There is a docker container running in bridge network mode. Inside the container, it creates a connection to, say, 10.123.123.1:6666. I’d like to block this connection on host through IPTABLES, something like sudo iptables -I OUTPUT -p tcp -d 10.123.123.1 -j DROP, but it doesn’t work. Could anyone help me on this please? I can’t even see this connection on
Tag: iptables
blocking all internal traffic except incoming traffic from a specific ip on a single port
I’m trying to use IPtables to block all internal traffic with the exception of one server, here are my rules but when i telnet from another instance i can still connect…. Answer When debugging iptables I normally: reset all the counter – ‘iptables -Z’ make the connection then review the rule hits – ‘iptables -L -v -n |more’ This should
Filtering out VLAN tagged packets on Linux bridge [closed]
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers. This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question
IPTables drop UDP packets with IP Header Identification
We are currently receiving a 30Mbps Spoofed UDP flood against one of our applications that is causing high CPU usage, we have a dedicated firewall running a basic version of linux with IPTables. Looking at the traffic logs, all of the spoofed UDP traffic has a header identification number of 31336. Is it possible to drop packets matching this number
Iptables setup on VPN client having LAN [closed]
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers. This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question
Is iptables thread safe?
This seems to me to be a basic question, but google and SO fail to give me an answer. As the title says, is iptables thread safe? If I have multiple processes making calls to iptables, should I create a lock for myself? There seems to be some threads from 2009 querying if netfilter is thread-safe, with no solid resolution.
iptables LOG and DROP in one rule
I am trying to log outgoing connections with iptables. What I want is, drop and accept connection while logging them also. I have found that -j option takes DROP/REJECT/ACCEPT/LOG. But I want to do something like DROP and LOG or ACCEPT and LOG. Is there a way to achieve this ? Answer Example: Log Exampe: Other options:
Redirect the webservice call to http://[remote server ip]:7777 to http://[local machine ip]:8888
I have a webservice running on a remote machine available to me through ssh tunneling. Therefore I will be able to access the webservice through http://[local machine ip]:8888. But the problem here is, My source code trying to access the webservice through the public ip (http://[remote server ip]:7777). So I need all the traffic originated from my local machine to
ToyVpn: unable to settup vpn server and connecting to it also no rule is appearing the nat table
I am trying to setup VPN server on my PC. I gave commands which are given in ToyVpnServer file but after giving the last command terminal looks stuck, and from the Android phone I used ToyVpn to connect to it but it is not connecting… The commands are given below: In ToyVpnClient I gave IP address of my PC, which
Accessing a mysql database from external host/ip? (ie: mysql workbench)
I have a mysql server running on x.x.x.x, and can access it internally no problem (of course). However when attempting to connect externally, ie using mysql workbench, or even from an external server, I get the error message “Host ‘bla.bla.bla’ is not allowed to connect to this MySQL server”. I have done: GRANT ALL PRIVILEGES ON *.* TO mysql@x.x.x.x IDENTIFIED