From 792eb17e70445c33449d6b42cfcefe9436353cbb Mon Sep 17 00:00:00 2001 From: Yanbing Date: Tue, 23 Jan 2018 17:12:06 -0800 Subject: [PATCH] Updated Install Win32 OpenSSH (markdown) --- Install-Win32-OpenSSH.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Install-Win32-OpenSSH.md b/Install-Win32-OpenSSH.md index 189278b..7892542 100644 --- a/Install-Win32-OpenSSH.md +++ b/Install-Win32-OpenSSH.md @@ -7,12 +7,12 @@ To get links to latest downloads [this wiki page](https://github.com/PowerShell/ 1. In an elevated Powershell console, run the following * `powershell.exe -ExecutionPolicy Bypass -File install-sshd.ps1` 1. Open the firewall for sshd.exe to allow inbound SSH connections - * `New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Service sshd -Enabled True -Direction Inbound -Protocol TCP -Action Allow` + * `New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Enabled True -Direction Inbound -Protocol TCP -Action Allow -LocalPort 22` Note: `New-NetFirewallRule` is for Windows 2012 and above servers only. If you're on a client desktop machine (like Windows 10) or Windows 2008 R2 and below, try: ``` - netsh advfirewall firewall add rule name=sshd dir=in action=allow protocol=TCP service=sshd + netsh advfirewall firewall add rule name=sshd dir=in action=allow protocol=TCP localport=sshd ``` 1. Start `sshd` (this will automatically generate host keys under %programdata%\ssh if they don't already exist) * `net start sshd`