Added commands to allow Windows firewall access to WinRM HTTPS listener
This commit is contained in:
parent
7e055ec6cc
commit
f42905a9cc
2 changed files with 9 additions and 2 deletions
|
@ -102,6 +102,13 @@ Alternatively, a self-signed SSL certificate can be generated in powershell usin
|
|||
# Delete the http listener
|
||||
$ WinRM delete winrm/config/listener?Address=*+Transport=HTTP
|
||||
|
||||
Again, if your Windows firewall is enabled, you must also run the following command to allow firewall access to the public firewall profile:
|
||||
|
||||
.. code-block:: bash
|
||||
|
||||
# Windows 2008 / 2008R2 / 2012 / 2012R2
|
||||
$ netsh advfirewall firewall add rule name="Allow WinRM HTTPS" dir=in localport=5986 protocol=TCP action=allow
|
||||
|
||||
It's time to verify things are working::
|
||||
|
||||
ansible windows [-i inventory] -m ping --ask-vault-pass
|
||||
|
|
|
@ -17,7 +17,6 @@
|
|||
# 6.2 is 2012
|
||||
# 6.3 is 2012 R2
|
||||
|
||||
Start-Transcript "C:\powershell\scriptlog.txt"
|
||||
|
||||
if ($PSVersionTable.psversion.Major -ge 3)
|
||||
{
|
||||
|
@ -33,6 +32,7 @@ function download-file
|
|||
$client = new-object system.net.WebClient
|
||||
$client.Headers.Add("user-agent", "PowerShell")
|
||||
$client.downloadfile($path, $local)
|
||||
write-host "file downloaded successfully"
|
||||
}
|
||||
|
||||
if (!(test-path $powershellpath))
|
||||
|
@ -78,5 +78,5 @@ else
|
|||
|
||||
$FileName = $DownLoadUrl.Split('/')[-1]
|
||||
download-file $downloadurl "$powershellpath\$filename"
|
||||
Stop-Transcript
|
||||
|
||||
."$powershellpath\$filename" /quiet /log "C:\powershell\install.log"
|
||||
|
|
Loading…
Reference in a new issue