Added commands to allow Windows firewall access to WinRM HTTPS listener

This commit is contained in:
Craig Ackerman 2014-06-19 16:59:57 +00:00 committed by Matt Martz
commit f42905a9cc
2 changed files with 9 additions and 2 deletions

View file

@ -101,6 +101,13 @@ Alternatively, a self-signed SSL certificate can be generated in powershell usin
$ winrm create winrm/config/Listener?Address=*+Transport=HTTPS  @{Hostname="host_name";CertificateThumbprint="certificate_thumbprint"}
# Delete the http listener
$ WinRM delete winrm/config/listener?Address=*+Transport=HTTP
Again, if your Windows firewall is enabled, you must also run the following command to allow firewall access to the public firewall profile:
.. code-block:: bash
# Windows 2008 / 2008R2 / 2012 / 2012R2
$ netsh advfirewall firewall add rule name="Allow WinRM HTTPS" dir=in localport=5986 protocol=TCP action=allow
It's time to verify things are working::