Firewall
https://docs.microsoft.com/en-us/powershell/module/netsecurity/?view=win10-ps
GPO
Computer configuration/Policies/
Windows Settings/
Security Settings/
Windows Defender Firewall with Advanced Security/
Windows Defender [...]/
Inbound Rules
Open a port
Profile can be: Any, Domain, Private, Public, NotApplicable
New-NetFirewallRule -DisplayName "REVisionEffects Server" -Program "C:\Program Files (x86)\REVisionEffects\bin\rvlserver.exe" -Direction Inbound -Protocol TCP -LocalPort 9412 -Action Allow
New-NetFirewallRule -DisplayName "REVisionEffects Server" -Program "C:\Program Files (x86)\REVisionEffects\bin\rvlserver.exe" -Direction Inbound -Protocol UDP -LocalPort 9412 -Action Allow
https://docs.microsoft.com/en-us/powershell/module/netsecurity/new-netfirewallrule?view=win10-ps
Allow ping
Allow those rules
If the machine is not in a domain, the private,public part of the rule defaults to “Local subnet”… Great to work with VLANs…
NOTE to myself incase it happens again
open in windows firewall
File and Printer Sharing (Echo Request - ICMPv4-In)
and/or
Core Networking Diagnostics - ICMP Echo Request (ICMPv4-In)
the latter changed in the windows update 17 Sept 2020 - Yeah Microsoft !!!!
thanks
Damon
Disable
Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False
Netsh
netsh advfirewall show currentprofile state
netsh advfirewall set currentprofile state on
netsh advfirewall set currentprofile state off
netsh advfirewall firewall add rule name="WinRM-HTTPS" dir=in localport=5986 protocol=TCP action=allow
netsh advfirewall firewall show rule name=all dir=in | findstr -i 5986
netsh advfirewall set allprofiles state off
netsh advfirewall set allprofiles state on