APX orchestrator

Stop debugging, start racing.

User Tools

Site Tools


Firewall rule generation

If a server is saved, two files will be written into the folder firewall_rules:

  • firewall{server public secret}.ps1
  • invoke_firewall{server public secret}.bat

These scripts can be used to open the required ports.

Make sure the server is not running when you do this rules. The script will first remove all (possibly old) rules for this server, which will cause connections to be dropped.

Run the batch-script from an administrative shell. Double clicking is not enough as a raised shell is required. If you are unsure what it does, you can always open the file with a text editor. You can get this by following steps:

  1. Search for “cmd” in your start menu
  2. Right click on the search result and choose “run as administrator”
  3. A black terminal window will open
  4. enter “cd the-path-to-your-wizard-instance-firewall-folder”, so e. g. “cd C:\Users\chm\Documents\rfactor-server\wizard\firewall_rules” (without quotes)
  5. run the script belonging to your server, so e. g. “invoke_firewallhgfeeafbbhbgbgihddab.bat” (without quotes), confirm with enter

How to check the rules

Open your start menu and sarch for “Windows Firewall”, you will get a result called “Windows Firewall with extended security”, open that program.

On the right of the window, select “inbound rules”.

You will find APX generated rules starting with “APX RULE {server public-secret}”. The column local port represents the port required by the server itself.

If you change the ports of a server, you will have to rerun this. If a server get's deleted, you can use the shown Windows tool to delete rules (simply select them and select delete on the context menu). There is NO auto deletion of rules due to the permissions needed to do that.

firewall.txt · Last modified: 2021/07/31 18:21 by chmr