We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
#根据ip设置防火墙规则 New-NetFirewallRule -DisplayName "WSL" -Direction Inbound -LocalAddress $myIp -Action Allow #根据网卡名设置访问规则 New-NetFirewallRule -DisplayName "WSL" -Direction Inbound -InterfaceAlias "vEthernet (WSL)" -Action Allow
WSL2代理 脚本遍历你设置的想暴露到局域网的端口,然后用 portproxy 反代 Windows 的端口到 WSL 中。
# 获取 Windows 和 WSL2 的 ip $winip = bash.exe -c "ip route | grep default | awk '{print `$3}'" $wslip = bash.exe -c "hostname -I | awk '{print `$1}'" $found1 = $winip -match '\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}'; $found2 = $wslip -match '\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}'; if( !($found1 -and $found2) ){ # 如果没找到 wsl 的 ip, 就退出执行 echo "The Script Exited, the ip address of WSL 2 cannot be found"; exit; } # 你需要映射到局域网中端口 $ports=@(80,443,10000,3000,5000,27701,8080); # 监听的 ip,这么写是可以来自局域网 $addr='0.0.0.0'; # 监听的端口,就是谁来访问自己 $ports_a = $ports -join ","; # 移除旧的防火墙规则 iex "Remove-NetFireWallRule -DisplayName 'WSL 2 Firewall Unlock' " | Out-Null # 允许防火墙规则通过这些端口 iex "New-NetFireWallRule -DisplayName 'WSL 2 Firewall Unlock' -Direction Outbound -LocalPort $ports_a -Action Allow -Protocol TCP" | Out-Null iex "New-NetFireWallRule -DisplayName 'WSL 2 Firewall Unlock' -Direction Inbound -LocalPort $ports_a -Action Allow -Protocol TCP" | Out-Null # 使用 portproxy 让 Windows 转发端口 # https://docs.microsoft.com/en-us/windows-server/networking/technologies/netsh/netsh-interface-portproxy for( $i = 0; $i -lt $ports.length; $i++ ){ $port = $ports[$i]; iex "netsh interface portproxy delete v4tov4 listenport=$port listenaddress=$addr" | Out-Null iex "netsh interface portproxy add v4tov4 listenport=$port listenaddress=$addr connectport=$port connectaddress=$wslip" | Out-Null }
The text was updated successfully, but these errors were encountered:
No branches or pull requests
#根据ip设置防火墙规则
New-NetFirewallRule -DisplayName "WSL" -Direction Inbound -LocalAddress $myIp -Action Allow
#根据网卡名设置访问规则
New-NetFirewallRule -DisplayName "WSL" -Direction Inbound -InterfaceAlias "vEthernet (WSL)" -Action Allow
WSL2代理
脚本遍历你设置的想暴露到局域网的端口,然后用 portproxy 反代 Windows 的端口到 WSL 中。
The text was updated successfully, but these errors were encountered: