Powershell can be ran from any directory. Once in powershell list the default firewall rules by using the Get-NetFirewallRule command-let:
Get-NetFirewallRule | format-table name, displaygroup, action, direction, enabled -autosize
The table is pretty long and you may have to widen your console window to show all of the rows, but you will be looking for something like this:
Hyper-V Replica HTTP and Hyper-V Replica HTTPS are the two rules, I went with HTTP in my Hyper-V settings so I will enable that rule by using the Enable-NetFirewallRule command-let:
Enable-NetFirewallRule -DisplayGroup "Hyper-V Replica HTTP"
And now we have flowing replica traffic: