Additional configuration, Modifying microsoft windows firewall rules – HP StoreFabric Converged Network Adapters User Manual

Page 16

Advertising
background image

Installing BACS components on Microsoft and Linux operating systems 16

4.

Select Computer Account.

5.

Click Next, Finish, and then OK.

6.

Expand Certificates (Local Computer).

7.

Select the self-signed certificate from the personal store.
If the certificate is created with a hostname, the hostname displays.

8.

Double-click the hostname.

9.

Select the Details tab.

10.

Scroll down to, and then select, the Thumbprint field.

11.

In the Details window select, and then copy, the thumbprint.

12.

Return to the command prompt, and then run the following command:
winrm create winrm/config/Listener?Address=*+Transport=HTTPS

@{Hostname=”<HostName or IPAddress>”;CertificateThumbprint=”<paste from

the previous step and remove the spaces>”}
If the certificate is generated using the HostName value, use the value. If the certificate is generated with
the IP Address value, use the value.
The command creates a listener on the HTTPS port (5986) with the network address of the server and
the SelfSSL generated certificate.

Optionally, use winrm to create, modify, and then establish the https listener. WinRM listeners can be

configured to use a variety of ports.
To verify the configuration:

1.

To verify WinRM listeners, run winrm e winrm/config/listener.

2.

To test HTTPS/SSL connections on a server, run winrs -r:https://yourserver -u:username

-p:password hostname.
If everything is configured correctly, the output of the command will print the server hostname name.

3.

To verify the WinRM Service configuration, run winrm get winrm/config/service.

Additional configuration

Make any additional configuration changes in the Microsoft Windows firewall or with WinRM commands.

Modifying Microsoft Windows firewall rules

Use the following Microsoft Windows firewall modification guidelines to make any additional configuration
changes.
To modify the Microsoft Windows firewall:

1.

From the Administrative Tools menu, select Microsoft Windows Firewall with Advanced Security.

2.

Right-click Inbound Rules, and then select New Rule.
The new rule wizard appears.

3.

Select Port, and then click Next.

4.

On the Protocol and Ports screen, select TCP, and then enter the specific port, for example 5985 for
HTTP or 5986 for HTTPS.

5.

Click Next.

6.

On the Action screen, select Allow the connection, and then click Next.

Advertising