- Copy internal post link
- Copy external post link
- Report article
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html
[content:156551]
Debian Dienst per lokaler IP nicht erreichbar
habe hier einen Debian unter VMware am Laufen.
Auf diesen Debian ist ein Dienst installiert denn ich lokal aufrufen kann, jedoch nicht über seine gebridgte LAN-IP-Adresse.
Beim Untersuchen, ob der Port offen, kam heraus, dass der Port 8088 lokal erreichbar und offen ist jedoch nicht über die LAN-IP-Adresse.
Siehe Bild: http://www.pic-upload.de/view-8041507/DebianPort.jpg.html
Weiss da vielelicht jemand zufällig was noch eingestellt werden muss?
Gruß
AzubiLE
Content-Key: 156551
Url: https://administrator.de/contentid/156551
Printed on: April 24, 2024 at 10:04 o'clock
- Comment overview - Please log in
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618266
[content:156551#618266]
MFG
Starmanager
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618272
[content:156551#618272]
Ich muss ja dem Port 8088 sagen können, dass er nicht nur "intern" erreichbar sein soll, vorallem sollte er "offen" sein.
Gruß
AzubiLE
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618274
[content:156551#618274]
ich schließe mich Starmanager an und behaupte, dass es zu 100% die Firewall ist. Selbst wenn du keine konfiguriert hast, lädt Debian erstmal brav seine iptables. Daher checkst du einfach mal folgendes...
iptables -L -> listest dir alle Ketten (FORWARD, INPUT, OUTPUT) Damit kannst du zumindest schon mal ermitteln, was wohin gehen darf
netstat -tulpen listest dir auf, welches Interface auf welchem Port lauscht.
Wenn es am Ende deine Firewall ist, dann machst du die Ports einfach auf bzw. machst du sie vorrübergehend ganz auf und checkst es ab.
Alles erlauben:
iptables -A FORWARD - j ACCEPT (das erlaubt, dass alles an Paketen durchgelassen wird)
iptables -A INPUT - j ACCEPT (erlaubt alle ankommenden Pakete)
iptables -A OUTPUT -j ACCEPT (erlaubt alle abgehenden Pakete)
Sollte es dan funktionieren würde ich die Firewall wieder dicht machen und nur die Ports, welche benötigt werden frei geben.
Knut
EDIT: um 08:19 habe ich meinen Text schon geschrieben, daher nicht verwirren lassen.
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618281
[content:156551#618281]
Chain INPUT (policy DROP)
target prot opt source destination
BASE_INPUT_CHAIN all -- anywhere anywhere
INPUT_CHAIN all -- anywhere anywhere
HOST_BLOCK_SRC all -- anywhere anywhere
SPOOF_CHK all -- anywhere anywhere
VALID_CHK all -- anywhere anywhere
EXT_INPUT_CHAIN !icmp -- anywhere anywhere state NEW
EXT_INPUT_CHAIN icmp -- anywhere anywhere state NEW limit: avg 60/sec burst 100
EXT_ICMP_FLOOD_CHAIN icmp -- anywhere anywhere state NEW
POST_INPUT_CHAIN all -- anywhere anywhere
LOG all -- anywhere anywhere limit: avg 1/sec burst 5 LOG level info prefix `AIF:Dropped INPUT packet: '
DROP all -- anywhere anywhere
Chain FORWARD (policy DROP)
target prot opt source destination
BASE_FORWARD_CHAIN all -- anywhere anywhere
TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU
FORWARD_CHAIN all -- anywhere anywhere
HOST_BLOCK_SRC all -- anywhere anywhere
HOST_BLOCK_DST all -- anywhere anywhere
