sHaggY_caT wrote on Mon, 18 April 2011 17:46А привидите-ка все-таки вывод:
netstat -atunp
Внутри контейнера:
bf2:~# netstat -atunp
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:4711 0.0.0.0:* LISTEN 3860/bf2
tcp 0 0 127.0.0.1:587 0.0.0.0:* LISTEN 1054/sendmail: MTA:
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 3826/apache2
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 363/sshd
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 1054/sendmail: MTA:
tcp 0 0 192.168.2.41:22 192.168.2.123:1303 ESTABLISHED 1052/0
tcp 0 0 192.168.2.41:22 192.168.2.123:1372 ESTABLISHED 3868/1
tcp6 0 0 :::22 :::* LISTEN 363/sshd
udp 0 0 0.0.0.0:16567 0.0.0.0:* 3860/bf2
udp 0 0 0.0.0.0:29900 0.0.0.0:* 3860/bf2
udp 0 0 0.0.0.0:55124 0.0.0.0:* 3860/bf2
udp 0 0 0.0.0.0:55125 0.0.0.0:* 3860/bf2
udp6 0 0 :::517 :::* 579/xinetd
udp6 0 0 :::518 :::* 579/xinetd
Quote:
iptables -Ln
на ноде и в контейнере,
на ноде:
root@srv08:/etc/init.d# iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
В контейнере:
bf2:~# iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Quote:
и вывод
nmap -sU -p <порт UDP программы> <IP-адрес контейнера, НЕ(!) локальная петля>
Изнутри контейнера и с ноды.
нода:
root@srv08:~# nmap -sU -p 16567 192.168.2.41
Starting Nmap 5.00 ( http://nmap.org ) at 2011-04-26 10:15 EEST
Note: Host seems down. If it is really up, but blocking our ping probes, try -PN
Nmap done: 1 IP address (0 hosts up) scanned in 0.29 seconds
контейнер:
bf2:~# nmap -sU -p 16567 192.168.2.41
Starting Nmap 4.62 ( http://nmap.org ) at 2011-04-26 11:16 MSD
Interesting ports on bf2 (192.168.2.41):
PORT STATE SERVICE
16567/udp open|filtered unknown
Nmap done: 1 IP address (1 host up) scanned in 2.049 seconds
с постороннего компа:
srv07:~# nmap -sU -p 16567 192.168.2.41
Starting Nmap 4.62 ( http://nmap.org ) at 2011-04-26 10:19 EEST
Interesting ports on 192.168.2.41:
PORT STATE SERVICE
16567/udp open|filtered unknown
MAC Address: 00:25:22:56:B5:EB (Unknown)
Nmap done: 1 IP address (1 host up) scanned in 0.648 seconds