Displaying 11 results from an estimated 11 matches for "in_publ".
Did you mean:
in_public
2017 Dec 19
2
firewalld
I have two VMs, both with firewalld installed. One on machine It this in the IN_public chain:
Chain IN_public (2 references)
pkts bytes target prot opt in out source destination
81 3423 IN_public_log all -- * * 0.0.0.0/0 0.0.0.0/0
81 3423 IN_public_deny all -- * * 0.0.0.0/0 0.0...
2017 May 28
1
Ovirt Hosted-Engine VM iptables
Hi
I would like to add rules into the iptables of the Hosted Engine VM in
Ovirt.
the version is oVirt Engine Version: 4.1.1.8-1.el7.centos
I have tried using the normal process for iptables (iptables-save etc),
but it seems that the file
/etc/sysconfig/iptables
this is ignored in the Ovirt Engine VM.
How can I add permanent rules into the Engine VM?
Kind regards
Andrew
2015 Oct 13
2
Firewalld
...permanent' firewalld configuration files.
>
> Rather than paraphrasing, could you show the specific rules, chains, or policies you're talking about? A standard firewalld rule set has the INPUT policy set to ACCEPT, with a terminal REJECT rule. An INPUT_ZONES table will direct to an IN_public table, with log, deny, and accept rules.
>
> Typically, the only rule that references an interface is the one in INPUT_ZONES that "goto"s IN_public_allow. It is neither REJECT nor ACCEPT, so it's really hard to guess what you're seeing that you don't expect to see.
&...
2015 Oct 11
4
Firewalld
I just noticed that when rebooting a CentOS 7 server the firewall comes back up with both interfaces set to REJECT, instead of the eth1 interface set to ACCEPT as defined in 'permanent' firewalld configuration files.
All servers are up to date.
By "just noticed" I mean that I finally investigated why a newly rebooted VM failed to allow NFS connections. Prior to doing that.
2015 Aug 19
1
Firewalld broken on Centos7?
...19 11:23:43 master firewalld: 2015-08-19 11:23:43 ERROR: Failed to
apply rules. A firewall reload might solve the issue if the firewall has
been modified using ip*tables or ebtables.
Aug 19 11:23:43 master firewalld: 2015-08-19 11:23:43 ERROR:
'/sbin/iptables -D INPUT_ZONES -t filter -i eth0 -g IN_public' failed:
iptables: No chain/target/match by that name.
Aug 19 11:23:43 master firewalld: 2015-08-19 11:23:43 ERROR:
COMMAND_FAILED: '/sbin/iptables -D INPUT_ZONES -t filter -i eth0 -g
IN_public' failed: iptables: No chain/target/match by that name.
Aug 19 11:35:58 master yum[23685]: E...
2017 Dec 19
0
firewalld
On Tue, 2017-12-19 at 15:05 -0800, Emmett Culley wrote:
> I have two VMs, both with firewalld installed. One on machine It
> this in the IN_public chain:
>
> Chain IN_public (2 references)
> pkts bytes target prot opt
> in out source destination
> 81 3423 IN_public_log all
> -- * * 0.0.0.0/0 0.0.0.0/0
> 81 3423 IN_public_deny all
> -...
2017 Dec 19
1
firewalld
On 12/19/2017 03:37 PM, Louis Lagendijk wrote:
> On Tue, 2017-12-19 at 15:05 -0800, Emmett Culley wrote:
>> I have two VMs, both with firewalld installed. One on machine It
>> this in the IN_public chain:
>>
>> Chain IN_public (2 references)
>> pkts bytes target prot opt
>> in out source destination
>> 81 3423 IN_public_log all
>> -- * * 0.0.0.0/0 0.0.0.0/0
>> 81 3423 IN_public_deny all...
2019 Jan 15
0
Cannot access other computers on LAN
...(1 references)
pkts bytes target prot opt in out source
destination
Chain FWDO_public_log (1 references)
pkts bytes target prot opt in out source
destination
Chain INPUT_ZONES (1 references)
pkts bytes target prot opt in out source
destination
17 1140 IN_public all -- p8p1 * 0.0.0.0/0
0.0.0.0/0 [goto]
5 452 IN_public all -- + * 0.0.0.0/0
0.0.0.0/0 [goto]
Chain INPUT_ZONES_SOURCE (1 references)
pkts bytes target prot opt in out source
destination
Chain INPUT_direct (1 references)
pkts by...
2019 Jan 15
2
Cannot access other computers on LAN
Hello Julien,
Am Tue, 15 Jan 2019 09:30:23 +0100
schrieb Julien dupont <marcelvierzon at gmail.com>:
> In that case I see:
> IP 172.16.0.3 > 192.168.1.1: ICMP echo request, id2135, seq1, length 64
> IP 172.16.0.3 > 192.168.1.1: ICMP echo request, id2135, seq2, length 64
> IP 172.16.0.3 > 192.168.1.1: ICMP echo request, id2135, seq3, length 64
>
> Packet goes
2020 Jun 21
6
firewall questions
I'm running Centos 7.8.2003, with firewalld.
I was getting huge numbers of ssh attempts per day from a few specific
ip blocks.
The offenders are 45.0.0.0/24, 49.0.0.0/24, 51.0.0.0/24, 111.0.0.0/24
and 118.0.0.0/24, and they amounted to a multiple thousands of attempts
per day. I installed and configured fail2ban, but still saw a lot of
attempts in the logs, and the ipset created was
2015 Oct 12
0
Firewalld
...n 'permanent' firewalld configuration files.
Rather than paraphrasing, could you show the specific rules, chains, or
policies you're talking about? A standard firewalld rule set has the
INPUT policy set to ACCEPT, with a terminal REJECT rule. An INPUT_ZONES
table will direct to an IN_public table, with log, deny, and accept rules.
Typically, the only rule that references an interface is the one in
INPUT_ZONES that "goto"s IN_public_allow. It is neither REJECT nor
ACCEPT, so it's really hard to guess what you're seeing that you don't
expect to see.