EXT_FORWARD_IN_CHAIN all -- anywhere anywhere
EXT_FORWARD_OUT_CHAIN all -- anywhere anywhere
SPOOF_CHK all -- anywhere anywhere
POST_FORWARD_CHAIN all -- anywhere anywhere
LOG all -- anywhere anywhere limit: avg 1/min burst 3 LOG level info prefix `AIF:Dropped FORWARD packet: '
DROP all -- anywhere anywhere
ACCEPT tcp -- anywhere anywhere tcp dpt:omniorb
Chain OUTPUT (policy DROP)
target prot opt source destination
BASE_OUTPUT_CHAIN all -- anywhere anywhere
TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU
OUTPUT_CHAIN all -- anywhere anywhere
HOST_BLOCK_DST all -- anywhere anywhere
LOG all -f anywhere anywhere limit: avg 3/min burst 5 LOG level info prefix `AIF:Fragment packet: '
DROP all -f anywhere anywhere
EXT_OUTPUT_CHAIN all -- anywhere anywhere
POST_OUTPUT_CHAIN all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
Chain BASE_FORWARD_CHAIN (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere state ESTABLISHED
ACCEPT tcp -- anywhere anywhere state RELATED tcp dpts:1024:65535
ACCEPT udp -- anywhere anywhere state RELATED udp dpts:1024:65535
ACCEPT icmp -- anywhere anywhere state RELATED
ACCEPT all -- anywhere anywhere
Chain BASE_INPUT_CHAIN (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere state ESTABLISHED
ACCEPT tcp -- anywhere anywhere state RELATED tcp dpts:1024:65535
ACCEPT udp -- anywhere anywhere state RELATED udp dpts:1024:65535
ACCEPT icmp -- anywhere anywhere state RELATED
ACCEPT all -- anywhere anywhere
Chain BASE_OUTPUT_CHAIN (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere state ESTABLISHED
ACCEPT all -- anywhere anywhere
Chain DMZ_FORWARD_IN_CHAIN (0 references)
target prot opt source destination
Chain DMZ_FORWARD_OUT_CHAIN (0 references)
target prot opt source destination
Chain DMZ_INET_FORWARD_CHAIN (0 references)
target prot opt source destination
Chain DMZ_INPUT_CHAIN (0 references)
target prot opt source destination
Chain DMZ_LAN_FORWARD_CHAIN (0 references)
target prot opt source destination
Chain DMZ_OUTPUT_CHAIN (0 references)
target prot opt source destination
Chain EXT_FORWARD_IN_CHAIN (1 references)
target prot opt source destination
VALID_CHK all -- anywhere anywhere
Chain EXT_FORWARD_OUT_CHAIN (1 references)
target prot opt source destination
Chain EXT_ICMP_FLOOD_CHAIN (1 references)
target prot opt source destination
LOG icmp -- anywhere anywhere icmp destination-unreachable limit: avg 12/hour burst 1 LOG level info prefix `AIF:ICMP-unreachable flood: '
POST_INPUT_DROP_CHAIN icmp -- anywhere anywhere icmp destination-unreachable
LOG icmp -- anywhere anywhere icmp time-exceeded limit: avg 12/hour burst 1 LOG level info prefix `AIF:ICMP-time-exceeded fld: '
POST_INPUT_DROP_CHAIN icmp -- anywhere anywhere icmp time-exceeded
LOG icmp -- anywhere anywhere icmp parameter-problem limit: avg 12/hour burst 1 LOG level info prefix `AIF:ICMP-param-problem fld: '
POST_INPUT_DROP_CHAIN icmp -- anywhere anywhere icmp parameter-problem
LOG icmp -- anywhere anywhere icmp echo-request limit: avg 12/hour burst 1 LOG level info prefix `AIF:ICMP-request(ping) fld: '
POST_INPUT_DROP_CHAIN icmp -- anywhere anywhere icmp echo-request
LOG icmp -- anywhere anywhere icmp echo-reply limit: avg 12/hour burst 1 LOG level info prefix `AIF:ICMP-reply(pong) flood: '
