# Alexandre SIMAO # GPLv3 # Script to install and configure a Fuckdows Server 2016 as a router # RTR-02 Only Read-host "Script for RTR-02" Read-host "WARNING: Plug-in in this order Bou-LAN and WAN" echo "Shamefully made by Alexandre Simao. Pardon-me M. Stallman" # Change the poor machine name Rename-computer "RTR-02" Rename-NetAdapter -Name "Ethernet" -NewName "Bou-LAN" Rename-NetAdapter -Name "Ethernet 2" -NewName "WAN" netsh interface ip set address "WAN" static 192.168.255.8 255.255.255.0 192.168.255.254 netsh interface ip set address "Bou-LAN" static 192.168.128.254 255.255.255.0 netsh interface ip set dns name="WAN" static 9.9.9.9. # Install Routing and necessary linked roles Install-WindowsFeature RemoteAccess, RSAT-RemoteAccess-PowerShell, Routing -IncludeManagementTools set-service RemoteAccess -StartupType Automatic Start-Service RemoteAccess # Display interfaces and active forwarding for all of thm via Regedit netsh inter show inter Set-ItemProperty -path 'HKLM:\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet` \Services\Tcpip\Parameters' -Name 'IPEnableRouter' -Value '0x00000001' Set-NetConnectionProfile -NetworkCategory Private # Activate NAT and DHCP Relay netsh routing ip relay install netsh routing ip add interface name="WAN" state=enable netsh routing ip relay add interface "WAN" netsh rout ip rel set int ARC-CLI min=0 netsh routing ip relay add interface "Bou-LAN" netsh rout ip rel set int ARC-SRV min=0 netsh -f ./Bou-LAN.conf # Change ZoneAlarm rule to accept incoming ICMP ipv4 probes $Params = @{ "Name" = 'vm-monitoring-icmpv4' "Action" = 'Allow' } Set-NetFirewallRule @Params # Add routes route add -p 192.168.8.0/24 192.168.255.8 route add -p 192.168.12.0.24 192.168.255.8 route add -p 192.168.255.0/24 192.168.255.128 route add -p 192.168.128.0/24 192.168.128.254 route add -p 0.0.0.0/0 192.168.255.254