1. Save the content below to `C:\scripts\wslbridge.ps1` 1. Run `Powershell` _as Administrator_ 1. From within Powershell, run `powershell -ExecutionPolicy Bypass -File C:\scripts\wslbridge.ps1` 1. Get your windows IP with `ipconfig` 1. Connect to your **Windows IP** (_NOT THE WSL ONE_) from the expo go on `exp://:19000` ```shell # [Configuration] # All the ports you want to forward separated by coma $ports=@(7700,8088,8089,19000); # You can change the addr to your ip # config to listen to a specific address $addr='0.0.0.0'; # [Init] $remoteport = bash.exe -c "ip addr | grep -Ee 'inet.*eth0'" $found = $remoteport -match '\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}'; if( $found ){ $remoteport = $matches[0]; } else{ echo "The Script Exited, the ip address of WSL 2 cannot be found"; exit; } $ports_a = $ports -join ","; # Remove Firewall Exception Rules iex "Remove-NetFireWallRule -DisplayName 'WSL 2 Firewall Unlock' "; # adding Exception Rules for inbound and outbound Rules iex "New-NetFireWallRule -DisplayName 'WSL 2 Firewall Unlock' -Direction Outbound -LocalPort $ports_a -Action Allow -Protocol TCP"; iex "New-NetFireWallRule -DisplayName 'WSL 2 Firewall Unlock' -Direction Inbound -LocalPort $ports_a -Action Allow -Protocol TCP"; for( $i = 0; $i -lt $ports.length; $i++ ){ $port = $ports[$i]; iex "netsh interface portproxy delete v4tov4 listenport=$port listenaddress=$addr"; iex "netsh interface portproxy add v4tov4 listenport=$port listenaddress=$addr connectport=$port connectaddress=$remoteport"; } ```