Aston-HyperV-Code/Guests/RTR-03.ps1

81 lines
2.1 KiB
PowerShell
Raw Normal View History

2021-04-22 11:05:32 +02:00
# Made by Alexandre SIMAO
2021-04-09 15:51:30 +02:00
# GPLv3
# Script to install and configure a Fuckdows Server 2016 as a router
2021-04-22 11:05:32 +02:00
# RTR-01 Only
# Script done
2021-04-09 15:51:30 +02:00
# Change the poor machine name
2021-04-19 17:06:39 +02:00
2021-04-22 11:05:32 +02:00
echo "Shamefully made by Alexandre Simao. Pardon-me M. Stallman"
2021-04-19 17:06:39 +02:00
2021-04-22 11:05:32 +02:00
Rename-computer RTR-03
2021-04-09 15:51:30 +02:00
2021-04-22 11:05:32 +02:00
$adapts = Get-NetAdapter
foreach ($adapt in $adapts) {
$HVName = (Get-NetAdapterAdvancedProperty -name $adapt.name -DisplayName "Hyper-v Network Adapter Name").DisplayValue
Rename-Netadapter -name $adapt.name -NewName $HVName
}
2021-04-19 16:04:47 +02:00
2021-04-22 11:05:32 +02:00
#Général IP configure
2021-04-09 15:51:30 +02:00
2021-04-22 11:05:32 +02:00
$MaskBits = 24 # This means subnet mask = 255.255.255.0
$IPType = "IPv4"
2021-04-09 15:51:30 +02:00
2021-04-22 11:05:32 +02:00
#WAN IP conf
$adapter = Get-NetAdapter | ? {$_.Name -eq "WAN"}
$IP = "192.168.255.254"
$adapter | New-NetIPAddress `
-AddressFamily $IPType `
-IPAddress $IP `
-PrefixLength $MaskBits
#Aston
$adapter = Get-NetAdapter | ? {$_.Name -eq "Aston"}
$IP = "192.168.255.254"
$adapter | Set-NetIPInterface -Dhcp Enabled
2021-04-20 16:08:08 +02:00
2021-04-22 11:05:32 +02:00
#DNS Conf for all InterfaceAlias
foreach ($c in Get-NetAdapter) { write-host 'Setting DNS for' $c.interfaceName ; Set-DnsClientServerAddress -InterfaceIndex $c.interfaceindex -ServerAddresses ('9.9.9.9') }
# Install Routing and necessary linked roles
Install-WindowsFeature RemoteAccess, RSAT-RemoteAccess-PowerShell, Routing -IncludeManagementTools
#Install VPN
echo "Install-remoteAccess -VpnType Vpn"
Install-remoteAccess -VpnType Vpn
Set-NetConnectionProfile -NetworkCategory Private
2021-04-09 15:51:30 +02:00
$Params = @{
"Name" = 'vm-monitoring-icmpv4'
"Action" = 'Allow'
}
Set-NetFirewallRule @Params
2021-04-22 11:05:32 +02:00
set-service RemoteAccess -StartupType Automatic
Start-Service RemoteAccess
netsh -f ./WAN.conf
2021-04-20 16:08:08 +02:00
Set-NetConnectionProfile -networkcategory private
2021-04-22 11:05:32 +02:00
# Change ZoneAlarm rule to accept incoming ICMP ipv4 probes
$Params = @{
"Name" = 'vm-monitoring-icmpv4'
"Action" = 'Allow'
}
Set-NetFirewallRule @Params
2021-04-20 16:08:08 +02:00
2021-04-09 15:51:30 +02:00
# Add routes
route add -p 192.168.8.0/24 192.168.255.8
route add -p 192.168.12.0/24 192.168.255.8
route add -p 192.168.128.0/24 192.168.255.128
2021-04-22 11:05:32 +02:00
route add -p 0.0.0.0/0 192.168.255.254
Read-Host "Finished???"