Added FW commands to allow access to HTTPS listener

This commit is contained in:
Craig Ackerman 2014-06-19 17:08:17 +00:00 committed by Matt Martz
parent f42905a9cc
commit cd3edf1eba
2 changed files with 4 additions and 3 deletions

View file

@ -102,7 +102,7 @@ Alternatively, a self-signed SSL certificate can be generated in powershell usin
# Delete the http listener
$ WinRM delete winrm/config/listener?Address=*+Transport=HTTP
Again, if your Windows firewall is enabled, you must also run the following command to allow firewall access to the public firewall profile:
Again, if your Windows firewall is enabled, the following command to allow firewall access to the HTTPS listener:
.. code-block:: bash

View file

@ -32,7 +32,6 @@ function download-file
$client = new-object system.net.WebClient
$client.Headers.Add("user-agent", "PowerShell")
$client.downloadfile($path, $local)
write-host "file downloaded successfully"
}
if (!(test-path $powershellpath))
@ -56,6 +55,7 @@ if (!(test-path $powershellpath))
# If the Operating System is above 6.2, then you already have PowerShell Version > 3
if ([Environment]::OSVersion.Version.Major -gt 6)
{
write-host "OS is new; upgrade not needed."
Exit
}
@ -78,5 +78,6 @@ else
$FileName = $DownLoadUrl.Split('/')[-1]
download-file $downloadurl "$powershellpath\$filename"
write-host "Download successful"
exit
."$powershellpath\$filename" /quiet /log "C:\powershell\install.log"