Added FW commands to allow access to HTTPS listener
This commit is contained in:
parent
f42905a9cc
commit
cd3edf1eba
2 changed files with 4 additions and 3 deletions
|
@ -102,7 +102,7 @@ Alternatively, a self-signed SSL certificate can be generated in powershell usin
|
|||
# Delete the http listener
|
||||
$ WinRM delete winrm/config/listener?Address=*+Transport=HTTP
|
||||
|
||||
Again, if your Windows firewall is enabled, you must also run the following command to allow firewall access to the public firewall profile:
|
||||
Again, if your Windows firewall is enabled, the following command to allow firewall access to the HTTPS listener:
|
||||
|
||||
.. code-block:: bash
|
||||
|
||||
|
|
|
@ -32,7 +32,6 @@ function download-file
|
|||
$client = new-object system.net.WebClient
|
||||
$client.Headers.Add("user-agent", "PowerShell")
|
||||
$client.downloadfile($path, $local)
|
||||
write-host "file downloaded successfully"
|
||||
}
|
||||
|
||||
if (!(test-path $powershellpath))
|
||||
|
@ -56,6 +55,7 @@ if (!(test-path $powershellpath))
|
|||
# If the Operating System is above 6.2, then you already have PowerShell Version > 3
|
||||
if ([Environment]::OSVersion.Version.Major -gt 6)
|
||||
{
|
||||
write-host "OS is new; upgrade not needed."
|
||||
Exit
|
||||
}
|
||||
|
||||
|
@ -78,5 +78,6 @@ else
|
|||
|
||||
$FileName = $DownLoadUrl.Split('/')[-1]
|
||||
download-file $downloadurl "$powershellpath\$filename"
|
||||
|
||||
write-host "Download successful"
|
||||
exit
|
||||
."$powershellpath\$filename" /quiet /log "C:\powershell\install.log"
|
||||
|
|
Loading…
Reference in a new issue