POST_INPUT_DROP_CHAIN icmp -- anywhere anywhere icmp echo-reply
LOG icmp -- anywhere anywhere icmp source-quench limit: avg 12/hour burst 1 LOG level info prefix `AIF:ICMP-source-quench fld: '
POST_INPUT_DROP_CHAIN icmp -- anywhere anywhere icmp source-quench
LOG icmp -- anywhere anywhere limit: avg 12/hour burst 1 LOG level info prefix `AIF:ICMP(other) flood: '
POST_INPUT_DROP_CHAIN icmp -- anywhere anywhere
Chain EXT_INPUT_CHAIN (2 references)
target prot opt source destination
LOG tcp -- anywhere anywhere tcp dpt:0 limit: avg 6/hour burst 1 LOG level info prefix `AIF:Port 0 OS fingerprint: '
LOG udp -- anywhere anywhere udp dpt:0 limit: avg 6/hour burst 1 LOG level info prefix `AIF:Port 0 OS fingerprint: '
POST_INPUT_DROP_CHAIN tcp -- anywhere anywhere tcp dpt:0
POST_INPUT_DROP_CHAIN udp -- anywhere anywhere udp dpt:0
LOG tcp -- anywhere anywhere tcp spt:0 limit: avg 6/hour burst 5 LOG level info prefix `AIF:TCP source port 0: '
LOG udp -- anywhere anywhere udp spt:0 limit: avg 6/hour burst 5 LOG level info prefix `AIF:UDP source port 0: '
POST_INPUT_DROP_CHAIN tcp -- anywhere anywhere tcp spt:0
POST_INPUT_DROP_CHAIN udp -- anywhere anywhere udp spt:0
ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc
ACCEPT tcp -- anywhere anywhere tcp dpt:omniorb
ACCEPT tcp -- anywhere anywhere tcp dpt:1521
ACCEPT udp -- anywhere anywhere udp dpt:omniorb
ACCEPT udp -- anywhere anywhere udp dpt:1521
ACCEPT icmp -- anywhere anywhere icmp echo-request limit: avg 20/sec burst 100
LOG icmp -- anywhere anywhere icmp echo-request limit: avg 3/min burst 1 LOG level info prefix `AIF:ICMP-request: '
LOG icmp -- anywhere anywhere icmp destination-unreachable limit: avg 12/hour burst 1 LOG level info prefix `AIF:ICMP-unreachable: '
LOG icmp -- anywhere anywhere icmp time-exceeded limit: avg 12/hour burst 1 LOG level info prefix `AIF:ICMP-time-exceeded: '
LOG icmp -- anywhere anywhere icmp parameter-problem limit: avg 12/hour burst 1 LOG level info prefix `AIF:ICMP-param.-problem: '
POST_INPUT_DROP_CHAIN icmp -- anywhere anywhere icmp destination-unreachable
POST_INPUT_DROP_CHAIN icmp -- anywhere anywhere icmp time-exceeded
POST_INPUT_DROP_CHAIN icmp -- anywhere anywhere icmp parameter-problem
POST_INPUT_DROP_CHAIN icmp -- anywhere anywhere icmp echo-request
POST_INPUT_DROP_CHAIN icmp -- anywhere anywhere icmp echo-reply
LOG tcp -- anywhere anywhere tcp dpts:1024:65535 flags:!FIN,SYN,RST,ACK/SYN limit: avg 3/min burst 5 LOG level info prefix `AIF:Stealth scan? (UNPRIV): '
LOG tcp -- anywhere anywhere tcp dpts:0:1023 flags:!FIN,SYN,RST,ACK/SYN limit: avg 3/min burst 5 LOG level info prefix `AIF:Stealth scan? (PRIV): '
POST_INPUT_DROP_CHAIN tcp -- anywhere anywhere tcp flags:!FIN,SYN,RST,ACK/SYN
LOG tcp -- anywhere anywhere tcp dpts:0:1023 limit: avg 6/min burst 2 LOG level info prefix `AIF:PRIV connect attempt: '
LOG udp -- anywhere anywhere udp dpts:0:1023 limit: avg 6/min burst 2 LOG level info prefix `AIF:PRIV connect attempt: '
LOG tcp -- anywhere anywhere tcp dpts:1024:65535 limit: avg 6/min burst 2 LOG level info prefix `AIF:UNPRIV connect attempt: '
