Aston-HyperV-Code/RTR-01.ps1

55 lines
1.6 KiB
PowerShell
Raw Normal View History

2021-04-09 15:51:30 +02:00
# Alexandre SIMAO
# GPLv3
# Script to install and configure a Fuckdows Server 2016 as a router
# RTR-01 Only
# Change the poor machine name
$name = Read-host "Nouveau nom d'h<>te?"
Rename-computer $name
# Install Routing and necessary linked roles
Install-WindowsFeature RemoteAccess, RSAT-RemoteAccess-PowerShell, Routing -IncludeManagementTools
#Install-remoteAccess -VpnType Vpn
# Display interfaces and active forwarding for all of thm via Regedit
netsh inter show inter
Set-ItemProperty -path 'HKLM:\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet`
\Services\Tcpip\Parameters' -Name 'IPEnableRouter' -Value '0x00000001'
Set-NetConnectionProfile -NetworkCategory Private
# Activate NAT and DHCP Relay
netsh routing ip relay install
netsh routing ip add interface name="WAN" state=enable
netsh routing ip relay add interface "WAN"
netsh rout ip rel set int ARC-CLI min=0
netsh routing ip relay add interface "Arc-CLI"
netsh rout ip rel set int ARC-SRV min=0
netsh routing ip relay add interface "Arc-SRV"
netsh rout ip rel set int WAN min=0
netsh routing ip relay add dhcpserver 192.168.8.1
set-service RemoteAccess -StartupType Automatic
Start-Service RemoteAccess
netsh -f ./Arc-CLI.conf
netsh -f ./Arc-SRV.conf
netsh -f ./WAN.conf
# Change ZoneAlarm rule to accept incoming ICMP ipv4 probes
$Params = @{
"Name" = 'vm-monitoring-icmpv4'
"Action" = 'Allow'
}
Set-NetFirewallRule @Params
# Add routes
route add -p 192.168.8.0/24 192.168.8.254
route add -p 192.168.12.0.24 192.168.12.254
route add -p 192.168.255.0/24 192.168.255.8
route add -p 192.168.128.8/24 192.168.255.128
2021-04-09 11:43:46 +02:00
route add -p 0.0.0.0/0 192.168.255.0