Habe ich nur noch zwei neue Häfen zu meinem PuPHPet config.yaml wie folgt:PuPHPet Weiterleitung nicht funktioniert, blockiert durch iptables
vflnp_fajlkhsdkfl:
host: '9876'
guest: '9876'
vflnp_akjfhsdasffa:
host: '3011'
guest: '3011'
Und sie zeigen, wenn dem Einschalten der Maschine
Bringing machine 'local' up with 'virtualbox' provider...
==> local: Checking if box 'puphpet/centos65-x64' is up to date...
==> local: Clearing any previously set network interfaces...
==> local: Preparing network interfaces based on configuration...
local: Adapter 1: nat
local: Adapter 2: hostonly
==> local: You are trying to forward to privileged ports (ports <= 1024). Most
==> local: operating systems restrict this to only privileged process (typically
==> local: processes running as an administrative user). This is a warning in ca se
==> local: the port forwarding doesn't work. If any problems occur, please try a
==> local: port higher than 1024.
==> local: Forwarding ports...
local: 3306 (guest) => 3306 (host) (adapter 1)
local: 80 (guest) => 80 (host) (adapter 1)
local: 8000 (guest) => 8000 (host) (adapter 1)
local: 9876 (guest) => 9876 (host) (adapter 1)
local: 3011 (guest) => 3011 (host) (adapter 1)
local: 22 (guest) => 2222 (host) (adapter 1)
==> local: Running 'pre-boot' VM customizations...
==> local: Booting VM...
==> local: Waiting for machine to boot. This may take a few minutes...
local: SSH address: 127.0.0.1:2222
local: SSH username: vagrant
local: SSH auth method: private key
Sie sind auch von Virtual Box
aufgeführtWenn Sie jedoch versuchen, eine Verbindung in diesen neuen Ports herzustellen, werden sie nur von iptables gelöscht. Ich weiß das, weil das Ausführen iptables -F sofort das Problem bis zum nächsten Neustart behebt.
# iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 /* 000 accept all icmp */
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 /* 001 accept all to lo interface */
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 /* 002 accept related established rules */ state RELATED,ESTABLISHED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 multiport ports 22 /* 100 tcp/22 */
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 multiport ports 3306 /* 100 tcp/3306 */
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 multiport ports 443 /* 100 tcp/443 */
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 multiport ports 80 /* 100 tcp/80 */
DROP all -- 0.0.0.0/0 0.0.0.0/0 /* 999 drop all */
Warum Regeln nicht für , , wird auf iptables geschaffen?
Indizes: Karma; Karma-js; Hafen 9876; Fernzugriff; Karma starten;