LOG udp -- anywhere anywhere udp dpts:1024:65535 limit: avg 6/min burst 2 LOG level info prefix `AIF:UNPRIV connect attempt: '
POST_INPUT_CHAIN all -- anywhere anywhere
POST_INPUT_DROP_CHAIN tcp -- anywhere anywhere
POST_INPUT_DROP_CHAIN udp -- anywhere anywhere
POST_INPUT_DROP_CHAIN icmp -- anywhere anywhere
LOG all -- anywhere anywhere limit: avg 1/min burst 5 LOG level info prefix `AIF:Connect attempt: '
POST_INPUT_DROP_CHAIN all -- anywhere anywhere
Chain EXT_OUTPUT_CHAIN (1 references)
target prot opt source destination
Chain FORWARD_CHAIN (1 references)
target prot opt source destination
Chain HOST_BLOCK_DROP (0 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 1/min burst 1 LOG level info prefix `AIF:Blocked host(s): '
DROP all -- anywhere anywhere
Chain HOST_BLOCK_DST (2 references)
target prot opt source destination
Chain HOST_BLOCK_SRC (2 references)
target prot opt source destination
Chain INET_DMZ_FORWARD_CHAIN (0 references)
target prot opt source destination
Chain INPUT_CHAIN (1 references)
target prot opt source destination
Chain INT_FORWARD_IN_CHAIN (0 references)
target prot opt source destination
Chain INT_FORWARD_OUT_CHAIN (0 references)
target prot opt source destination
Chain INT_INPUT_CHAIN (0 references)
target prot opt source destination
Chain INT_OUTPUT_CHAIN (0 references)
target prot opt source destination
Chain LAN_INET_FORWARD_CHAIN (0 references)
target prot opt source destination
Chain OUTPUT_CHAIN (1 references)
target prot opt source destination
Chain POST_FORWARD_CHAIN (1 references)
target prot opt source destination
Chain POST_INPUT_CHAIN (2 references)
target prot opt source destination
Chain POST_INPUT_DROP_CHAIN (37 references)
target prot opt source destination
DROP all -- anywhere anywhere
Chain POST_OUTPUT_CHAIN (1 references)
target prot opt source destination
Chain RESERVED_NET_CHK (0 references)
target prot opt source destination
LOG all -- 10.0.0.0/8 anywhere limit: avg 1/min burst 1 LOG level info prefix `AIF:Class A address: '
LOG all -- 172.16.0.0/12 anywhere limit: avg 1/min burst 1 LOG level info prefix `AIF:Class B address: '
LOG all -- 192.168.0.0/16 anywhere limit: avg 1/min burst 1 LOG level info prefix `AIF:Class C address: '
LOG all -- link-local/16 anywhere limit: avg 1/min burst 1 LOG level info prefix `AIF:Class M$ address: '
LOG all -- BASE-ADDRESS.MCAST.NET/24 anywhere limit: avg 1/min burst 1 LOG level info prefix `AIF:Multicast address: '
LOG all -- 239.0.0.0/24 anywhere limit: avg 1/min burst 1 LOG level info prefix `AIF:Multicast address: '
POST_INPUT_DROP_CHAIN all -- 10.0.0.0/8 anywhere
POST_INPUT_DROP_CHAIN all -- 172.16.0.0/12 anywhere
POST_INPUT_DROP_CHAIN all -- 192.168.0.0/16 anywhere
POST_INPUT_DROP_CHAIN all -- link-local/16 anywhere
POST_INPUT_DROP_CHAIN all -- BASE-ADDRESS.MCAST.NET/24 anywhere
POST_INPUT_DROP_CHAIN all -- 239.0.0.0/24 anywhere
Chain SPOOF_CHK (2 references)
target prot opt source destination
RETURN all -- anywhere anywhere
Chain VALID_CHK (2 references)
target prot opt source destination
LOG tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,PSH,URG limit: avg 3/min burst 5 LOG level info prefix `AIF:Stealth XMAS scan: '
