Windows: net 관련 commands

Windows 10/11 에서 가끔 사용하는 net 명령을 정리했다.

interface 명령으로 포트 포워드

  • 포트 포워드: netsh interface

Port forward 보기

1
2
3
4
5
6
7
> netsh interface portproxy show v4tov4

Listen on ipv4: Connect to ipv4:

Address Port Address Port
--------------- ---------- --------------- ----------
0.0.0.0 2020 localhost 2020

Port 5000을 내부 IP 192.168.0.10의 포트 5555번으로 포워딩

1
> netsh interface portproxy add v4tov4 listenport=5000 listenaddress=0.0.0.0 connectport=5555 connectaddress=192.**168**.0.10

wsl 쪽 호스트로 Port 5000을 내부포트 5555번으로 포워딩

1
> netsh interface portproxy add v4tov4 listenport=5000 listenaddress=0.0.0.0 connectport=5555 connectaddress=(wsl hostname -I)

포트 포워드 삭제

1
netsh interface portproxy delete v4tov4 listenport=5000 listenaddress=0.0.0.0

방화벽

https://learn.microsoft.com/ko-kr/windows/security/operating-system-security/network-security/windows-firewall/configure-with-command-line?tabs=powershell

  • 방화벽 설정 켜기/끄기: netsh advfirewall set currentprofile state on/off
  • 방화벽 프로필 설정: netsh advfirewall show profile 또는 netsh advfirewall set currentprofile
  • 방화벽 규칙 관리: netsh advfirewall rule add/show/delete
  • 방화벽 설정 보기: netsh advfirewall show allprofile

모든 방화벽 프로파일 보기

1
> netsh advfirewall show allprofile 

방화벽에 TCP 5000 포트를 허용

1
> netsh advfirewall firewall add rule name="TCP/5000" protocol=TCP dir=in localport=5555 action=allow

TCP/5000 포트의 방화벽 보기

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
> netsh advfirewall firewall show rule name="TCP/5000"

Rule Name: TCP/5000
----------------------------------------------------------------------
Enabled: Yes
Direction: In
Profiles: Domain,Private,Public
Grouping:
LocalIP: Any
RemoteIP: Any
Protocol: TCP
LocalPort: 5000
RemotePort: Any
Edge traversal: No
Action: Allow
Ok.

포트 포워드 삭제

1
2
3
4
5
# 포트 포워드 삭제
netsh interface portproxy delete v4tov4 listenport=5000 listenaddress=0.0.0.0

# 방화벽 삭제
netsh advfirewall firewall delete rule name="TCP/5000"
Author

Gangtai Goh

Posted on

2024-11-07

Updated on

2025-10-08

Licensed under

댓글