Firewall

https://docs.microsoft.com/en-us/powershell/module/netsecurity/?view=win10-ps

GPO

Computer configuration/Policies/
  Windows Settings/
    Security Settings/
      Windows Defender Firewall with Advanced Security/
        Windows Defender [...]/
          Inbound Rules

Open a port

Profile can be: Any, Domain, Private, Public, NotApplicable

New-NetFirewallRule -DisplayName "REVisionEffects Server" -Program "C:\Program Files (x86)\REVisionEffects\bin\rvlserver.exe" -Direction Inbound -Protocol TCP -LocalPort 9412 -Action Allow
New-NetFirewallRule -DisplayName "REVisionEffects Server" -Program "C:\Program Files (x86)\REVisionEffects\bin\rvlserver.exe" -Direction Inbound -Protocol UDP -LocalPort 9412 -Action Allow

https://docs.microsoft.com/en-us/powershell/module/netsecurity/new-netfirewallrule?view=win10-ps

Allow ping

Allow those rules

If the machine is not in a domain, the private,public part of the rule defaults to “Local subnet”… Great to work with VLANs…

NOTE to myself incase it happens again
open in windows firewall
File and Printer Sharing (Echo Request - ICMPv4-In)
and/or
Core Networking Diagnostics - ICMP Echo Request (ICMPv4-In)
the latter changed in the windows update 17 Sept 2020 - Yeah Microsoft !!!!
thanks
Damon

Disable

Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False

Netsh

netsh advfirewall show currentprofile state
netsh advfirewall set currentprofile state on
netsh advfirewall set currentprofile state off

netsh advfirewall firewall add rule name="WinRM-HTTPS" dir=in localport=5986 protocol=TCP action=allow

netsh advfirewall firewall show rule name=all dir=in | findstr -i  5986


netsh advfirewall set allprofiles state off
netsh advfirewall set allprofiles state on