OpenVZ Forum


Home » International » Russian » BF2 в контейнере OpenVZ
Re: BF2 в контейнере OpenVZ [message #42519 is a reply to message #42446] Tue, 26 April 2011 07:19 Go to previous messageGo to previous message
joub is currently offline  joub
Messages: 18
Registered: April 2011
Location: Minsk
Junior Member
sHaggY_caT wrote on Mon, 18 April 2011 17:46
А привидите-ка все-таки вывод:

netstat -atunp

Внутри контейнера:
bf2:~# netstat -atunp
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
tcp        0      0 0.0.0.0:4711            0.0.0.0:*               LISTEN      3860/bf2
tcp        0      0 127.0.0.1:587           0.0.0.0:*               LISTEN      1054/sendmail: MTA:
tcp        0      0 0.0.0.0:80              0.0.0.0:*               LISTEN      3826/apache2
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN      363/sshd
tcp        0      0 127.0.0.1:25            0.0.0.0:*               LISTEN      1054/sendmail: MTA:
tcp        0      0 192.168.2.41:22         192.168.2.123:1303      ESTABLISHED 1052/0
tcp        0      0 192.168.2.41:22         192.168.2.123:1372      ESTABLISHED 3868/1
tcp6       0      0 :::22                   :::*                    LISTEN      363/sshd
udp        0      0 0.0.0.0:16567           0.0.0.0:*                           3860/bf2
udp        0      0 0.0.0.0:29900           0.0.0.0:*                           3860/bf2
udp        0      0 0.0.0.0:55124           0.0.0.0:*                           3860/bf2
udp        0      0 0.0.0.0:55125           0.0.0.0:*                           3860/bf2
udp6       0      0 :::517                  :::*                                579/xinetd
udp6       0      0 :::518                  :::*                                579/xinetd


Quote:


iptables -Ln
на ноде и в контейнере,


на ноде:
root@srv08:/etc/init.d# iptables -L -n
Chain INPUT (policy ACCEPT)
target     prot opt source               destination

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination


В контейнере:
 bf2:~# iptables -L -n
Chain INPUT (policy ACCEPT)
target     prot opt source               destination

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination


Quote:

и вывод
nmap -sU -p <порт UDP программы> <IP-адрес контейнера, НЕ(!) локальная петля>

Изнутри контейнера и с ноды.

нода:
root@srv08:~# nmap -sU -p 16567 192.168.2.41
Starting Nmap 5.00 ( http://nmap.org ) at 2011-04-26 10:15 EEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -PN
Nmap done: 1 IP address (0 hosts up) scanned in 0.29 seconds

контейнер:
bf2:~# nmap -sU -p 16567 192.168.2.41

Starting Nmap 4.62 ( http://nmap.org ) at 2011-04-26 11:16 MSD
Interesting ports on bf2 (192.168.2.41):
PORT      STATE         SERVICE
16567/udp open|filtered unknown

Nmap done: 1 IP address (1 host up) scanned in 2.049 seconds


с постороннего компа:
srv07:~# nmap -sU -p 16567 192.168.2.41
Starting Nmap 4.62 ( http://nmap.org ) at 2011-04-26 10:19 EEST
Interesting ports on 192.168.2.41:
PORT      STATE         SERVICE
16567/udp open|filtered unknown
MAC Address: 00:25:22:56:B5:EB (Unknown)
Nmap done: 1 IP address (1 host up) scanned in 0.648 seconds

 
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Previous Topic: squid на openvz
Next Topic: Openvz и Маршруты
Goto Forum:
  


Current Time: Sun Aug 10 20:00:19 GMT 2025

Total time taken to generate the page: 0.09535 seconds