我将debian内核升级到4.3.0
root@qa-control-nce-yuztest1:/usr/src/kernels/linux-4.3# uname -a
Linux control-nce-yuztest1 4.3.0 #1 SMP清华12月10日:47:22 CST 2015 x86_64 GNU/Linux
bug找到停靠守护程序ha
root@qa-control-nce-yuztest1:/usr/src/kernels/linux-4.3# docker -d
Warning: '-d' is deprecated, it will be re
所需的软件包已安装了最新版本:
sudo apt install libiptc0 libxtables12
Reading package lists... Done
Building dependency tree
Reading state information... Done
libiptc0 is already the newest version (1.8.5-3~bpo10+1).
libxtables12 is already the newest version (1.8.5-3~bpo10+1).
0 upgraded, 0 newly install
我已经在单独的centos机器和相应的路由表之间配置了GRE隧道,如图所示:
I dont have enough reputation to post images
Router1-------gre1---------Transit-Router---------gre2--------Router2
10.2.32.0/24--Router1--10.0.0.1---gre1---10.0.0.2--Transit-Router--11.0.0.2---gre2--11.0.0.1--Router2--10.4.32.0/24
我可以从路由器-1到gre1隧道的另一端:
worker]#
我希望能够从VM1到VM2,这两个VM都连接到Linux (Br0)。下面是我的拓扑结构
VM1(m1)<====SSH====>[br0]<======SSH=====>VM2(m2)
1创建桥br0
$ sudo ip link add dev br0 type bridge
$ sudo ip addr add 10.200.1.1/24 dev br0
$ sudo ip link set br0 up
$ sysctl net.ipv4.ip_forward
net.ipv4.ip_forward = 1
2在启动VM
时指定的桥名
📷
veeru@ghost
当我试图在Proxmox OpenVZ vm中运行iptables命令时,我得到了以下错误:
# iptables -t nat -A POSTROUTING -o venet -j MASQUERADE && iptables-save
iptables v1.4.21: can't initialize iptables table `nat': Table does not exist (do you need to insmod?)
Perhaps iptables or your kernel needs to be upgraded.
Proxmox
我很难接受这个小套接字程序。该脚本在Debian 11服务器上运行良好,但在几乎相同的Debian 11服务器上有以下错误。
root@box:/home/user/python# sudo python3 script.py
Traceback (most recent call last):
File "/home/user/python/script.py", line 18, in <module>
UDPClientSocket.sendto(bytesToSend, serverAddress) # Send using created UD
新手来了。我发现了以下设置防火墙的规则(从“Linux如何工作”一书中)
iptables -P INPUT DROP # the default policy
iptables -A INPUT -s 127.0.0.1 -j ACCEPT
iptables -A INPUT -p tcp '!' --syn -j ACCEPT # accepting incoming
connections from everywhere except those initiating a connection hence syn
到目前为止还不错(或者说看起来不错)。
我正在努力保护容器免受外部IP访问"0.0.0.0“的影响。
我想将一些容器配置为公共访问,另一些则限制为确定IP。
sudo iptables -N DOCKER-USER
sudo iptables -I DOCKER-USER -j DROP
# where x.x.x.x is external IP allowed
sudo iptables -I DOCKER-USER -s x.x.x.x -j ACCEPT
# where yyyy is the external port that will be allow
sudo iptables -I DOCKER-USE