LOG tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,ACK,URG limit: avg 3/min burst 5 LOG level info prefix `AIF:Stealth XMAS-PSH scan: '
LOG tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG limit: avg 3/min burst 5 LOG level info prefix `AIF:Stealth XMAS-ALL scan: '
LOG tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN limit: avg 3/min burst 5 LOG level info prefix `AIF:Stealth FIN scan: '
LOG tcp -- anywhere anywhere tcp flags:SYN,RST/SYN,RST limit: avg 3/min burst 5 LOG level info prefix `AIF:Stealth SYN/RST scan: '
LOG tcp -- anywhere anywhere tcp flags:FIN,SYN/FIN,SYN limit: avg 3/min burst 5 LOG level info prefix `AIF:Stealth SYN/FIN scan?: '
LOG tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE limit: avg 3/min burst 5 LOG level info prefix `AIF:Stealth Null scan: '
POST_INPUT_DROP_CHAIN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,PSH,URG
POST_INPUT_DROP_CHAIN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,ACK,URG
POST_INPUT_DROP_CHAIN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN,SYN,RST,PSH,ACK,URG
POST_INPUT_DROP_CHAIN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/FIN
POST_INPUT_DROP_CHAIN tcp -- anywhere anywhere tcp flags:SYN,RST/SYN,RST
POST_INPUT_DROP_CHAIN tcp -- anywhere anywhere tcp flags:FIN,SYN/FIN,SYN
POST_INPUT_DROP_CHAIN tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,PSH,ACK,URG/NONE
LOG tcp -- anywhere anywhere tcp option=64 limit: avg 3/min burst 1 LOG level info prefix `AIF:Bad TCP flag(64): '
LOG tcp -- anywhere anywhere tcp option=128 limit: avg 3/min burst 1 LOG level info prefix `AIF:Bad TCP flag(128): '
POST_INPUT_DROP_CHAIN tcp -- anywhere anywhere tcp option=64
POST_INPUT_DROP_CHAIN tcp -- anywhere anywhere tcp option=128
POST_INPUT_DROP_CHAIN all -- anywhere anywhere state INVALID
LOG all -f anywhere anywhere limit: avg 3/min burst 1 LOG level warning prefix `AIF:Fragment packet: '
DROP all -f anywhere anywhere
Ausgabe von netstat -tulpen:
Aktive Internetverbindungen (Nur Server)
Proto Recv-Q Send-Q Local Address Foreign Address State User Inode PID/Program name
tcp 0 0 0.0.0.0:55748 0.0.0.0:* LISTEN 1001 6804 2626/xe_d000_XE
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN 0 5468 1903/portmap
tcp 0 0 0.0.0.0:1521 0.0.0.0:* LISTEN 1001 6629 2599/tnslsnr
tcp 0 0 0.0.0.0:59606 0.0.0.0:* LISTEN 0 5491 1914/rpc.statd
tcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN 0 6260 2285/cupsd
tcp 0 0 127.0.0.1:8088 0.0.0.0:* LISTEN 1001 6989 2599/tnslsnr
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 0 6476 2569/exim4
tcp6 0 0 ::1:631 :::* LISTEN 0 6261 2285/cupsd
udp 0 0 127.0.0.1:42257 0.0.0.0:* 1001 6811 2628/xe_s000_XE
udp 0 0 0.0.0.0:818 0.0.0.0:* 0 5480 1914/rpc.statd
udp 0 0 127.0.0.1:46518 0.0.0.0:* 1001 6831 2632/xe_s002_XE
udp 0 0 127.0.0.1:43457 0.0.0.0:* 1001 6716 2604/xe_pmon_XE
udp 0 0 127.0.0.1:56258 0.0.0.0:* 1001 6825 2630/xe_s001_XE
udp 0 0 0.0.0.0:68 0.0.0.0:* 0 7571 2746/dhclient
udp 0 0 127.0.0.1:56141 0.0.0.0:* 1001 6841 2634/xe_s003_XE
udp 0 0 0.0.0.0:51938 0.0.0.0:* 0 5488 1914/rpc.statd
udp 0 0 0.0.0.0:5353 0.0.0.0:* 104 6131 2226/avahi-daemon:
udp 0 0 0.0.0.0:111 0.0.0.0:* 0 5437 1903/portmap
udp 0 0 0.0.0.0:631 0.0.0.0:* 0 6264 2285/cupsd
