Aston-HyperV-Code/Guests/SRV-01_DHCP.ps1

96 lines
3.8 KiB
PowerShell

# Alexandre Simao
# GPL v3
# SRV-01 ONLY
# TODO : exclusion/attribution fields
# Rename interfaces
#
echo "Shamefully made by Alexandre Simao. Pardon-me M. Stallman"
#Rename this piece of garbage
Rename-computer "SRV-1"
# Set IP for pre-defined MAC addresses
$adapter = Get-NetAdapter | ? {$_.Name -eq "Arc-SRV"}
#Arc-SRV
$IP = "192.168.8.1"
$MaskBits = 24 # This means subnet mask = 255.255.255.0
$Gateway = "192.168.8.254"
$Dns = "9.9.9.9"
$IPType = "IPv4"
$adapter | New-NetIPAddress `
-AddressFamily $IPType `
-IPAddress $IP `
-PrefixLength $MaskBits `
-DefaultGateway $Gateway
# Install the DHCP role (Management tools if you love Metrosexual UI)
Install-WindowsFeature DHCP -IncludeManagementTools
# Show all the interface via iproute2 - LOL no via a shitty lookalike
netsh inter ipv4 show inter
Set-NetConnectionProfile -NetworkCategory Private
# Behold the LoserShell "cmdlet" to attribute static IP
#New-NetIPAddress -IPAddress 192.168.8.1 -InterfaceAlias "Arc-SRV" `
#-DefaultGateway 192.168. -AddressFamily IPv4 -PrefixLength 24
#Set-DnsClientServerAddress -InterfaceAlias "Arc-SRV" -ServerAddresses 9.9.9.9
# Create DHCP "security" groups
netsh dhcp add securitygroups
# Restart the DHCP server
Restart-Service dhcpserver
###################Template#######################
#Add-DhcpServerv4Scope -name "Corpnet" -StartRange 10.0.0.1 -EndRange 10.0.0.254 -SubnetMask 255.255.255.0 -State Active
#Add-DhcpServerv4ExclusionRange -ScopeID 10.0.0.0 -StartRange 10.0.0.1 -EndRange 10.0.0.15
#Set-DhcpServerv4OptionValue -OptionID 3 -Value 10.0.0.1 -ScopeID 10.0.0.0 -ComputerName DHCP1.corp.contoso.com
#Set-DhcpServerv4OptionValue -DnsDomain corp.contoso.com -DnsServer 10.0.0.2
##################################################
# Create DHCP Scopes For Arc-CLI Arc-SRV Bou-Lan
# Change on options after because this sucker seems to dislike if it's done now
Add-DhcpServerv4Scope -name "Arc-SRV" -StartRange 192.168.8.1 -EndRange 192.168.8.254 -SubnetMask 255.255.255.0 -State Active
Add-DhcpServerv4ExclusionRange -ScopeID 192.168.8.0 -StartRange 192.168.8.1 -EndRange 192.168.8.63
Add-DhcpServerv4ExclusionRange -ScopeID 192.168.8.0 -StartRange 192.168.8.240 -EndRange 192.168.8.254
Add-DhcpServerv4Scope -name "Arc-CLI" -StartRange 192.168.12.1 -EndRange 192.168.12.254 -SubnetMask 255.255.255.0 -State Active
Add-DhcpServerv4ExclusionRange -ScopeID 192.168.12.0 -StartRange 192.168.12.1 -EndRange 192.168.12.63
Add-DhcpServerv4ExclusionRange -ScopeID 192.168.12.0 -StartRange 192.168.12.240 -EndRange 192.168.12.254
Add-DhcpServerv4Scope -name "Bou-LAN" -StartRange 192.168.128.1 -EndRange 192.168.128.254 -SubnetMask 255.255.255.0 -State Active
Add-DhcpServerv4ExclusionRange -ScopeID 192.168.128.0 -StartRange 192.168.128.1 -EndRange 192.168.128.63
Add-DhcpServerv4ExclusionRange -ScopeID 192.168.128.0 -StartRange 192.168.128.240 -EndRange 192.168.128.254
# Change ZoneAlarm rule to accept incoming ICMP ipv4 probes
$Params = @{
"Name" = 'vm-monitoring-icmpv4'
"Action" = 'Allow'
}
Set-NetFirewallRule @Params
# Add routes for RTR-01
route add -p 192.168.12.0/24 192.168.8.254
route add -p 192.168.255.0/24 192.168.8.254
route add -p 192.168.128.0/24 192.168.8.254
route add -p 0.0.0.0/0 192.168.8.254
# Change DHCP server options
Set-DhcpServerv4OptionValue -ScopeId 192.168.128.0 -OptionID 3 -Value 192.168.128.254
Set-DhcpServerv4OptionValue -ScopeId 192.168.8.0 -DnsServer 9.9.9.9
Set-DhcpServerv4OptionValue -ScopeId 192.168.12.0 -OptionID 3 -Value 192.168.12.254
Set-DhcpServerv4OptionValue -ScopeId 192.168.8.0 -DnsServer 9.9.9.9
Set-DhcpServerv4OptionValue -ScopeId 192.168.8.0 -OptionID 3 -Value 192.168.8.254
Set-DhcpServerv4OptionValue -ScopeId 192.168.8.0 -DnsServer 9.9.9.9
Read-Host "Finished"