17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
|
# File 'manifests/config/firewall.pp', line 17
class winrm::config::firewall (
Boolean $http_listener_enable = $winrm::http_listener_enable,
Boolean $https_listener_enable = $winrm::https_listener_enable,
) {
exec { 'Configure-Firewall-Rules':
command => template('winrm/firewall/firewall_rules.ps1.erb'),
provider => 'powershell',
unless => template('winrm/firewall/firewall_rules_onlyif.ps1.erb'),
}
# if $http_listener_enable {
# $http_action = 'allow'
# } else {
# $http_action = 'block'
# }
# if $https_listener_enable {
# $https_action = 'allow'
# } else {
# $https_action = 'block'
# }
# windows_firewall::exception { 'WINRM HTTP':
# ensure => present,
# direction => 'in',
# action => $http_action,
# enabled => true,
# protocol => 'TCP',
# local_port => 5985,
# remote_port => 'any',
# display_name => 'Windows Remote Management (HTTP-In)',
# description => 'Inbound rule for Windows Remote Management via WS-Management. [TCP 5985]',
# }
# windows_firewall::exception { 'WINRM HTTPS':
# ensure => present,
# direction => 'in',
# action => $https_action,
# enabled => true,
# protocol => 'TCP',
# local_port => 5986,
# remote_port => 'any',
# display_name => 'Windows Remote Management (HTTPS-In)',
# description => 'Inbound rule for Windows Remote Management via WS-Management. [TCP 5986]',
# }
}
|