Windows Driver and Management Application InstallationNetXtreme User Guide
Broadcom
®
April 2017 • 2CS57XX-CDUM514-R Page 30
After you generate a self-signed certificate, as described in To generate a self-signed certificate for the
Windows Server:, you can import the certificate on the client to facilitate a connection between server and
client. Ensure that all steps mentioned in section To generate a self-signed certificate for the Windows
Server: are completed, including copying hostname.pfx at the location from where client can access it,
before you proceed with the following steps.
a. Click Start (or press the Windows logo key) and select Run.
b. Enter MMC and click OK.
c. Click File and select Add/Remove Snap-in.
d. Click Add.
e. Select Certificates and click Add.
f. Select Computer account and click Next.
g. Click Finish.
h. Click Close and then click OK.
i. Under Certificates (Local Computer), right-click on Trusted Root Certification Authorities, select All
Tasks, and select Import.
j. Click Next to begin the Certificate Import Wizard.
k. Browse to select the .pfx file you generated in To generate a self-signed certificate for the Windows
Server:. Change the selection in the Files of type list to Personal Information Exchange (*.pfxas,
*.p12), select the hostname.pfx file and click Open.
l. Enter the password you assigned to the private key and click Next.
3. Configure WinRM HTTPS/SSL
You can run
winrm from a client to retrieve information from the server using WinRM HTTPS connection. Use
the following steps to test the WinRM HTTPS/SSL connection from client:
a. To retrieve the server operating system information, enter the following command.
winrm e wmi/root/cimv2/Win32_OperatingSystem -r:https://yourservername -u:username
-p:password -skipCAcheck
b. To retrieve the server WinRM identity information, enter the following command.
winrm id -r:https://yourservername -u:username -p:password -skipCAcheck
c. To enumerate Windows services on the server, enter the following command.
winrm e wmicimv2/Win32_service -r:https://yourservername -u:username -p:password -
skipCAcheck
Note: It is important to use -skipCAcheck switch in the winrm command line testing, as the certificate
is self-generated and not imported on the client. Otherwise, the following error message displays:
WSManFault.