It is a more involved process, including enabling the protocol, configuring the firewall, and adjusting user permissions ...