Differences

This shows you the differences between the selected revisions of the page.

2017-03-19 2017-03-19
no summary (37.142.66.2) old revision restored - it's mentioned already that it's a powershell command (martin)
Line 10: Line 10:
  * As the Administrator, generate server keys by running the following commands from the ''C:\Program Files\OpenSSH'': \\ ''.\ssh-keygen.exe -A''   * As the Administrator, generate server keys by running the following commands from the ''C:\Program Files\OpenSSH'': \\ ''.\ssh-keygen.exe -A''
  * Open a port for the %%SSH%% server in Windows Firewall:   * Open a port for the %%SSH%% server in Windows Firewall:
-    * Either run the following PowerShell command (Windows 8 and 2012 or newer only), &win8 &win2012 as the Administrator: \\ ''powershell New-NetFirewallRule -Protocol %%TCP%% -LocalPort 22 -Direction Inbound -Action Allow -DisplayName %%SSH%%''+    * Either run the following PowerShell command (Windows 8 and 2012 or newer only), &win8 &win2012 as the Administrator: \\ ''New-NetFirewallRule -Protocol %%TCP%% -LocalPort 22 -Direction Inbound -Action Allow -DisplayName %%SSH%%''
    * or go to //Control Panel > System and Security > Windows Firewall > Advanced Settings > Inbound Rules// and add a new rule for port 22. &wincp     * or go to //Control Panel > System and Security > Windows Firewall > Advanced Settings > Inbound Rules// and add a new rule for port 22. &wincp
  * To allow a public key authentication, as an Administrator, from ''C:\Program Files\OpenSSH'', run: \\ ''powershell.exe -ExecutionPolicy Bypass -File install-sshlsa.ps1'' \\ and restart the machine   * To allow a public key authentication, as an Administrator, from ''C:\Program Files\OpenSSH'', run: \\ ''powershell.exe -ExecutionPolicy Bypass -File install-sshlsa.ps1'' \\ and restart the machine

Last modified: by martin – Currently locked by: 163.5.91.98