Sometimes when connected to a VPN, data traffic intended to go to an internet location will try to access the internet through the VPN rather than your local internet provider. When this happens, the traffic is subject to the rules and filters of the VPN. It sounds like your IT support needs to unblock some traffic. Give them this information and see if they can make a change for you. If your local area network is "hardened" (made more secure than default) it may be necessary to have your IT department open some ports and white list some website addresses to allow proper communications for the online installer, database connectivity, parts and supplier information, etc. These three addresses need to be unblocked to use the online installer and sign in: http://appregistry.live.altium.com http://vaultinstallation.live.altium.com http://vaultinstall.altium.com https//prd-v3.altium.com
And these for updates: "vaultinstall.altium.com", "appregistry.live.altium.com", "vaultinstallation.live.altium.com", "install.altium.com", "installation.altium.com " To download and run Altium Designer, In addition to disabling heuristic scanning for your Antivirus, you may need to have the following ports configured (unblocked) in Windows or your network software / hardware firewall: - Internet Ports: (http): 80 9495 (used by Content Cart) 9880 (used for HTTP and SOAP requests) 9843 is used for encrypted authentication with SSH. (https/SSL): 443 (Used by Altium Designer client, Altium License Manager and the AltiumVaults). - VPN Ports: 1194 and 1723 (Used by Virtual Private Network software and relates to users trying to connect to their company network server over a VPN connection from a remote (off site) location. - Network ports: TCP 9780 and 9785 (Used for communications between the Altium Infrastructure Server License manger and the client software) TCP 21001 and UDP 20001 & 20002 (Used for the Legacy Altium Private Server License manager) HTTP Port - 9780 HTTPS Port - 9785 Synchronization Service Port - 9791 LDAP Service Port - 9790 Websocket Port - 4649 Firebird Server Port - 3050 SVN Port - 3690 - Http addresses that may need to be unblocked: *.altium.*, *.compute-1.amazonaws.com, *.cloudfront.net, *.marketo.*, OctoPart.com For example: (http://installation.altium.com), (http://activation.altium.com), (https://workspaces.altium.com) (portal2.altium.com), (portal2.altium.eu), (portal2.altium.com.cn) , (portal1.altium.com), (portal1.altium.eu), (portal1.altium.com.cn), (Portal365.Altium.com), (*.api.altium.com), (payments.altium.com), (firmware.altium.com), (live.altium.com), (blog.live.altium.com) For Techdocs (also Key "F1") in Altium client: "techdocs.altium.com", "altium.com/documentation"", "munchkin.marketo.net", "app-sjf.marketo.com", "google-analytics.com", "tag.bounceexchange.com", "api.bounceexchange.com", "googletagmanager.com", "googleadservices.com", "a.adroll.com", "*.mktoresp.com" and "connect.facebook.net" If you are running a Proxy server for network access, this documentation has information to support the use of a Proxy Server with an on-site managed content server: https://www.altium.com/documentation/altium-concord-pro/support-proxy-server - Supplier Searches / Content Vault Part choices: For communication between Altium Designer or an on-site managed content server and Ciiva, verify that the following sites/ports are allowed: api.ciiva.com:443 (https port) api3.ciiva.com:443 ciiva.com:443 94.23.166.79:443 (https port) vault.live.altium.com (http port) partcatalog.altium.com http://partcatalog.webservice.altium.com s3.amazonaws.com 107.22.237.23 (http port) 23.23.115.137 (http port) 52.200.159.141 (http port) Use Supplier Search up to Vault 2.6.7 (if supplier is activated): "services.digikey.com", "media.digikey.com", "alliedelec.com", "api.arrow.com", "mouser.com", "webservices-rs.com", "newark.com", "api.tme.eu" and "uk.farnell.com" CIIVA: "ciiva.com", "api.ciiva.com" and api3.ciiva.com (HINT: If the Extension is installed AD tries to connect to ciiva during the AD start. So AD could crash if the security settings deny access.)