Differences

This shows you the differences between the selected revisions of the page.

2018-02-15 2018-02-15
official guide reverted to rule for port 22 (martin) keys are now generated automatically as of v1.0.0.0-Beta (martin)
Line 8: Line 8:
  * Extract the package to ''C:\Program Files\OpenSSH''   * Extract the package to ''C:\Program Files\OpenSSH''
  * As the Administrator, install SSHD and ssh-agent services: \\ ''powershell.exe -ExecutionPolicy Bypass -File install-sshd.ps1''   * As the Administrator, install SSHD and ssh-agent services: \\ ''powershell.exe -ExecutionPolicy Bypass -File install-sshd.ps1''
-  * As the Administrator, generate server keys and restrict an access to them, by running the following commands from the ''C:\Program Files\OpenSSH'' directory: \\ ''.\ssh-keygen.exe -A'' \\ ''%%powershell.exe -ExecutionPolicy Bypass -Command ". .\FixHostFilePermissions.ps1 -Confirm:$false%%"'' \\ (when using Windows PowerShell instead of Command Prompt, use single quotes around ''-Command'' switch value) 
  * Allow incoming connections to %%SSH%% server in Windows Firewall:   * Allow incoming connections to %%SSH%% server in Windows Firewall:
    * Either run the following PowerShell command (Windows 8 and 2012 or newer only), &win8 &win2012 as the Administrator: \\ ''%%New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Enabled True -Direction Inbound -Protocol TCP -Action Allow -LocalPort 22%%''     * Either run the following PowerShell command (Windows 8 and 2012 or newer only), &win8 &win2012 as the Administrator: \\ ''%%New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Enabled True -Direction Inbound -Protocol TCP -Action Allow -LocalPort 22%%''

Last modified: by martin – Currently locked by: 89.187.177.13 (46.232.24.0, 156.146.53.0, 143.244.51.0)