Displaying 6 results from an estimated 6 matches for "toport".
Did you mean:
ioport
2016 May 05
3
FirewallD and FTP passive mode
...y combination.
For now i have configured port forwarding and ftp server itself.
On the router:
# firewall-cmd --list-all --zone=external
external (active)
interfaces: enp3s1
sources:
services: openvpn ssh
ports: 1194/tcp 2666/tcp 88/tcp
masquerade: yes
forward-ports: port=21:proto=tcp:toport=:toaddr=10.0.32.7
port=10090-10100:proto=tcp:toport=:toaddr=10.0.32.7
port=88:proto=tcp:toport=80:toaddr=10.0.32.23
icmp-blocks:
rich rules:
I also did:
# modprobe ip_conntrack_ftp ports=10090,10100
excerpt form vsftpd.conf on the FTP server:
pasv_enable=Yes
pasv_min_port=100...
2020 May 09
4
Transparent Squid and FirewallD : fine-tuning question
...ethernet enp3s1
Squid is acting as a transparent proxy server:
$ sudo grep http_port /etc/squid/squid.conf
http_port 3128 transparent
In my firewall configuration, all requests to port 80 (HTTP) are redirected to
port 3128:
$ sudo firewall-cmd --permanent
--add-forward-port=port=80:proto=tcp:toport=3128:toaddr=192.168.3.1
$ sudo firewall-cmd --reload
$ sudo firewall-cmd --list-all
internal (active)
target: default
icmp-block-inversion: no
interfaces: enp3s1
sources:
services: dhcp dns http squid ssh
ports:
protocols:
masquerade: no
forward-ports: port=80:proto=tcp:toport=312...
2016 Feb 21
0
ssh access to vmware vm from outside
...nalvmip:22 in tcp section of
/etc/vmware/vmnet8/nat/nat.conf (vmnet8 being the vms network)
>From the host server I can ssh the vm, but from outside, a ssh -p 2296
user at hostserverip gives me a connection refused.
I tried a
firewall-cmd --zone=external
--add-forward-port=port=2296:proto=tcp:toport=22:toaddr=internalvmip
but it does not change anything.
What am I missing ?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.centos.org/pipermail/centos-virt/attachments/20160221/1c8c0269/attachment-0002.html>
2018 Jan 16
0
Squid + wccp + firewalld
...root at s0989-stocac1 ~]# firewall-cmd --list-all
public (active)
target: default
icmp-block-inversion: no
interfaces: ens192 tun0
sources:
services: ctc-custom dhcpv6-client ssh
ports: 8081/tcp 3127/tcp 3128/tcp 8080/tcp
protocols:
masquerade: yes
forward-ports: port=80:proto=tcp:toport=3127:toaddr=1.1.1.1
sourceports:
icmp-blocks:
rich rules:
rule family="ipv4" source address="2.2.2.0/26" protocol value="gre" accept
[root at s0989-stocac1 ~]# firewall-cmd --direct --get-all-rules
ipv4 nat POSTROUTING 0 -j MASQUERADE
ipv4 nat PREROUTI...
2003 Nov 18
4
logwatch
Hi All,
I need to be able to make sense from my shorewall logs.
I have installed logwatch and it is mailing me reports but the level of
detail is just not there. I have set the detail variable to High=10 but
I get entries only from the DNS service about denied updates. What am I
getting wrong? Tom, will you be kind enough to send me your logwatch
config files?
Thanks in advance.
Ama
2010 Apr 19
7
getting a list of rules out of iptables
I''ve been using camptocamp''s iptables module. It works pretty well, lets
me define rules in various modules, etc. Now I find myself needing to
generate a commented list of it''s rules. I notice that the README has a
nice exec suggestion. But, when I try it, I can''t get it to work.
In my iptables/manifests/init.pp I have:
Iptables {
before =>