2016-08-04 7 views
0

에 의해 차단 난 그냥 내 PuPHPet에 config.yaml을 두 개의 새로운 포트를 추가 작동하지에서 전달 : 컴퓨터를 켤 때PuPHPet는 iptables에

vflnp_fajlkhsdkfl: 
    host: '9876' 
    guest: '9876' 
vflnp_akjfhsdasffa: 
    host: '3011' 
    guest: '3011' 

을 그리고 그들은 나타나지 않는

Bringing machine 'local' up with 'virtualbox' provider... 
==> local: Checking if box 'puphpet/centos65-x64' is up to date... 
==> local: Clearing any previously set network interfaces... 
==> local: Preparing network interfaces based on configuration... 
    local: Adapter 1: nat 
    local: Adapter 2: hostonly 
==> local: You are trying to forward to privileged ports (ports <= 1024). Most 
==> local: operating systems restrict this to only privileged process (typically 
==> local: processes running as an administrative user). This is a warning in ca                                                se 
==> local: the port forwarding doesn't work. If any problems occur, please try a 
==> local: port higher than 1024. 
==> local: Forwarding ports... 
    local: 3306 (guest) => 3306 (host) (adapter 1) 
    local: 80 (guest) => 80 (host) (adapter 1) 
    local: 8000 (guest) => 8000 (host) (adapter 1) 
    local: 9876 (guest) => 9876 (host) (adapter 1) 
    local: 3011 (guest) => 3011 (host) (adapter 1) 
    local: 22 (guest) => 2222 (host) (adapter 1) 
==> local: Running 'pre-boot' VM customizations... 
==> local: Booting VM... 
==> local: Waiting for machine to boot. This may take a few minutes... 
    local: SSH address: 127.0.0.1:2222 
    local: SSH username: vagrant 
    local: SSH auth method: private key 

는 그들은 또한 가상 상자로 나열하고

enter image description here

그러나 새 포트에서 연결을 시도 할 때 iptables에 의해 연결이 끊어집니다. iptables -F을 실행하면 즉시 재부팅 할 때까지 문제가 해결되므로이 사실을 알고 있습니다.

# iptables -L -n 
Chain INPUT (policy ACCEPT) 
target  prot opt source    destination 
ACCEPT  icmp -- 0.0.0.0/0   0.0.0.0/0   /* 000 accept all icmp */ 
ACCEPT  all -- 0.0.0.0/0   0.0.0.0/0   /* 001 accept all to lo interface */ 
ACCEPT  all -- 0.0.0.0/0   0.0.0.0/0   /* 002 accept related established rules */ state RELATED,ESTABLISHED 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   multiport ports 22 /* 100 tcp/22 */ 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   multiport ports 3306 /* 100 tcp/3306 */ 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   multiport ports 443 /* 100 tcp/443 */ 
ACCEPT  tcp -- 0.0.0.0/0   0.0.0.0/0   multiport ports 80 /* 100 tcp/80 */ 
DROP  all -- 0.0.0.0/0   0.0.0.0/0   /* 999 drop all */ 

은 왜 8000에 대한 규칙, 9876, 3011iptables에에 생성되지 않는?

인덱스 : karma; 카르마 - 주니어; 포트 9876; 원격 액세스; 업 시작;

답변