls will ask you to make the decision if the connection is not on the list, then act on your instruction and add the connection to the list. If you allow the connection the first time that it is attempted, then all subsequent connections should happen without intervention. If you disallow it, then Phoenix will not be able to connect to do the live update.
If your firewall is disallowing the connection, then you will need to edit the lists to allow it. The process to do this depends on your firewall, see the documentation provided with the firewall. The following information may help in editing the list;
Most of the firewall products in use in the domestic market allow the user to associate access based on the program name and location. If you are manually configuring your firewall then you will need to know where Phoenix has been installed. Typically Phoenix will be installed into the following location:
The typical program file location for Phoenix is:
C:\Program Files\AGDATA\Phoenix {Version}\Phoenix.exe