udp 0 0 0.0.0.0:45948 0.0.0.0:* 104 6141 2226/avahi-daemon:
udp 0 0 127.0.0.1:43134 0.0.0.0:* 1001 6803 2626/xe_d000_XE
udp6 0 0 :::5353 :::* 104 6132 2226/avahi-daemon:
udp6 0 0 :::48746 :::* 104 6142 2226/avahi-daemon:
Dort kann ich erkennen das 127.0.0.1 auf Port 8088 "hört" -> tcp 0 0 127.0.0.1:8088 0.0.0.0:* LISTEN 1001 6989 2599/tnslsnr
Das öffnen mit:
iptables -A FORWARD - j ACCEPT
iptables -A INPUT - j ACCEPT
iptables -A OUTPUT -j ACCEPT
führt zu keinem erfolg.
Gruß
AzubiLE
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618295
[content:156551#618295]
Dann reden wir weiter...
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618296
[content:156551#618296]
Das sollte dir doch alles sagen
Bevor du deine Firewall aufmachst, musst du deine bestehende Regeln erstmal "flushen".
Mach mal folgendes:
beende deine Firewall und dann....
iptables -F
iptables -X
iptables -t nat -F
iptables -t nat -X
iptables -t mangle -F
iptables -t mangle -X
Jetzt Öffnen...
iptables -A FORWARD - j ACCEPT
iptables -A INPUT - j ACCEPT
iptables -A OUTPUT -j ACCEPT
und versuche es noch mal.
Das nächste ist, überprüfe auch, ob du deinen Dienst an eine NIC gebunden hast. Was auch immer das für ein Dienst ist den du erreichen willst (Oracle?), checke einfach ab, dass das listining des Dienstes nicht auf localhost gebunden ist.
bsp:
listen lo wäre ungünstig
prüfe deine Config, wenn es nicht an der Firewall liegt
Knut
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618299
[content:156551#618299]
Mach mal folgendes:
beende deine Firewall und dann....
iptables -F
iptables -X
iptables -t nat -F
iptables -t nat -X
iptables -t mangle -F
iptables -t mangle -X
Jetzt Öffnen...
iptables -A FORWARD - j ACCEPT
iptables -A INPUT - j ACCEPT
iptables -A OUTPUT -j ACCEPT
führt zu keinem erfolg
@dog
netstat ergibt das 127.0.0.1 auf Port 8088 "hört"
@knut4linux und @dog
es sollte 0.0.0.0 auf den Port 8088 "hören" somit sollte das Binding umgestellt werden aber wie geht das?
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618300
[content:156551#618300]
Mach es ganz einfach. Zu jedem Dienst gibt es ein Konfigurationsfile.
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618302
[content:156551#618302]
Die Frage ist nun wie ich die Konfigdatei finde?
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618304
[content:156551#618304]
2. Mit Oracle hatte ich bisher noch nichts am Hut
3. Für solche Fälle gibt es auch Manpages zu dem Dienst.
4. RTFM !!
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618480
[content:156551#618480]
Ich muss doch irgendwo eine Übersicht haben oder aufrufen können, in der ich einstellen kann welcher Dienst auf welchen Port "hören" soll?
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618491
[content:156551#618491]
Knut
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618498
[content:156551#618498]
Gruß
AzubiLE
- Copy internal comment link
- Copy external comment link
- To the beginning of the comments
https://administrator.de/forum/debian-dienst-per-lokaler-ip-nicht-erreichbar-156551.html#comment-618508
[content:156551#618508]
Lag an der Konfigenstellung vom Dienst, welches über die Weboberfläche eingestellt werden konnte.