2016-08-04 55 views
0

Habe ich nur noch zwei neue Häfen zu meinem PuPHPet config.yaml wie folgt:PuPHPet Weiterleitung nicht funktioniert, blockiert durch iptables

vflnp_fajlkhsdkfl: 
    host: '9876' 
    guest: '9876' 
vflnp_akjfhsdasffa: 
    host: '3011' 
    guest: '3011' 

Und sie zeigen, wenn dem Einschalten der Maschine

Bringing machine 'local' up with 'virtualbox' provider... 
==> local: Checking if box 'puphpet/centos65-x64' is up to date... 
==> local: Clearing any previously set network interfaces... 
==> local: Preparing network interfaces based on configuration... 
    local: Adapter 1: nat 
    local: Adapter 2: hostonly 
==> local: You are trying to forward to privileged ports (ports <= 1024). Most 
==> local: operating systems restrict this to only privileged process (typically 
==> local: processes running as an administrative user). This is a warning in ca                                                se 
==> local: the port forwarding doesn't work. If any problems occur, please try a 
==> local: port higher than 1024. 
==> local: Forwarding ports... 
    local: 3306 (guest) => 3306 (host) (adapter 1) 
    local: 80 (guest) => 80 (host) (adapter 1) 
    local: 8000 (guest) => 8000 (host) (adapter 1) 
    local: 9876 (guest) => 9876 (host) (adapter 1) 
    local: 3011 (guest) => 3011 (host) (adapter 1) 
    local: 22 (guest) => 2222 (host) (adapter 1) 
==> local: Running 'pre-boot' VM customizations... 
==> local: Booting VM... 
==> local: Waiting for machine to boot. This may take a few minutes... 
    local: SSH address: 127.0.0.1:2222 
    local: SSH username: vagrant 
    local: SSH auth method: private key 

Sie sind auch von Virtual Box

enter image description here

aufgeführt

Wenn Sie jedoch versuchen, eine Verbindung in diesen neuen Ports herzustellen, werden sie nur von iptables gelöscht. Ich weiß das, weil das Ausführen iptables -F sofort das Problem bis zum nächsten Neustart behebt.

# iptables -L -n 
Chain INPUT (policy ACCEPT) 
target  prot opt source    destination 
ACCEPT  icmp -- 0.0.0.0/0   0.0.0.0/0   /* 000 accept all icmp */ 
ACCEPT  all -- 0.0.0.0/0   0.0.0.0/0   /* 001 accept all to lo interface */ 
ACCEPT  all -- 0.0.0.0/0   0.0.0.0/0   /* 002 accept related established rules */ state RELATED,ESTABLISHED 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   multiport ports 22 /* 100 tcp/22 */ 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   multiport ports 3306 /* 100 tcp/3306 */ 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   multiport ports 443 /* 100 tcp/443 */ 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   multiport ports 80 /* 100 tcp/80 */ 
DROP  all -- 0.0.0.0/0   0.0.0.0/0   /* 999 drop all */ 

Warum Regeln nicht für , , wird auf iptables geschaffen?

Indizes: Karma; Karma-js; Hafen 9876; Fernzugriff; Karma starten;

Antwort