Add firewall rules for ICMP and Comments

This commit is contained in:
Winston Smith 2021-04-09 11:34:47 +02:00
parent c2f4b6c872
commit bbdaaca5eb
5 changed files with 74 additions and 45 deletions

13
Arc-CLI.conf Normal file
View File

@ -0,0 +1,13 @@
pushd routing ip relay
Install
set global loglevel = ERROR
add dhcpserver 192.168.8.1
add interface name = "Arc-CLI"
set interface name = "Arc-CLI" relaymode = enable maxhop = 6 minsecs = 6
popd

13
Arc-SRV.conf Normal file
View File

@ -0,0 +1,13 @@
pushd routing ip relay
Install
set global loglevel = ERROR
add dhcpserver 192.168.8.1
add interface name = "Arc-SRV"
set interface name = "Arc-SRV" relaymode = enable maxhop = 6 minsecs = 6
popd

View File

@ -55,4 +55,13 @@ Add-DhcpServerv4Scope -name "Bou-LAN" -StartRange 192.168.128.1 -EndRange 192.16
Add-DhcpServerv4ExclusionRange -ScopeID 192.168.128.0 -StartRange 192.168.128.1 -EndRange 192.168.128.63
Add-DhcpServerv4ExclusionRange -ScopeID 192.168.128.0 -StartRange 192.168.128.240 -EndRange 192.168.128.254
Set-DhcpServerv4OptionValue -OptionID 3 -Value 192.168.128.254
Set-DhcpServerv4OptionValue -DnsServer 9.9.9.9
Set-DhcpServerv4OptionValue -DnsServer 9.9.9.9
# Change ZoneAlarm rule to accept incoming ICMP ipv4 probes
$Params = @{
"Name" = 'vm-monitoring-icmpv4'
"Action" = 'Allow'
}
Set-NetFirewallRule @Params

View File

@ -1,53 +1,34 @@
# Alexandre SIMAO
# GPLv3
# Script to install and configure a Fuckdows Server 2016 as a router
# Change the poor machine name
$name = Read-host "Nouveau nom d'hôte?"
Rename-computer $name
Install-WindowsFeature Routing
# Install Routing and necessary linked roles
Install-WindowsFeature RemoteAccess, RSAT-RemoteAccess-PowerShell, Routing
Install-remoteAccess -VpnType Vpn
# Display interfaces and active forwarding for all of thm via Regedit
netsh inter show inter
Set-ItemProperty -path 'HKLM:\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet`
\Services\Tcpip\Parameters' -Name 'IPEnableRouter' -Value '0x00000001'
Set-NetConnectionProfile -NetworkCategory Private
# IP address or DnsHostName of your Dhcp Server
$dhcpServer = '192.168.8.1'
# Activate NAT and DHCP Relay
netsh routing ip nat install
netsh routing ip nat add interface "WAN"
netsh routing ip nat set interface "WAN" mode = full
netsh routing ip nat add interface "Arc-CLI"
netsh routing ip nat add interface "Arc-SRV"
ntsh -f ./*.conf
# Name of the network adapter to enable DHCP on
$Inter1 = Read-Host "First interface name"
$Inter2 = Read-Host "Second interface name"
# Change ZoneAlarm rule to accept incoming ICMP ipv4 probes
$Params = @{
"Name" = 'vm-monitoring-icmpv4'
"Action" = 'Allow'
}
$routerNetAdapterName1 = '$Inter1'
$routerNetAdapterName1 = '$Inter2'
$dhcpAddress = [Net.Dns]::GetHostEntry($dhcpServer)
if(!$dhcpAddress){
Write-Warning "Unable to identify IP address of [$dhcpServer]"
break
}else{
$dhcpServerIP = $dhcpAddress.AddressList[0]
}
$netshDhcpRelay=@"
pushd routing ip relay
install
set global loglevel=ERROR
add dhcpserver $($dhcpServerIP.IPAddressToString)
add interface name="$routerNetAdapterName1"
set interface name="$routerNetAdapterName1" relaymode=enable maxhop=6 minsecs=6
add interface name="$routerNetAdapterName2"
set interface name="$routerNetAdapterName2" relaymode=enable maxhop=6 minsecs=6
popd
"@
$netshDhcpRelayPath="$ENV:TEMP\netshDhcpRelay"
# Create netsh script file
New-Item -Path $netshDhcpRelayPath `
-Type File `
-ErrorAction SilentlyContinue | Out-Null
# Populate contents of the script
Set-Content -Path $netshDhcpRelayPath `
-Value $netshDhcpRelay.Split("`r`n") `
-Encoding ASCII
# run it
netsh -f $netshDhcpRelayPath
Set-NetFirewallRule @Params

13
WAN.conf Normal file
View File

@ -0,0 +1,13 @@
pushd routing ip relay
Install
set global loglevel = ERROR
add dhcpserver 192.168.8.1
add interface name = "WAN"
set interface name = "WAN" relaymode = enable maxhop = 6 minsecs = 6
popd